default search action
Emmanouil A. Panaousis
Person information
- affiliation: University of Greenwich, School of Computing and Mathematical Sciences, London, UK
- affiliation (former): University of Brighton
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j46]Asimina Vasalou, Laura Benton, Ana Luisa Serta, Andrea Gauthier, Ceylan Besevli, Sarah Turner, Rea Gill, Rachael Payler, Etienne B. Roesch, Kevin McAreavey, Kim Bauters, Weiru Liu, Hsueh-Ju Chen, Dennis Ivory, Manos Panaousis, Georgios Loukas:
Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices. Comput. Secur. 148: 104112 (2025) - 2024
- [j45]Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras, Christos Xenakis:
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. Int. J. Inf. Sec. 23(1): 347-371 (2024) - [i17]Kevin McAreavey, Weiru Liu, Kim Bauters, Dennis Ivory, George Loukas, Manos Panaousis, Hsueh-Ju Chen, Rea Gill, Rachael Payler, Asimina Vasalou:
A qualitative field study on explainable AI for lay users subjected to AI cyberattacks. CoRR abs/2406.07369 (2024) - 2023
- [j44]Maria Tsiodra, Sakshyam Panda, Michail Chronopoulos, Emmanouil Panaousis:
Cyber Risk Assessment and Optimization: A Small Business Case Study. IEEE Access 11: 44467-44481 (2023) - [j43]Blessing Odeleye, George Loukas, Ryan Heartfield, Georgia Sakellari, Emmanouil Panaousis, Fotios Spyridonis:
Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments. Comput. Secur. 124: 102951 (2023) - [j42]Yunxiao Zhang, Pasquale Malacaria, George Loukas, Emmanouil Panaousis:
CROSS: A framework for cyber risk optimisation in smart homes. Comput. Secur. 130: 103250 (2023) - [j41]Stefan Rass, Sandra König, Jasmin Wachter, Víctor Mayoral Vilches, Emmanouil Panaousis:
Game-theoretic APT defense: An experimental study on robotics. Comput. Secur. 132: 103328 (2023) - [j40]Antonia Nisioti, George Loukas, Alexios Mylonas, Emmanouil Panaousis:
Forensics for multi-stage cyber incidents: Survey and future directions. Forensic Sci. Int. Digit. Investig. 44: 301480 (2023) - [j39]Junwei Zhou, Botian Lei, Huile Lang, Emmanouil Panaousis, Kaitai Liang, Jianwen Xiang:
Secure genotype imputation using homomorphic encryption. J. Inf. Secur. Appl. 72: 103386 (2023) - [c38]Sakshyam Panda, Emmanouil Panaousis, George Loukas, Konstantinos Kentrotis:
Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles. ARES 2023: 93:1-93:9 - [c37]Soodeh Atefi, Sakshyam Panda, Emmanouil Panaousis, Aron Laszka:
Principled Data-Driven Decision Support for Cyber-Forensic Investigations. AAAI 2023: 5010-5017 - [i16]Shanto Roy, Emmanouil Panaousis, Cameron Noakes, Aron Laszka, Sakshyam Panda, George Loukas:
SoK: The MITRE ATT&CK Framework in Research and Practice. CoRR abs/2304.07411 (2023) - 2022
- [j38]Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis:
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. IEEE Access 10: 104671-104685 (2022) - [j37]Yi Zhao, Kaitai Liang, Yanqi Zhao, Bo Yang, Yang Ming, Emmanouil Panaousis:
Practical algorithm substitution attack on extractable signatures. Des. Codes Cryptogr. 90(4): 921-937 (2022) - [j36]Antonio Jesús Díaz-Honrubia, Alberto Blázquez-Herranz, Lucía Prieto Santamaría, Ernestina Menasalvas Ruiz, Alejandro Rodríguez González, Gustavo Gonzalez Granadillo, Rodrigo Diaz, Emmanouil Panaousis, Christos Xenakis:
A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool. J. Inf. Secur. Appl. 71: 103350 (2022) - [j35]George Theodorakopoulos, Emmanouil Panaousis, Kaitai Liang, George Loukas:
On-the-Fly Privacy for Location Histograms. IEEE Trans. Dependable Secur. Comput. 19(1): 566-578 (2022) - [c36]Mohamed Ahmed, Sakshyam Panda, Christos Xenakis, Emmanouil Panaousis:
MITRE ATT&CK-driven Cyber Risk Assessment. ARES 2022: 107:1-107:10 - [c35]Yuhang Tian, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang:
FLVoogd: Robust And Privacy Preserving Federated Learning. ACML 2022: 1022-1037 - [c34]Emma Scott, Sakshyam Panda, George Loukas, Emmanouil Panaousis:
Optimising user security recommendations for AI-powered smart-homes. DSC 2022: 1-8 - [i15]Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang:
MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution. CoRR abs/2206.12178 (2022) - [i14]Yuhang Tian, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang:
FLVoogd: Robust And Privacy Preserving Federated Learning. CoRR abs/2207.00428 (2022) - [i13]Soodeh Atefi, Sakshyam Panda, Manos Panaousis, Aron Laszka:
Principled Data-Driven Decision Support for Cyber-Forensic Investigations. CoRR abs/2211.13345 (2022) - 2021
- [j34]Guangquan Xu, Yuyang Zhao, Litao Jiao, Meiqi Feng, Zhong Ji, Emmanouil Panaousis, Si Chen, Xi Zheng:
TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems. IEEE Internet Things J. 8(12): 9559-9567 (2021) - [j33]Sokratis Nifakos, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis, Stefano Bonacina:
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 21(15): 5119 (2021) - [j32]Antonia Nisioti, George Loukas, Stefan Rass, Emmanouil Panaousis:
Game-Theoretic Decision Support for Cyber Forensic Investigations. Sensors 21(16): 5300 (2021) - [j31]Gustavo Gonzalez Granadillo, Sofia-Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, Emmanouil Panaousis:
Automated Cyber and Privacy Risk Management Toolkit. Sensors 21(16): 5493 (2021) - [j30]Ryan Heartfield, George Loukas, Anatolij Bezemskij, Emmanouil Panaousis:
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 16: 1720-1735 (2021) - [j29]Antonia Nisioti, George Loukas, Aron Laszka, Emmanouil Panaousis:
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations. IEEE Trans. Inf. Forensics Secur. 16: 2397-2412 (2021) - [c33]Guangquan Xu, Meiqi Feng, Litao Jiao, Jian Liu, Hong-Ning Dai, Ding Wang, Emmanouil Panaousis, Xi Zheng:
MFF-AMD: Multivariate Feature Fusion for Android Malware Detection. CollaborateCom (1) 2021: 368-385 - [c32]Menghan Pan, Daojing He, Xuru Li, Sammy Chan, Emmanouil Panaousis, Yun Gao:
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments. ISCC 2021: 1-7 - [i12]Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis, Ryan Heartfield:
Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK. CoRR abs/2108.11206 (2021) - [i11]Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis:
Multi-Stage Threat Modelling and Security Monitoring in 5GCN. CoRR abs/2108.11207 (2021) - [i10]Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis:
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. CoRR abs/2111.02364 (2021) - 2020
- [j28]Yuanbo Cui, Fei Gao, Yijie Shi, Wei Yin, Emmanouil Panaousis, Kaitai Liang:
An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation. IEEE Access 8: 99024-99036 (2020) - [j27]Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen:
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. Int. J. Distributed Sens. Networks 16(4) (2020) - [j26]Yuanbo Cui, Fei Gao, Wenmin Li, Yijie Shi, Hua Zhang, Qiaoyan Wen, Emmanouil Panaousis:
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services. Sensors 20(16): 4651 (2020) - [j25]Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Georgios Efstathopoulos, Emmanouil Panaousis:
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid. Sensors 20(18): 5305 (2020) - [j24]Ali Jaddoa, Georgia Sakellari, Emmanouil Panaousis, George Loukas, Panagiotis G. Sarigiannidis:
Dynamic decision support for resource offloading in heterogeneous Internet of Things environments. Simul. Model. Pract. Theory 101: 102019 (2020) - [j23]Vaios Bolgouras, Christoforos Ntantogian, Emmanouil Panaousis, Christos Xenakis:
Distributed Key Management in Microgrids. IEEE Trans. Ind. Informatics 16(3): 2125-2133 (2020) - [j22]Dionisis Kandris, Alex Alexandridis, Tasos Dagiuklas, Emmanouil Panaousis, Dimitrios D. Vergados:
Multiobjective Optimization Algorithms for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2020: 4652801:1-4652801:5 (2020) - [c31]Sakshyam Panda, Emmanouil Panaousis, George Loukas, Christos Laoudias:
Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users. From Lambda Calculus to Cybersecurity Through Program Analysis 2020: 268-291 - [c30]Junwei Zhou, Junjiong Li, Emmanouil Panaousis, Kaitai Liang:
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data. CSCloud/EdgeCom 2020: 160-167 - [c29]Emily Kate Parsons, Emmanouil Panaousis, George Loukas:
How Secure is Home: Assessing Human Susceptibility to IoT Threats. PCI 2020: 64-71 - [c28]Aristeidis Farao, Sakshyam Panda, Sofia-Anna Menesidou, Entso Veliou, Nikolaos Episkopos, George Kalatzantonakis, Farnaz Mohammadi, Nikolaos Georgopoulos, Michael Sirivianos, Nikos Salamanos, Spyros Loizou, Michalis Pingos, John Polley, Andrew Fielder, Emmanouil Panaousis, Christos Xenakis:
SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions. TrustBus 2020: 65-74 - [i9]Sakshyam Panda, Emmanouil Panaousis, George Loukas, Christos Laoudias:
Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users. CoRR abs/2001.03782 (2020)
2010 – 2019
- 2019
- [j21]Zhenhu Ning, Guangquan Xu, Naixue Xiong, Yongli Yang, Changxiang Shen, Emmanouil Panaousis, Hao Wang, Kaitai Liang:
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things. IEEE Access 7: 30112-30125 (2019) - [j20]Kai He, Yijun Mao, Jianting Ning, Kaitai Liang, Xinyi Huang, Emmanouil Panaousis, George Loukas:
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7: 50658-50668 (2019) - [j19]Guangquan Xu, Yao Zhang, Litao Jiao, Emmanouil Panaousis, Kaitai Liang, Hao Wang, Xiaotong Li:
DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost. IEEE Access 7: 174740-174749 (2019) - [j18]George Loukas, Eirini D. Karapistoli, Emmanouil Panaousis, Panagiotis G. Sarigiannidis, Anatolij Bezemskij, Tuan Vuong:
A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks 84: 124-147 (2019) - [j17]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis:
Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks 92 (2019) - [j16]Sakshyam Panda, Daniel W. Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis:
Post-incident audits on cyber insurance discounts. Comput. Secur. 87 (2019) - [j15]Nikolaos Pitropakis, Emmanouil Panaousis, Thanassis Giannetsos, Eleftherios Anastasiadis, George Loukas:
A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34 (2019) - [j14]Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen:
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation. Symmetry 11(2): 272 (2019) - [j13]Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen:
Using Sparse Representation to Detect Anomalies in Complex WSNs. ACM Trans. Intell. Syst. Technol. 10(6): 64:1-64:18 (2019) - [c27]Nadia Boumkheld, Sakshyam Panda, Stefan Rass, Emmanouil Panaousis:
Honeypot Type Selection Games for Smart Grid Networks. GameSec 2019: 85-96 - [c26]Stefan Rass, Sandra König, Emmanouil Panaousis:
Cut-The-Rope: A Game of Stealthy Intrusion. GameSec 2019: 404-416 - [c25]Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Ioannis Giannoulakis, Emmanouil Kafetzakis, Emmanouil Panaousis:
Attacking IEC-60870-5-104 SCADA Systems. SERVICES 2019: 41-46 - [c24]Farnaz Mohammadi, Angeliki Panou, Christoforos Ntantogian, Eirini D. Karapistoli, Emmanouil Panaousis, Christos Xenakis:
CUREX: seCUre and pRivate hEalth data eXchange. WI (Companion) 2019: 263-268 - [i8]Sakshyam Panda, Daniel W. Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis:
Post-Incident Audits on Cyber Insurance Discounts. CoRR abs/1908.04867 (2019) - 2018
- [j12]Michail Chronopoulos, Emmanouil Panaousis, Jens Grossklags:
An Options Approach to Cybersecurity Investment. IEEE Access 6: 12175-12186 (2018) - [j11]Andrew Fielder, Sandra König, Emmanouil Panaousis, Stefan Schauer, Stefan Rass:
Risk Assessment Uncertainties in Cybersecurity Investments. Games 9(2): 34 (2018) - [c23]Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took:
Unsupervised Learning for Trustworthy IoT. FUZZ-IEEE 2018: 1-8 - [c22]Aron Laszka, Emmanouil Panaousis, Jens Grossklags:
Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits. GameSec 2018: 508-520 - [c21]Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis, Emmanouil Panaousis:
Towards the Definition of a Security Incident Response Modelling Language. TrustBus 2018: 198-212 - [c20]Nikolaos Pitropakis, Emmanouil Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis:
An Enhanced Cyber Attack Attribution Framework. TrustBus 2018: 213-228 - [i7]Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took:
Unsupervised Learning for Trustworthy IoT. CoRR abs/1805.10401 (2018) - 2017
- [j10]Emmanouil A. Panaousis, Eirini D. Karapistoli, Hadeer Elsemary, Tansu Alpcan, M. H. R. Khouzani, Anastasios A. Economides:
Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks 56: 28-42 (2017) - [j9]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis, Christos Kalloniatis:
A conceptual model to support security analysis in the internet of things. Comput. Sci. Inf. Syst. 14(2): 557-578 (2017) - [j8]Dionisis Kandris, George Tselikis, Eleftherios Anastasiadis, Emmanouil Panaousis, Tasos Dagiuklas:
COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks. Sensors 17(11): 2502 (2017) - [c19]Vassilios G. Vassilakis, Haralambos Mouratidis, Emmanouil Panaousis, Ioannis D. Moscholios, Michael D. Logothetis:
Security requirements modelling for virtualized 5G small cell networks. ICT 2017: 1-5 - [c18]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil A. Panaousis:
ASTo: A tool for security analysis of IoT systems. SERA 2017: 395-400 - [c17]Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. IEEE Symposium on Security and Privacy Workshops 2017: 179-188 - [c16]Michalis Pavlidis, Haralambos Mouratidis, Emmanouil Panaousis, Nikolaos Argyropoulos:
Selecting Security Mechanisms in Secure Tropos. TrustBus 2017: 99-114 - [i6]Emmanouil Panaousis, Eirini D. Karapistoli, Hadeer Elsemary, Tansu Alpcan, M. H. R. Khouzani, Anastasios A. Economides:
Game theoretic path selection to support security in device-to-device communications. CoRR abs/1711.01447 (2017) - [i5]Andrew Fielder, Sandra König, Emmanouil Panaousis, Stefan Schauer, Stefan Rass:
Uncertainty in Cyber Security Investments. CoRR abs/1712.05893 (2017) - 2016
- [j7]Andrew Fielder, Emmanouil A. Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi:
Decision support approaches for cyber security investment. Decis. Support Syst. 86: 13-23 (2016) - [c15]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis, Christos Kalloniatis:
Apparatus: Reasoning About Security Requirements in the Internet of Things. CAiSE Workshops 2016: 219-230 - [c14]Adeyinka Adedoyin, Stelios Kapetanakis, Miltos Petridis, Emmanouil Panaousis:
Evaluating Case-Based Reasoning Knowledge Discovery in Fraud Detection. ICCBR Workshops 2016: 182-191 - [c13]Vassilios G. Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis:
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. WISTP 2016: 70-84 - [e2]Quanyan Zhu, Tansu Alpcan, Emmanouil A. Panaousis, Milind Tambe, William Casey:
Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings. Lecture Notes in Computer Science 9996, Springer 2016, ISBN 978-3-319-47412-0 [contents] - [i4]Emmanouil A. Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan:
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking. CoRR abs/1601.00167 (2016) - 2015
- [c12]George Rontidis, Emmanouil A. Panaousis, Aron Laszka, Tasos Dagiuklas, Pasquale Malacaria, Tansu Alpcan:
A game-theoretic approach for minimizing security risks in the Internet-of-Things. ICC Workshops 2015: 2639-2644 - [c11]Emmanouil A. Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan:
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking. TrustCom/BigDataSE/ISPA (1) 2015: 1006-1013 - [e1]M. H. R. Khouzani, Emmanouil A. Panaousis, George Theodorakopoulos:
Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings. Lecture Notes in Computer Science 9406, Springer 2015, ISBN 978-3-319-25593-4 [contents] - [i3]Andrew Fielder, Emmanouil A. Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi:
Comparing Decision Support Approaches for Cyber Security Investment. CoRR abs/1502.05532 (2015) - 2014
- [c10]Emmanouil A. Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti:
Secure Message Delivery Games for Device-to-Device Communications. GameSec 2014: 195-215 - [c9]Emmanouil A. Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi:
Cybersecurity Games and Investments: A Decision Support Approach. GameSec 2014: 266-286 - [c8]Andrew Fielder, Emmanouil A. Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi:
Game Theory Meets Information Security Management. SEC 2014: 15-29 - 2013
- [j6]Tipu Arvind Ramrekha, Emmanouil A. Panaousis, Christos Politis:
Standardisation advancements in the area of routing for mobile ad-hoc networks. J. Supercomput. 64(2): 409-434 (2013) - [c7]Eckhard Pfluegel, Emmanouil A. Panaousis, Christos Politis:
A Probabilistic Algorithm for Secret Matrix Share Size Reduction. EW 2013 - [c6]Emmanouil Kafetzakis, Nikolaos V. Boulgouris, Emmanouil Panaousis, Anastasios Kourtis:
Secure Communications for Mobile Verification Platforms. ISWCS 2013: 1-4 - 2012
- [b1]Emmanouil A. Panaousis:
Security for mobile ad-hoc networks. Kingston University, Kingston upon Thames, London, UK, 2012 - [j5]Helena Rifà-Pous, Emmanouil A. Panaousis, Christos Politis:
Recipients' Anonymity in Multihop Ad-Hoc Networks. IEICE Trans. Inf. Syst. 95-D(1): 181-184 (2012) - [j4]Emmanouil A. Panaousis, Christos Politis, Konstantinos Birkos, Christos A. Papageorgiou, Tasos Dagiuklas:
Security model for emergency real-time communications in autonomous networks. Inf. Syst. Frontiers 14(3): 541-553 (2012) - [j3]Grant P. Millar, Emmanouil A. Panaousis, Christos Politis:
Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions. J. Networks 7(2): 288-299 (2012) - [c5]Emmanouil A. Panaousis, Tipu Arvind Ramrekha, Christos Politis, Grant P. Millar:
Secure decentralised ubiquitous networking for emergency communications. TEMU 2012: 233-238 - 2010
- [j2]Levon Nazaryan, Emmanouil A. Panaousis, Christos Politis:
End-to-End Security Protection. IEEE Veh. Technol. Mag. 5(1): 85-90 (2010) - [c4]Mahdi Pirmoradian, Christos Politis, Emmanouil A. Panaousis:
An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas. MOBILIGHT 2010: 496-505 - [i2]Emmanouil A. Panaousis, Tipu Arvind Ramrekha, Grant P. Millar, Christos Politis:
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks. CoRR abs/1005.1740 (2010) - [i1]Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu Arvind Ramrekha, Christos Politis:
A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks. CoRR abs/1010.4986 (2010)
2000 – 2009
- 2009
- [j1]Emmanouil A. Panaousis, Christos Politis, George C. Polyzos:
Maximizing network throughput. IEEE Veh. Technol. Mag. 4(3): 33-39 (2009) - [c3]Emmanouil A. Panaousis, Christos Politis:
A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks. LCN 2009: 985-992 - [c2]Emmanouil A. Panaousis, Levon Nazaryan, Christos Politis:
Securing AODV against wormhole attacks in emergency MANET multimedia communications. MobiMedia 2009 - 2008
- [c1]Emmanuel A. Panaousis, Pantelis A. Frangoudis, Christopher N. Ververidis, George C. Polyzos:
Optimizing the channel load reporting process in IEEE 802.11k-enabled WLANs. LANMAN 2008: 37-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint