Nicholas Kolokotronis
Orcid: 0000-0003-0660-8431
According to our database1,
Nicholas Kolokotronis
authored at least 94 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
SEAGuard: A Blockchain-Based Security Framework for IoT Maritime Transportation Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems.
Internet Things, December, 2023
Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence.
IEEE Trans. Intell. Transp. Syst., April, 2023
Cognitive Email Analysis with Automated Decision Support for Business Email Compromise Prevention.
Proceedings of the 8th South-East Europe Design Automation, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IDERES: Intrusion detection and response system using machine learning and attack graphs.
J. Syst. Archit., 2022
An Intelligent Platform for Threat Assessment and Cyber-Attack Mitigation in IoMT Ecosystems.
Proceedings of the IEEE Globecom 2022 Workshops, 2022
Blockchain-Enabled Digital Forensics for the IoT: Challenges, Features, and Current Frameworks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Dataset, March, 2021
Insider Detection using Deep Autoencoder and Variational Autoencoder Neural Networks.
CoRR, 2021
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance.
Comput. Networks, 2021
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021
2020
J. Inf. Secur. Appl., 2020
Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints.
IEEE Access, 2020
Proceedings of the 2020 IEEE World Congress on Services, 2020
Proceedings of the 2020 IEEE World Congress on Services, 2020
Proceedings of the 2020 IEEE World Congress on Services, 2020
2nd IEEE Services Workshop on Cyber Security and Resilience in the Internet of Things (CSRIoT 2020).
Proceedings of the 2020 IEEE World Congress on Services, 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
IoT Malware Network Traffic Classification using Visual Representation and Deep Learning.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
The Error Linear Complexity Spectrum as a Cryptographic Criterion of Boolean Functions.
IEEE Trans. Inf. Theory, 2019
CoRR, 2019
CoRR, 2019
IEEE Consumer Electron. Mag., 2019
Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019
Proceedings of the 8th International Conference on Data Science, 2019
2018
IEEE Trans. Signal Inf. Process. over Networks, 2018
Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction.
Des. Codes Cryptogr., 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
Proceedings of the 25th European Signal Processing Conference, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016
Improving physical layer security in DF relay networks via two-stage cooperative jamming.
Proceedings of the 24th European Signal Processing Conference, 2016
2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
Proceedings of the 23rd European Signal Processing Conference, 2015
Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes.
Proceedings of the Cryptography and Information Security in the Balkans, 2015
2014
Short paper: attacking and defending lightweight PHY security schemes for wireless communications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014
2013
Cryptogr. Commun., 2013
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Constructing Boolean functions in odd number of variables with maximum algebraic immunity.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
2009
IEEE Trans. Inf. Theory, 2009
Cryptogr. Commun., 2009
2008
IEEE Trans. Inf. Theory, 2008
Des. Codes Cryptogr., 2008
On symplectic matrices of cubic Boolean forms and connections with second order nonlinearity.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
2007
IEEE Trans. Inf. Theory, 2007
IACR Cryptol. ePrint Arch., 2007
Best Affine Approximations of Boolean Functions and Applications to Low Order Approximations.
Proceedings of the IEEE International Symposium on Information Theory, 2007
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions.
Proceedings of the Cryptography and Coding, 2007
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression.
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2005
2004
On the generation of sequences simulating higher order white noise for system identification.
Signal Process., 2004
2003
IEEE Trans. Inf. Theory, 2003
2002
Securing Web-based Information Systems: A Model and Implementation Guidelines.
Informatica (Slovenia), 2002
2001
Proceedings of the Sequences and their Applications, 2001
A Model and Implementation Guidelines for Information Security Strategies in Web Environments.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001
1999