Panayiotis Kotzanikolaou
Orcid: 0000-0002-8771-9020
According to our database1,
Panayiotis Kotzanikolaou
authored at least 78 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
2023
Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps.
IEEE Syst. J., June, 2023
Proceedings of the 8th South-East Europe Design Automation, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Blockchain Service Layer for ERP data interoperability among multiple supply chain stakeholders.
Proceedings of the 9th International Conference on Control, 2023
2022
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation.
J. Cybersecur. Priv., September, 2022
Communication Resilience for Smart Grids Based on Dependence Graphs and Eigenspectral Analysis.
IEEE Syst. J., 2022
An Adaptive, Situation-Based Risk Assessment and Security Enforcement Framework for the Maritime Sector.
Sensors, 2022
Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls.
J. Comput. Secur., 2022
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services.
Connect. Sci., 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
2021
Comput. Secur., 2021
Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal.
IEEE Access, 2021
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021
Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systems.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
A Dependency Analysis Model for Resilient Wide Area Measurement Systems in Smart Grid.
IEEE J. Sel. Areas Commun., 2020
Comput. Commun., 2020
IEEE Access, 2020
On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
2019
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures.
IEEE Internet Things J., 2019
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet.
Proceedings of the 10th International Conference on Information, 2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
Design and validation of the Medusa supply chain risk assessment methodology and system.
Int. J. Crit. Infrastructures, 2018
A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services.
IEEE Commun. Surv. Tutorials, 2018
Preliminary design of a new approach to choose cyber exercise methodologies for critical infrastructures.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
2017
Int. J. Inf. Sec., 2017
2016
Secur. Commun. Networks, 2016
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures.
Int. J. Crit. Infrastructure Prot., 2016
Comput. Commun., 2016
Proceedings of the Critical Infrastructure Protection X, 2016
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
2015
Risk mitigation strategies for critical infrastructures based on graph centrality analysis.
Int. J. Crit. Infrastructure Prot., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Critical Infrastructure Protection IX, 2015
Proceedings of the Cyber Security and Privacy, 2015
2014
Proceedings of the Privacy in Statistical Databases, 2014
2013
Secur. Commun. Networks, 2013
Int. J. Crit. Infrastructures, 2013
Proceedings of the 4th International Conference on Information, 2013
Proceedings of the Critical Infrastructure Protection VII, 2013
2012
Comput. Networks, 2012
Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
2011
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects.
Proceedings of the Critical Information Infrastructure Security, 2011
2010
Comput. Secur., 2010
Ad Hoc Networks, 2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
2009
Secur. Commun. Networks, 2009
Proceedings of the Critical Infrastructure Protection III, 2009
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
2008
Int. J. Secur. Networks, 2008
Comput. Secur., 2008
2007
Electron. Gov. an Int. J., 2007
Ad Hoc Networks, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of the Public Key Infrastructure, 2007
2006
Proceedings of the Critical Information Infrastructures Security, 2006
2005
Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, Third International Conference, 2005
Proceedings of the 2005 International Conference on a World of Wireless, 2005
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005
Performance Analysis of a Hybrid Key Establishment Protocol for Wireless Sensor Networks.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005
2003
2001
Proceedings of the Trusted Information: The New Decade Challenge, 2001
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions.
Proceedings of the Electronic Commerce and Web Technologies, 2001
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000