Panayiotis Kotzanikolaou

Orcid: 0000-0002-8771-9020

According to our database1, Panayiotis Kotzanikolaou authored at least 78 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Edge Multi Factor Authentication System for Cyber Physical Systems Based on OTP.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

2023
Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps.
IEEE Syst. J., June, 2023

Uninterrupted Trust: Continuous Authentication in Blockchain-Enhanced Supply Chains.
Proceedings of the 8th South-East Europe Design Automation, 2023

Automated WiFi Incident Detection Attack Tool on 802.11 Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Assessing the Security Risks of Medical Mobile Applications.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Blockchain Service Layer for ERP data interoperability among multiple supply chain stakeholders.
Proceedings of the 9th International Conference on Control, 2023

2022
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation.
J. Cybersecur. Priv., September, 2022

Communication Resilience for Smart Grids Based on Dependence Graphs and Eigenspectral Analysis.
IEEE Syst. J., 2022

An Adaptive, Situation-Based Risk Assessment and Security Enforcement Framework for the Maritime Sector.
Sensors, 2022

Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls.
J. Comput. Secur., 2022

Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services.
Connect. Sci., 2022

Automating environmental vulnerability analysis for network services.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

2021
Assessing IoT enabled cyber-physical attack paths against critical systems.
Comput. Secur., 2021

Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal.
IEEE Access, 2021

Modelling Human Tasks to Enhance Threat Identification in Critical Maritime Systems.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

Assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting Systems.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systems.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Security in IoMT Communications: A Survey.
Sensors, 2020

A Dependency Analysis Model for Resilient Wide Area Measurement Systems in Smart Grid.
IEEE J. Sel. Areas Commun., 2020

TS-LoRa: Time-slotted LoRaWAN for the Industrial Internet of Things.
Comput. Commun., 2020

A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data.
IEEE Access, 2020

On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

2019
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures.
IEEE Internet Things J., 2019

Association Attacks in IEEE 802.11: Exploiting WiFi Usability Features.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain.
Proceedings of the 2019 IEEE World Congress on Services, 2019

An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet.
Proceedings of the 10th International Conference on Information, 2019

Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Design and validation of the Medusa supply chain risk assessment methodology and system.
Int. J. Crit. Infrastructures, 2018

A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services.
IEEE Commun. Surv. Tutorials, 2018

Preliminary design of a new approach to choose cyber exercise methodologies for critical infrastructures.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
Security Awareness of the Digital Natives.
Inf., 2017

Broadcast anonymous routing (BAR): scalable real-time anonymous communication.
Int. J. Inf. Sec., 2017

2016
SCN-SI-021 achieving privacy and access control in pervasive computing environments.
Secur. Commun. Networks, 2016

Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures.
Int. J. Crit. Infrastructure Prot., 2016

Lightweight private proximity testing for geospatial social networks.
Comput. Commun., 2016

Classification and Comparison of Critical Infrastructure Protection Tools.
Proceedings of the Critical Infrastructure Protection X, 2016

Critical Infrastructure Protection: A Holistic Methodology for Greece.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

2015
Risk mitigation strategies for critical infrastructures based on graph centrality analysis.
Int. J. Crit. Infrastructure Prot., 2015

Private Proximity Testing on Steroids: An NTRU-based Protocol.
IACR Cryptol. ePrint Arch., 2015

Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation.
Proceedings of the Critical Infrastructure Protection IX, 2015

Medusa: A Supply Chain Risk Assessment Methodology.
Proceedings of the Cyber Security and Privacy, 2015

2014
Towards Secure and Practical Location Privacy through Private Equality Testing.
Proceedings of the Privacy in Statistical Databases, 2014

2013
Toward early warning against Internet worms based on critical-sized networks.
Secur. Commun. Networks, 2013

Assessing n-order dependencies between critical infrastructures.
Int. J. Crit. Infrastructures, 2013

Evaluating security controls against HTTP-based DDoS attacks.
Proceedings of the 4th International Conference on Information, 2013

Cascading Effects of Common-Cause Failures in Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
Chord-PKI: A distributed trust infrastructure based on P2P networks.
Comput. Networks, 2012

Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Fair Anonymous Authentication for Location Based Services.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
A multi-layer Criticality Assessment methodology based on interdependencies.
Comput. Secur., 2010

Solving coverage problems in wireless sensor networks using cover sets.
Ad Hoc Networks, 2010

A distributed privacy-preserving scheme for location-based queries.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

2009
Secure and practical key establishment for distributed sensor networks.
Secur. Commun. Networks, 2009

Risk-Based Criticality Analysis.
Proceedings of the Critical Infrastructure Protection III, 2009

Evaluating Common Privacy Vulnerabilities in Internet Service Providers.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
Multilayer key establishment for large-scale sensor networks.
Int. J. Secur. Networks, 2008

Data Retention and Privacy in Electronic Communications.
IEEE Secur. Priv., 2008

Secure log management for privacy assurance in electronic communications.
Comput. Secur., 2008

2007
Towards secure online elections: models, primitives and open issues.
Electron. Gov. an Int. J., 2007

SecMR - a secure multipath routing protocol for ad hoc networks.
Ad Hoc Networks, 2007

Privacy Threats of Data Retention in Internet Communications.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network.
Proceedings of the Public Key Infrastructure, 2007

2006
Secure distributed intelligent networks.
Comput. Commun., 2006

A Framework for Secure and Verifiable Logging in Public Communication Networks.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, Third International Conference, 2005

Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Secure Multipath Routing for Mobile Ad Hoc Networks.
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005

Preventing Impersonation Attacks in MANET with Multi-Factor Authentication.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

Performance Analysis of a Hybrid Key Establishment Protocol for Wireless Sensor Networks.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

2003
Ασφαλή συστήματα κινητών πρακτόρων
PhD thesis, 2003

2001
Strong Forward Security.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions.
Proceedings of the Electronic Commerce and Web Technologies, 2001

Dynamic Multi-signatures for Secure Autonomous Agents.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
Secure Transactions with Mobile Agents in Hostile Environments.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000


  Loading...