Constantinos Kolias
Orcid: 0000-0002-3020-291X
According to our database1,
Constantinos Kolias
authored at least 44 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Assessing the detection of lateral movement through unsupervised learning techniques.
Comput. Secur., 2025
2024
From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks.
Future Internet, April, 2024
Int. J. Crit. Infrastructure Prot., 2024
From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting.
CoRR, 2023
Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis.
Proceedings of the IEEE Military Communications Conference, 2023
2022
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features.
Sensors, 2022
Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces.
Secur. Commun. Networks, 2022
J. Inf. Secur. Appl., 2022
Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising.
CoRR, 2022
Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems.
IEEE Access, 2022
2021
Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures.
CoRR, 2021
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents.
IEEE Access, 2021
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset.
IEEE Access, 2021
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
2020
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks.
Symmetry, 2020
EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
2019
Wirel. Commun. Mob. Comput., 2019
2018
2017
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection.
Int. J. Inf. Sec., 2017
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset.
Future Internet, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
2016
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Commun. Surv. Tutorials, 2016
2015
Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?.
Proceedings of the SECRYPT 2015, 2015
2014
PhD thesis, 2014
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014
2013
Proceedings of the Semantic Hyper/Multimedia Adaptation - Schemes and Applications, 2013
IEEE Commun. Surv. Tutorials, 2013
2011
2010
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web.
Pers. Ubiquitous Comput., 2010
2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009
2008
Enabling the provision of secure web based m-health services utilizing XML based security models.
Secur. Commun. Networks, 2008
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008
A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization.
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008