Vassilios G. Vassilakis

Orcid: 0000-0003-4902-8226

According to our database1, Vassilios G. Vassilakis authored at least 76 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unveiling Internet Censorship: Analysing the Impact of Nation States' Content Control Efforts on Internet Architecture and Routing Patterns.
CoRR, 2024

Evaluating the Performance Open-Source Vulnerability Scanners.
Proceedings of the 14th International Symposium on Communication Systems, 2024

2023
Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks.
Future Internet, May, 2023

An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks.
Sensors, March, 2023

A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks.
CoRR, 2023

A Lightweight Authentication and Privacy Preservation Scheme for MQTT.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

An Analysis of the Threats Posed by Botnet Malware Targeting Vulnerable Cryptocurrency Miners.
Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks, 2023

2022
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks.
J. Cybersecur. Priv., March, 2022

OCR post-correction for detecting adversarial text images.
J. Inf. Secur. Appl., 2022

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks.
Ad Hoc Networks, 2022

Side-channel Attacks and Countermeasures in Cloud Services and Infrastructures.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Protecting Shared Virtualized Environments against Cache Side-channel Attacks.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets.
Proceedings of the 13th International Symposium on Communication Systems, 2022

ML-based Detection of Rank and Blackhole Attacks in RPL Networks.
Proceedings of the 13th International Symposium on Communication Systems, 2022

2021
Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses.
Comput. Electr. Eng., 2021

SDN-Based Detection of Self-Propagating Ransomware: The Case of BadRabbit.
IEEE Access, 2021

Memory Deduplication as a Protective Factor in Virtualized Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Battery draining attacks against edge computing nodes in IoT networks.
CoRR, 2020

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms.
Proceedings of the AIChallengeIoT@SenSys 2020: Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, 2020

SDN-based Malware Detection and Mitigation: The Case of ExPetr Ransomware.
Proceedings of the IEEE International Conference on Informatics, 2020

Performance Evaluation of a Wormhole Detection Method using Round-Trip Times and Hop Counts in RPL-Based 6LoWPAN Networks.
Proceedings of the 12th International Symposium on Communication Systems, 2020

Heartbeat-Based Detection of Blackhole and Greyhole Attacks in RPL Networks.
Proceedings of the 12th International Symposium on Communication Systems, 2020

2019
A Survey of Attacks Against Twitter Spam Detectors in an Adversarial Environment.
Robotics, 2019

Preface of SI: Optimization of Wired and Wireless Optical Networks.
Opt. Switch. Netw., 2019

Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks.
J. Netw. Comput. Appl., 2019

Ransomware detection and mitigation using software-defined networking: The case of WannaCry.
Comput. Electr. Eng., 2019

An Approach for Detecting Image Spam in OSNs.
Proceedings of the 2019 Truth and Trust Online Conference (TTO 2019), 2019

Detecting Spam Images with Embedded Arabic Text in Twitter.
Proceedings of the 3rd International Workshop on Arabic and derived Script Analysis and Recognition, 2019

Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Quality of service differentiation in heterogeneous CDMA networks: a mathematical modelling approach.
Wirel. Networks, 2018

On Channel Sharing Policies in LEO Mobile Satellite Systems.
IEEE Trans. Aerosp. Electron. Syst., 2018

Efficient radio resource allocation in SDN/NFV based mobile cellular networks under the complete sharing policy.
IET Networks, 2018

Call blocking probabilities in a two-link multirate loss system for Poisson traffic.
IET Networks, 2018

Performance modelling of a multirate loss system with batched Poisson arrivals under a probabilistic threshold policy.
IET Networks, 2018

An analytical framework in LEO mobile satellite systems servicing batched Poisson traffic.
IET Commun., 2018

On Call Blocking Probabilities and Resource Utilization in OFDM Wireless Networks.
Proceedings of the 11th International Symposium on Communication Systems, 2018

A Convolution Algorithm for a Multirate Loss System with Poisson Arrivals and a Threshold Call Admission Policy.
Proceedings of the 11th International Symposium on Communication Systems, 2018

A Secure Scheme for Group Communication of Wireless IoT Devices.
Proceedings of the 11th International Symposium on Communication Systems, 2018

2017
State-Dependent Bandwidth Sharing Policies for Wireless Multirate Loss Networks.
IEEE Trans. Wirel. Commun., 2017

Security of wireless sensor network (WSN) in smart grid.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Security requirements modelling for virtualized 5G small cell networks.
Proceedings of the 24th International Conference on Telecommunications, 2017

Toward information-centric software-defined cellular networks.
Proceedings of the 14th International Conference on Telecommunications, 2017

2016
A Probabilistic Threshold-Based Bandwidth Sharing Policy for Wireless Multirate Loss Networks.
IEEE Wirel. Commun. Lett., 2016

Uplink Blocking Probabilities in Priority-Based Cellular CDMA Networks with Finite Source Population.
IEICE Trans. Commun., 2016

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments.
Proceedings of the Information Security Theory and Practice, 2016

System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Security Analysis of Mobile Edge Computing in Virtualized Small Cell Networks.
Proceedings of the Artificial Intelligence Applications and Innovations, 2016

A software-defined architecture for next-generation cellular networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Mediator-assisted multi-source routing in information-centric networks.
Proceedings of the 10th International Symposium on Communication Systems, 2016

Call blocking probabilities for poisson traffic under the multiple fractional channel reservation policy.
Proceedings of the 10th International Symposium on Communication Systems, 2016

2015
Scalability of information centric networking using mediated topology management.
J. Netw. Comput. Appl., 2015

A distributed in-network caching scheme for P2P-like content chunk delivery.
Comput. Networks, 2015

CAINE: a context-aware information-centric network ecosystem.
IEEE Commun. Mag., 2015

Mobility-aware QoS assurance in software-defined radio access networks: An analytical study.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Secure and energy-efficient multicast routing in smart grids.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

An Erlang multirate loss model supporting elastic traffic under the threshold policy.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Performance analysis of CDMA-based networks with interference cancellation, for batched Poisson traffic under the bandwidth reservation policy.
Proceedings of the 13th International Conference on Telecommunications, 2015

Resistance Against Brute-Force Attacks on Stateless Forwarding in Information Centric Networking.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015

2014
Congestion Probabilities in CDMA-Based Networks Supporting Batched Poisson Input Traffic.
Wirel. Pers. Commun., 2014

Decision-making for in-network caching of Peer-to-Peer content chunks - An analytical modelling study.
Proceedings of the 2014 International Conference and Workshop on the Network of the Future, 2014

Quality of service in an information-centric network.
Proceedings of the IEEE Global Communications Conference, 2014

A cache-aware routing scheme for information-centric networks.
Proceedings of the 9th International Symposium on Communication Systems, 2014

Equalization of congestion probabilities in a W-CDMA cell supporting calls of finite sources with interference cancellation.
Proceedings of the 9th International Symposium on Communication Systems, 2014

Selecting Bloom-filter header lengths for secure information centric networking.
Proceedings of the 9th International Symposium on Communication Systems, 2014

Handoff modeling in cellular CDMA with finite sources and state-dependent bandwidth requirements.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

2012
The extended connection-dependent threshold model for call-level performance analysis of multi-rate loss systems under the bandwidth reservation policy.
Int. J. Commun. Syst., 2012

2011
Call-level performance analysis of a W-CDMA cell with finite population and interference cancellation.
Eur. Trans. Telecommun., 2011

2009
Thorough Analysis of Downlink Capacity in a WCDMA Cell.
Proceedings of the Mobile Lightweight Wireless Systems, 2009

Blocking Analysis for Priority Classes in Hybrid WDM-OCDMA Passive Optical Networks.
Proceedings of the Fifth Advanced International Conference on Telecommunications, 2009

2008
Call-Level Performance Modelling of Elastic and Adaptive Service-Classes with Finite Population.
IEICE Trans. Commun., 2008

The Wireless Engset Multi-Rate Loss Model for the Handoff traffic analysis in W-CDMA networks.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Call-Level Analysis of W-CDMA Networks Supporting Elastic Services of Finite Population.
Proceedings of IEEE International Conference on Communications, 2008

On the Handoff-Call Blocking Probability Calculation in W-CDMA Cellular Networks.
Proceedings of the Fourth Advanced International Conference on Telecommunications, 2008

Blocking Analysis in Hybrid TDM-WDM PONs Supporting Elastic Traffic.
Proceedings of the Fourth Advanced International Conference on Telecommunications, 2008

2007
The Wireless Engset Multi-Rate Loss Model for the Call-Level Analysis of W-CDMA Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Call-Level Performance Modelling of Elastic and Adaptive Service-Classes.
Proceedings of IEEE International Conference on Communications, 2007


  Loading...