George C. Oikonomou

Orcid: 0000-0002-1684-6989

Affiliations:
  • University of Bristol, UK
  • Loughborough University, UK (2009 - 2011)
  • Athens University of Economics and Business, Greece (PhD 2009)


According to our database1, George C. Oikonomou authored at least 121 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
xApp Distillation: AI-based Conflict Mitigation in B5G O-RAN.
CoRR, 2024

FlexBoT: A Scalable Architecture for Multi-Application Supporting BoT Environments with Application Shifting at Runtime.
Proceedings of the IFIP Networking Conference, 2024

2023
Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review.
CoRR, 2023

Public Blockchain in Support of Transactive Energy Markets.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

Reliable Identification of IoT Devices from Passive Network Traffic Analysis: Requirements and Recommendations.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

E-scooter Sharing Platforms: Understanding Their Architecture and Cybersecurity Threats.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

A Conceptual Architecture for Scalable Multi-Application Support in Blockchain-based IoT Environments.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

CRICKET: A Practical Physical Layer Key Agreement Protocol for IoT Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Evaluating Concept Drift Detectors on Real-World Data.
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023

Granular IoT Device Identification Using TF-IDF and Cosine Similarity.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
The Contiki-NG open source operating system for next generation IoT devices.
SoftwareX, 2022

Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection.
CoRR, 2022

Federated Meta-Learning for Traffic Steering in O-RAN.
Proceedings of the 96th Vehicular Technology Conference, 2022

Graph modelled system change detection in WSNs.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

Topology Change Localisation in WSNs.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

Anomaly Detection in Logical Sub-Views of WSNs.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Keyword Extraction for Fine-Grained IoT Device Identification.
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022

IoT Key Exchange Performance Analysis.
Proceedings of the 2022 International Conference on Embedded Wireless Systems and Networks, 2022

Securing Synchronous Flooding Communications: An Atomic-SDN Implementation.
Proceedings of the 2022 International Conference on Embedded Wireless Systems and Networks, 2022

2021
An urban sensing architecture as essential infrastructure for future cities.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021

Container Escape Detection for Edge Devices.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

Towards Multi-Criteria Heuristic Optimization for Computational Offloading in Multi-Access Edge Computing.
Proceedings of the 22nd IEEE International Conference on High Performance Switching and Routing, 2021

6TiSCH++ with Bluetooth 5 and Concurrent Transmissions.
Proceedings of the EWSN '21: Proceedings of the 2021 International Conference on Embedded Wireless Systems and Networks, 2021

Anomaly detection of data and topology patterns in WSNs.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

2020
TSCH Networks for Health IoT: Design, Evaluation, and Trials in the Wild.
ACM Trans. Internet Things, 2020

TSCH-over-LoRA : long range and reliable IPv6 multi-hop networks for the internet of things.
Internet Technol. Lett., 2020

TSCH for Long Range Low Data Rate Applications.
IEEE Access, 2020

Heuristic Approaches for Computational Offloading in Multi-Access Edge Computing Networks.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Radio Resource Allocation Between Massive MIMO and LTE Using SDN.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Wearable Devices for Digital Health: The SPHERE Wearable 3.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

2019
Efficient DCT-based secret key generation for the Internet of Things.
Ad Hoc Networks, 2019

Atomic-SDN: Is Synchronous Flooding the Solution to Software-Defined Networking in IoT?
IEEE Access, 2019

Adaptive Guard Time for Energy-Efficient IEEE 802.15.4 TSCH Networks.
Proceedings of the Wired/Wireless Internet Communications, 2019

EVM Prediction for Massive MIMO.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

An SDN Agent-Enabled Rate Adaptation Framework for WLAN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

The Advantage of Computation Offloading in Multi-Access Edge Computing.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

Instant: A TSCH Schedule for Data Collection from Mobile Nodes.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

Poster: Atomic-SDN: A Synchronous Flooding Framework for SDN Control of Low-Power Wireless.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

2018
Temperature-Resilient Time Synchronization for the Internet of Things.
IEEE Trans. Ind. Informatics, 2018

In Compute/Memory Dynamic Packet/Circuit Switch Placement for Optically Disaggregated Data Centers.
JOCN, 2018

Utilizing Synchronous Flooding for Reliable and Scalable SDN in Low-Power Wireless Networks.
CoRR, 2018

A Guide to the SPHERE 100 Homes Study Dataset.
CoRR, 2018

Enabling Healthcare in Smart Homes: The SPHERE IoT Network Infrastructure.
IEEE Commun. Mag., 2018

Adaptive static scheduling in IEEE 802.15.4 TSCH networks.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

An accelerometer lossless compression algorithm and energy analysis for IoT devices.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops, 2018

Energy-Efficient, Noninvasive Water Flow Sensor.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

On Predicting the Battery Lifetime of IoT Devices: Experiences from the SPHERE Deployments.
Proceedings of the 7th International Workshop on Real-World Embedded Wireless Systems and Networks, 2018

Distributed Ledger Technology and the Internet of Things: A Feasibility Study.
Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, 2018

Evolving SDN for Low-Power IoT Networks.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Analysing Interface Bonding in 5G WLANs.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

SPHERE Deployment Manager: A Tool for Deploying IoT Sensor Networks at Large Scale.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

2017
Privacy Leakage of Physical Activity Levels in Wireless Embedded Wearable Systems.
IEEE Signal Process. Lett., 2017

Designing Wearable Sensing Platforms for Healthcare in a Residential Environment.
EAI Endorsed Trans. Pervasive Health Technol., 2017

Isolating SDN control traffic with layer-2 slicing in 6TiSCH industrial IoT networks.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Physical layer secret-key generation with discreet cosine transform for the Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2017

Internet of Things for smart homes: Lessons learned from the SPHERE case study.
Proceedings of the Global Internet of Things Summit, 2017

Demo: SPES-2 - A Sensing Platform for Maintenance-Free Residential Monitoring.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Competition: Adaptive Time-Slotted Channel Hopping.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Scheduling High-Rate Unpredictable Traffic in IEEE 802.15.4 TSCH Networks.
Proceedings of the 13th International Conference on Distributed Computing in Sensor Systems, 2017

TSCH and 6TiSCH for Contiki: Challenges, Design and Evaluation.
Proceedings of the 13th International Conference on Distributed Computing in Sensor Systems, 2017

2016
An Intelligent Hot-Desking Model Based on Occupancy Sensor Data and Its Potential for Social Impact.
Trans. Large Scale Data Knowl. Centered Syst., 2016

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.
IEEE Trans. Cybern., 2016

A study on usability and security features of the Android pattern lock screen.
Inf. Comput. Secur., 2016

Classification and suitability of sensing technologies for activity recognition.
Comput. Commun., 2016

Guard time optimisation and adaptation for energy efficient multi-hop TSCH networks.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Practical limits of the secret key-capacity for IoT physical layer security.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Traffic forensics for IPv6-based Wireless Sensor Networks and the Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Impact of Guard Time Length on IEEE 802.15.4e TSCH Energy Consumption.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Microsecond-Accuracy Time Synchronization Using the IEEE 802.15.4 TSCH Protocol.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

A Mobility-Supporting MAC Scheme for Bursty Traffic in IoT and WSNs.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.
Inf. Secur. J. A Glob. Perspect., 2015

Game theoretic approach towards optimal multi-tasking and data-distribution in IoT.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Class Based Overall Priority Scheduling for M2M Communications over LTE Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem.
Proceedings of the Advances in Digital Forensics XI, 2015

Hidden Presence: Sensing Occupancy and Extracting Value from Occupancy Data.
Proceedings of the Design, User Experience, and Usability: Interactive Experience Design, 2015

An Extensible Platform for the Forensic Analysis of Social Media Data.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Messaging Activity Reconstruction with Sentiment Polarity Identification.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Whole-Life Environmental Impacts of ICT Use.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things.
IEEE Trans. Ind. Informatics, 2014

Digital investigations for IPv6-based Wireless Sensor Networks.
Digit. Investig., 2014

RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects.
Proceedings of the 2014 IEEE Wireless Communications and Networking Conference Workshops, 2014

On the Development of Automated Forensic Analysis Methods for Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Managing cyber security risks in industrial control systems with game theory and viable system modelling.
Proceedings of the 9th International Conference on System of Systems Engineering, 2014

Enabling reliable and secure IoT-based smart city applications.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

CADC: Congestion Aware Duty Cycle mechanism a simulation evaluation.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

2013
IPv6 Multicast Forwarding in RPL-Based Wireless Sensor Networks.
Wirel. Pers. Commun., 2013

Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data.
Int. J. Digit. Crime Forensics, 2013

JPEG steganography detection with Benford's Law.
Digit. Investig., 2013

A game theoretic defence framework against DoS/DDoS cyber attacks.
Comput. Secur., 2013

Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

A pilot study on the security of pattern screen-lock methods and soft side channel attacks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Adaptive and Context-Aware Service Discovery for the Internet of Things.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

2012
TRENDY: an adaptive and context-aware service discovery protocol for 6LoWPANs.
Proceedings of the Third International Workshop on the Web of Things, 2012

Forensic analysis of wireless networking evidence of Android smartphones.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Stateless multicast forwarding with RPL in 6LowPAN sensor networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

DCCC6: Duty Cycle-aware congestion control for 6LoWPAN networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

Adaptive neighbor discovery for mobile and low power wireless sensor networks.
Proceedings of the 15th ACM International Conference on Modeling, 2012

RPL router discovery for supporting energy-efficient transmission in single-hop 6LoWPAN.
Proceedings of IEEE International Conference on Communications, 2012

2011
Experiences from porting the Contiki operating system to a popular hardware platform.
Proceedings of the Distributed Computing in Sensor Systems, 2011

A comparative study of congestion control algorithms in IPv6 Wireless Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

ADDER: Probabilistic, Application Layer Service Discovery for MANETs and Hybrid Wired-Wireless Networks.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

2010
An emulator for the network stack of Integrated Modular Systems.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

2009
Modeling Human Behavior for Defense Against Flash-Crowd Attacks.
Proceedings of IEEE International Conference on Communications, 2009

2008
Web-Based Management of Distributed Services.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

A software platform for developing multi-player pervasive games using small programmable object technologies.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Combining Speak-Up with DefCOM for Improved DDoS Defense.
Proceedings of IEEE International Conference on Communications, 2008

Using a Web-based Framework to Manage Grid Deployments.
Proceedings of the 2008 International Conference on Grid Computing & Applications, 2008

Web-Based Management of Content Delivery Networks.
Proceedings of the Managing Large-Scale Service Deployment, 2008

2006
A Framework for a Collaborative DDoS Defense.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
An Architecture for the Management of Smart Cards by Mobile Devices Using Java Technologies.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

2004
A scalable, extensible framework for grid management.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

2000
Πλαίσιο διαχείρισης κατανεμημένων συστημάτων και υπηρεσιών βασισμένο σε τεχνολογίες ιστού: εφαρμογή στη περίπτωση των δικτύων διανομής περιεχομένου
PhD thesis, 2000


  Loading...