Publications
Conferences & Workshop Publications
Authors | Title | Published in | Dowload |
---|---|---|---|
Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis. The Million Dollar Handshake | Secure and Attested Communications in the Cloud | Proceedings of the 2020 IEEE CLOUD 2020. October 2020 | |
Giannis Giakoumakis, Eva Papadogiannaki, Giorgos Vasiliadis, Sotiris Ioannidis. | Pythia: Scheduling of Concurrent Network Packet Processing Applications on Heterogeneous Devices. | Proceedings of the 6th IEEE International Conference on Network Softwarization (NetSoft). July 2020, Ghent, Belgium. | |
Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis. | An Enclave Assisted Snapshot-based Kernel Integrity Monitor | Proceedings of the 3rd International Workshop on Edge Systems, Analytics and Networking (EdgeSys). April 2020, Heraklion, Greece | |
Dimitris Deyannis, Eva Papadogiannaki, George Kalivianakis, Giorgos Vasiliadis, and Sotiris Ioannidis. | TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud. | Proceedings of the 10th ACM Conference on Data Application Security and Privacy (CODASPY). March 2020, New Orleans, LA, USA. | |
J. Stanulovic, N. Mitton and I. Mezei | “Robot Task Allocation based on Greedy-Face-Greedy Algorithm,” | Proceedings of the 27th Telecommunications Forum (TELFOR), Belgrade, Serbia, 2019 | |
M-D. Nguyen, S. Bardin, R. Bonichon, R.Groz, M. Lemerre | Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities | Proceedings Research in Attacks, Intrusions and Defenses, RAID 2020 | |
M-D. Nguyen, S. Bardin, M. Lemerre, R. Bonichon, R.Groz | About directed fuzzing and Use-after-free: how to find complex & silent bugs? | Breefings of Black Hat USA 2020 | |
M. Lukic, S. Sobot, I. Mezei, D. Vukobratovic and D. Danilovic | In-depth Real-World Evaluation of NB-IoT Module Energy Consumption, | International Conference on Smart Internet of Things (SmartIoT), Beijing, China, 2020 | Read Here |
Rafail Tsirbas, Giorgos Vasiliadis, Sotiris Ioannidis | The Best of Many Worlds: Scheduling Machine Learning Inference on CPU-GPU Integrated Architectures | 2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW 2022 | |
N. Milosevic, D. Jakovetic, S. Skrbic, M. Savic, D. Stamenkovic, J. Mascolo, D. Masera | BACS: A Comprehensive Tool For Deep Learning-Based Anomaly Detection In Edge-Fog-Cloud Systems | 30th European Signal Processing Conference, EUSIPCO 2022 | |
Dejan Vukobratovic, Milan Lukic, Ivan Mezei, Dragana Bajovic, Dragan Danilovic, Milos Savic, Zarko Bodroski, Srdjan Skrbic, Dusan Jakovetic | Edge Machine Learning In 3GPP NB-IoT: Architecture, Applications And Demonstration | 30th European Signal Processing Conference, EUSIPCO 2022 | |
A. Cabrera, A. Escobar-Molero, E. Castillo, J. A. Alvarez Bermejo, D. Morales, L. Parrilla | Integration of Hardware Security Modules in Blockchain Networks. | 2022 International Conference Computational and Mathematical Methods in Science and Engineering and High Performance Computing. |
Journal Publications
Authors | Title | Download Link / Type |
---|---|---|
Jaddoa, A., Sakellari, G., Panaousis, E., Loukas, G., & Sarigiannidis, P. G. | Dynamic decision support for resource offloading in heterogeneous internet of things environments | Download Here |
D. Jakovetic, D. Bajovic, J. Xavier, J. M. F. Moura | Primal–Dual Methods for Large-Scale and Distributed Convex Optimization and Data Analytics | Download here |
Chritou, G, Vasiliadis, G, Papaefsthathiou, V., Papadogiannakis, A., Ioannidis, S. | On Architectural Support for Instruction Set Randomization | Download here |
Christos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis, Andreas Pitsillides, Ian F. Akyildiz, | Next Generation Connected Materials for Intelligent Energy Propagation in Multiphysics Systems | Download here |
M. Papoutsakis, K. Fysarakis, G. Spanoudakis, S. Ioannidis, and K. Koloutsou | Towards a Collection of Security and Privacy Patterns | Get Here |
M. Savic, M. Lukic, D. Danilovic, Z. Bodroski, D. Bajović, I. Mezei, D. Vukobratovic, S. Skrbic, D. Jakovetić | Deep Learning Anomaly Detection for Cellular IoT With Applications in Smart Logistics | Read here |
.Eva Papadogiannaki, Sotiris Ioannidis | Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware | Download Here |
Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis | Andromeda: Enabling Secure Enclaves for the Android Ecosystem | Download Here |
Eva Papadogiannaki , Sotiris Ioannidis | A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures | Download here |
A. Cabrera, A. Escobar-Molero, E. Castillo, J. A. Alvarez Bermejo, D. Morales, L. Parrilla | Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks | |
C4IIoT consortium | Cybersecurity 4.0 Industrial Internet of Things: Architecture, Models and Lessons Learned |