Search

Your search keyword '"Kolias, Constantinos"' showing total 99 results

Search Constraints

Start Over You searched for: Author "Kolias, Constantinos" Remove constraint Author: "Kolias, Constantinos"
99 results on '"Kolias, Constantinos"'

Search Results

1. Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting

2. Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising

5. Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures

6. Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors

10. StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications.

11. To (US)Be or Not to (US)Be: Discovering Malicious USB Peripherals through Neural Network-Driven Power Analysis.

14. From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks.

18. Signaling-Oriented DoS Attacks in UMTS Networks

24. Cybersecurity

28. Black-Box IoT

37. Cybertrust in the IoT Age

Catalog

Books, media, physical & digital resources