Thanassis Giannetsos
Orcid: 0000-0003-0663-2263
According to our database1,
Thanassis Giannetsos
authored at least 52 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Int. J. Prod. Res., October, 2023
Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security.
Proceedings of the IEEE Vehicular Networking Conference, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2023
Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems.
Sensors, 2022
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly.
Future Internet, 2021
CoRR, 2021
Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
A Perfect Match: Deep Learning Towards Enhanced Data Trustworthiness in Crowd-Sensing Systems.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
STARdom: An Architecture for Trusted and Secure Human-Centered Manufacturing Systems.
Proceedings of the Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems, 2021
Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
2020
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT).
Comput. Commun., 2020
Proceedings of the Adjunct Publication of the 28th ACM Conference on User Modeling, 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
CloudVaults: Integrating Trust Extensions into System Integrity Verification for Cloud-Based Environments.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems.
Comput. Commun., 2019
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018
2017
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
2016
IEEE Internet Things J., 2016
Android privacy C(R)ache: reading your external storage and sensors for fun and profit.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
2014
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks.
J. Comput. Syst. Sci., 2014
SPPEAR: security & privacy-preserving architecture for participatory-sensing applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 13th Annual Mediterranean Ad Hoc Networking Workshop, 2014
2013
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013
2012
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012
2011
Secur. Commun. Networks, 2011
2010
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
Comput. J., 2010
Proceedings of the Distributed Computing in Sensor Systems, 2010
2009
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009
2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
2007
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007