Emmanouil A. Panaousis
Orcid: 0000-0001-7306-4062Affiliations:
- University of Greenwich, School of Computing and Mathematical Sciences, London, UK
- University of Brighton (former)
According to our database1,
Emmanouil A. Panaousis
authored at least 94 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices.
Comput. Secur., 2025
2024
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain.
Int. J. Inf. Sec., February, 2024
A qualitative field study on explainable AI for lay users subjected to AI cyberattacks.
CoRR, 2024
2023
Comput. Secur., September, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments.
Comput. Secur., 2023
IEEE Access, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Inf. Secur. Appl., 2022
Des. Codes Cryptogr., 2022
CoRR, 2022
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles.
IEEE Access, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the Asian Conference on Machine Learning, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
Sensors, 2021
TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems.
IEEE Internet Things J., 2021
CoRR, 2021
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Dynamic decision support for resource offloading in heterogeneous Internet of Things environments.
Simul. Model. Pract. Theory, 2020
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020
An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation.
IEEE Access, 2020
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
Proceedings of the From Lambda Calculus to Cybersecurity Through Program Analysis, 2020
2019
ACM Trans. Intell. Syst. Technol., 2019
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019
Ad Hoc Networks, 2019
Ad Hoc Networks, 2019
IEEE Access, 2019
IEEE Access, 2019
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
2017
COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks.
Sensors, 2017
Comput. Sci. Inf. Syst., 2017
Game theoretic path selection to support security in device-to-device communications.
Ad Hoc Networks, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Proceedings of the 24th International Conference on Telecommunications, 2017
2016
Decis. Support Syst., 2016
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments.
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the Workshops Proceedings for the Twenty-fourth International Conference on Case-Based Reasoning (ICCBR 2016), Atlanta, Georgia, USA, October 31, 2016
Proceedings of the Advanced Information Systems Engineering Workshops, 2016
2015
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the IEEE International Conference on Communication, 2015
2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
2013
J. Supercomput., 2013
Proceedings of the ISWCS 2013, 2013
Proceedings of the European Wireless 2013, 2013
2012
Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions.
J. Networks, 2012
Inf. Syst. Frontiers, 2012
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012
2010
An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas.
Proceedings of the Mobile Lightweight Wireless Systems, 2010
2009
Proceedings of the 5th International Conference on Mobile Multimedia Communications, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
2008
Proceedings of the 16th IEEE Workshop on Local and Metropolitan Area Networks, 2008