Papers by Konstantinos Psannis
2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2023
The evolution of cyberattacks has been significantly impacted by the rise of Artificial Intellige... more The evolution of cyberattacks has been significantly impacted by the rise of Artificial Intelligence (AI). In particular, AI-driven attacks leverage Machine Learning (ML) and Deep Learning (DL) methods to automate tasks like identifying vulnerabilities, crafting convincing phishing emails, and evading conventional security measures. These cyberattacks can adapt in real time, making them more elusive and challenging to detect. Furthermore, AI has enabled the development of AI-powered malware that can learn and evolve, making it even more dangerous. As AI continues to evolve, both attackers and defenders are engaged in a relentless arms race, with cybersecurity professionals striving to harness AI for threat detection and response while cybercriminals seek to exploit AI’s capabilities for their malicious purposes. This ongoing battle underscores the need for proactive and adaptive cybersecurity strategies to mitigate the evolving threats posed by AI-driven cyberattacks. Based on the aforementioned remarks, it is evident that efficient and adaptable countermeasures are necessary. In this paper, we focus our attention on Cyber Threat Intelligence (CTI) mechanisms. CTI is the process of collecting, analysing, and sharing information about potential cybersecurity threats to help organisations proactively defend against cyberattacks. In particular, after providing an overview of the CTI use cases, a brief analysis of existing solutions follows, highlighting the current trends and directions for future work in this research field.
Bookmarks Related papers MentionsView impact
2022 5th World Symposium on Communication Engineering (WSCE)
Bookmarks Related papers MentionsView impact
2022 5th World Symposium on Communication Engineering (WSCE)
Bookmarks Related papers MentionsView impact
International Journal of Software Science and Computational Intelligence
The migration of the banking system to the cloud seems inevitable in near future like any other i... more The migration of the banking system to the cloud seems inevitable in near future like any other industry. By leveraging cloud technology, the personal and financial data of any customer can be accessed and controlled by third-party service providers. However, in order to maintain confidentiality, this information should be kept in an encrypted format, which has an impact on the usefulness and flexibility of fundamental operations like search. Moreover, in a financial institution, a data owner may want to provide the searching capability to the users from diverse domains. Therefore, to provide such flexibility, a system of multi-authority fine-grained search is introduced where each authority manages a single but entirely disjoint domain of attributes. As a result, the proposed system is more scalable, it can handle a large number of users from diverse domains and manage their credentials effectively. While most of the schemes in the literature lack this feature, and have a performan...
Bookmarks Related papers MentionsView impact
Applied Sciences
Current medical methods still confront numerous limitations and barriers to detect and fight agai... more Current medical methods still confront numerous limitations and barriers to detect and fight against illnesses and disorders. The introduction of emerging technologies in the healthcare industry is anticipated to enable novel medical techniques for an efficient and effective smart healthcare system. Internet of Things (IoT), Wireless Sensor Networks (WSN), Big Data Analytics (BDA), and Cloud Computing (CC) can play a vital role in the instant detection of illnesses, diseases, viruses, or disorders. Complicated techniques such as Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) could provide acceleration in drug and antibiotics discovery. Moreover, the integration of visualization techniques such as Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR) with Tactile Internet (TI), can be applied from the medical staff to provide the most accurate diagnosis and treatment for the patients. A novel system architecture, which combines several futu...
Bookmarks Related papers MentionsView impact
IEEE Internet of Things Magazine
Bookmarks Related papers MentionsView impact
Technological Forecasting and Social Change
Bookmarks Related papers MentionsView impact
IEEE Consumer Electronics Magazine, 2022
Bookmarks Related papers MentionsView impact
International Journal of High Performance Computing and Networking, 2021
Bookmarks Related papers MentionsView impact
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN), 2021
It is common knowledge that nature exhibits nonlinear behavior, generally. As a result, non-linea... more It is common knowledge that nature exhibits nonlinear behavior, generally. As a result, non-linear phenomena play a vital role in the control systems in terms of engineering. That is the main reason for considering teaching nonlinear circuits in science and engineering undergraduate programs. In this paper, we present a well-known system that exhibits chaotic behavior. We quote the state equations and mathematical analysis of the Lorenz system. Afterward, we demonstrate simulation results to study and analyze the dynamic behavior of the overall system. The examples indicate a variety of ways in which chaotic behavior can arise in electronic circuits. Finally, we introduce an Arduino-based implementation of the Lorenz system. The comparison between the simulation and experimental results indicates the chaotic dynamics of the system.
Bookmarks Related papers MentionsView impact
2020 2nd International Conference on Computer Communication and the Internet (ICCCI), 2020
Nowadays, the need for more efficient video compression algorithms is growing, due to the increas... more Nowadays, the need for more efficient video compression algorithms is growing, due to the increasing consumption of video content in higher resolutions. Thus, it is obvious that video compression technologies play a key role in the distribution of video content in broadcasting. In this paper, the video compression comparisons take into account the encoding or decoding time which is needed for each compression standard, in order to provide evidence about their adaptation under real-time streaming conditions. The video test sequences used in our experiments were retrieved from miscellaneous sources and their common characteristic is that they have High or Ultra High Definition resolution. Video codecs' performance was tested by using commercial coding libraries and reference software of the coding standards.
Bookmarks Related papers MentionsView impact
IEEE Communications Standards Magazine, 2021
Wireless sensor networks (WSNs) is a recent revolutionary networking technology that has led to t... more Wireless sensor networks (WSNs) is a recent revolutionary networking technology that has led to the establishment of expandable networks like the Internet of Things and services like smart surveillance using sophisticated tools including IP cameras, drones, and so on. In this article, we present a UAV-based smart surveillance system that can be used in a WSN for data gathering. Moreover, energy harvesting techniques can also be used in parallel to offer energy efficiency and extend network lifetime.
Bookmarks Related papers MentionsView impact
2020 3rd World Symposium on Communication Engineering (WSCE), 2020
Nowadays electricity is undoubtedly one of the most important goods. Over the years, the dependen... more Nowadays electricity is undoubtedly one of the most important goods. Over the years, the dependence of people on electrical devices has sharply increased. The need for continuous use of these devices has created greater demand for electricity as well as more efficient transmission techniques. Environmental energy scavenging, as well as wireless transmission, is an increasing research field during the last years. The use of Radio Frequency (RF) Energy Harvesting (EH) technique contributes to the development of autonomous energy devices and sensors, to reduce the need of supplying them with power by using batteries or the mains. In this paper, the state-of-the-art technologies of radio frequency energy harvesting are discussed and analyzed.
Bookmarks Related papers MentionsView impact
2020 3rd World Symposium on Communication Engineering (WSCE), 2020
Smart technologies integrated in the industry of Hotels is an emerging field in terms of the revo... more Smart technologies integrated in the industry of Hotels is an emerging field in terms of the revolution of industry 4.0. Hotels in the context of providing luxury, specialization, intelligence and easiness to the residents, regarding the hotel's services, are willing to transform their concept into smart hotels by applying the Internet of Things (IoT) technologies to every operation, device, functionality and service and by providing to the residents the convenience of handling everything simply on themselves, through a smart device. However, security features of the IoT applications and privacy for the users are great issues for users and Organizations (residents and the industry of Hotels), due to the General Data Protection Regulation (GDPR).In this paper, we focus on the development of a smart system, than can be applied to any smart building, especially to an intelligent hotel, that supports all smart functionalities, provides the desired convenience to the users, bases on IoT technologies and takes into account security and privacy preconditions indicated by the GDPR.
Bookmarks Related papers MentionsView impact
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN), 2021
In this research work, we investigate the effects of cybercrime and focus on concerns about cyber... more In this research work, we investigate the effects of cybercrime and focus on concerns about cybercrime expansion. Since black-hat hackers are constantly one step ahead of white-hat hackers and exploit new sophisticated hack-tools to intrude to devices and networks to commit cybercrime for different reasons, the utilization of the available emerging technologies can provide better privacy and protection level, while they can be used to combat cybercriminal attacks. This shift to new technologies and methods is regarded to be an urgent necessity today. Therefore, we demonstrate a potential novel security mechanism for Police Authorities, named “Artificial Intelligence ANTi-Attack System” or simply “AIANTAS” that aspires to improve the detection rate of cybercriminals and lead to their faster arrest. This model can be integrated into the other National Security defense mechanisms both in Greece and worldwide.
Bookmarks Related papers MentionsView impact
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN), 2021
The speedy development of immersive technologies and unexpected situations like the COVID-19 pand... more The speedy development of immersive technologies and unexpected situations like the COVID-19 pandemic are expected to boost the application of extended reality (XR) in tourism. Virtualization techniques can create a virtual environment identical to the real one, giving to the user the feeling of actually being there. The aim of haptic systems is to enhance the degree of immersion into a virtual environment by intensifying the skill of physical interaction with people and objects in the distant space. The advancement of cellular networks enables haptic data transmission over high data rate and low latency wireless communication to create ambient haptic experience. The contribution of this research is to describe how XR and haptics are able to reshape tourism industry and present insights for tourism involved parties.
Bookmarks Related papers MentionsView impact
Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing, 2021
Bookmarks Related papers MentionsView impact
2020 3rd World Symposium on Communication Engineering (WSCE), 2020
Nowadays, the need for more efficient video compression algorithms is growing, due to the increas... more Nowadays, the need for more efficient video compression algorithms is growing, due to the increasing consumption of video content in higher resolutions. Thus, it is obvious that video compression technologies play a key role in the distribution of video content in broadcasting. In this paper, a comparative analysis and QoE assessment over the most recent video codecs in terms of video transmission over 5G networks are presented. The video compression comparison takes into account performance metrics considering the bitrate savings versus the image quality, in order to provide evidence about their adaptation under real-time streaming conditions. The video test sequences used in our experiments were retrieved from miscellaneous sources and their common characteristic is that they have High, Full or Ultra High Definition resolution. Video codecs’ performance was tested by using commercial coding libraries and reference software of the coding standards.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Computational Data and Social Networks, 2020
Bookmarks Related papers MentionsView impact
Uploads
Papers by Konstantinos Psannis