Skip navigation

Items where Greenwich Author is "Mantas, Georgios"

Items where Greenwich Author is "Mantas, Georgios"

Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: 5G Communications, C-RAN, Security, Intrusion Attacks, Denial of Service Attacks | 5G communications, homomorphic messagevauthentication codes (MACs), intrusion detection and prevention, mobile small cells, pollution attacks, random linear network coding | 5G communications, security | 5G, beyond 5G, decentralized systems, device-to-device communication, key management, mobile small cells, security, small cells, wireless ad hoc networks | 5G, mobile small cells, network coding, pollution attacks, intrusion detection, location-aware prevention | 5G, privacy-preservation, user authentication, smart city applications | 5G, security, privacy, key management, mobile small cells, network coding, D2D communications | 6G, 6G vision, massive IoT applications, security threats | 6G, mobile small cells, security | Adaptive user authentication, border control security, mobile passenger ID devices, risk-based user authentication | Android, intrusion detection system, security, 5G, machine learning, malware detection, host-based IDS, statistical anomaly detection. | Byzantine attack, cyber-physical systems, eavesdropping attack, entropy attack, network coding security, stateless network coding, state-aware network coding, wireless sensor networks | Cybersecurity attacks; Medical IoT devices; Smart city healthcare services | Denial of service attacks, application-layer attacks, taxonomy | European telecommunications standards institute (ETSI)/parlay architecture, personalized healthcare services, profiling mechanisms, security mechanisms, sensor networks mechanisms | Industrial IoT, M2M Communications, Lightweight authentication, Security, Sensors | Industry 4.0, Cyber-Physical Production Systems, Security, Machine Learning, Network Segregation, IIoT, MTC, Traffic Classification | Industry 4.0, Semiconductor Supply Chain, Network Secure Com-munications, SSL/TLS, OAuth2 | Industry 4.0, machine learning, network-based intrusion detection | Industry 4.0; cybersecurity; intrusion detection system (IDS); DDoS attack detection; machine learning; SCADA; industrial control system (ICS); cyber-physical system (CPS) | Internet of Medical Things (IoMT); intrusion detection system (IDS); machine learning algorithms; anomaly-based intrusion detection; IoMT AIDS implementation | Internet of Medical Things, Key Management, Patient Monitoring, Privacy, Security | Internet of Medical Things; blockchain; hyperledger fabric; healthcare | Internet of Things; Internet of Medical Things; hyperledger fabric; blockchain | IoMT networks; anomaly-based intrusion detection; blockchain; hyperledger fabric | IoMT; blockchain; authentication; authorization; anomaly-based IDS; healthcare | IoMT; security; blockchain; PBFT | IoT cybersecurity, anomaly-based intrusion detection, dataset generation, record selection | IoT security; blockchain; hyperledger fabric; healthcare | IoT, industrial IoT, benign datasets generation, malicious datasets generation, Cooja simulator, Contiki OS, anomaly-based intrusion detection | IoT/IoMT; IoT/IoMT Testbed; Intrusion Detection System (IDS); Eclipse Hono; Eclipse Ditto; Influxdb; Grafana; Suricata | IoT; security; blockchain; healthcare; Hyperledger | Mobile Intrusion Detection System, Android, Security, 5G Communications, Machine Learning, Malware Detection, Host-based IDS | Mobile Small Cells, 5G Communications, Security, Network Coding, D2D Communications | Mobile communication, Protocols, Browsers, Authentication, Servers, Mobile handsets, Authorization | Network coding, Random linear network coding, Tag pollution attacks, Homomorphic MACs | Network coding, Security, Data pollution attack, Tag pollution attack, Wireless networks | Network coding, homomorphic message authentication code, data pollution attack, tag pollution attack | PKI, healthcare network, trust list, identity certificates, attribute certificates | Privacy, Authentication, Pseudonyms, Vehicular, Intelligent Transportation Systems | Security, Protocols, Industries, Safety, Law, Quality of service | Smart Grid, Smart Home, AMI, IoT, M2M, Security, Intrusion Detection, Price Integrity, Load Alteration | Software defined network; Body area networks; Ubiquitous healthcare service delivery | TLS, MITM attack, authentication, impersonation, HTTPS, Industry 4.0 Supply Chain | Ubiquitous healthcare; Cloud computing; Profile management system; Smart card technology | User Privacy, OAuth 2.0, Smart City, e-Health, Mobile | WLAN, authentication, intelligent, protocol, supplicant, authenticator, authentication server | adaptive user authentication, risk-based user authentication, risk estimation, novelty detection, outlier detection, mobile passenger ID devices, prototype development | android, security and privacy, intrusion detection and prevention system (IDPS), anomalydetection, malware detection, behavior analysis, machine learning, prototype development | beyond 5G security, decentralized system, D2D communication, key management, mobile small cell | beyond 5G, decentralized systems, D2D communications, key management, mobile small cells, network, coding, security, small cells, wireless ad hoc networks. | beyond 5G, mobile small cells, security, public Key cryptography | border control security, mobile passenger ID devices, user authentication and authorization | broadband communications, networks, systems | continuous user authentication; risk-based user authentication; quantitative risk estimation; mobile devices; security vs. usability | cryptography, information leakage, key generation, physical layer security, security analysis | cryptography; data confidentiality; information security; Internet of Things; physical-layer security | cryptography; information leakage; physical layer security; standardization | cybersecurity, semiconductor, supply chain | data confidentiality, Internet of Things, Physical Layer Encryption, stream cipher, Grain-128PLE | data confidentiality; Internet of Things; Physical Layer Encryption; Physical Layer Security; stream cipher | data preprocessing; machine learning; data mining; classification algorithms; psychosomatic health; depression | eavesdropping; Internet of Things; intrusion; malicious nodes detection; physical layer authentication; physical layer key establishment; physical layer security; radio-frequency fingerprinting | ehealth, tele-monitoring, smart home, security, integrity mechanism | electronic passport, ICAO, LDS, PKI, BAC, EAC, SAC, authorization, authentication, verification, CSCA, CVCA, DVCA, NewP@ss | emergency communications security, long-term evolution (LTE), migration roadmaps, public protection and disaster relief (PPDR), SALUS project, terrestrial trunked radio (TETRA), TETRAPOL technology, Wi-Fi networks, wireless local area networks (WLANs), wireless technologies | encryption algorithm, polymorphism, quantum computations, CNOT and SWAP quantum gates | hybrid intrusion detection system, android-based PPDR terminals, mobile devices, public protection and disaster relief, machine learning techniques, malware signatures | internet of medical things (IoMT); intrusion detection system (IDS); machine learning algorithms; anomaly-based intrusion detection; IoT datasets | key escrow, key agreement, key recovery, as hoc networks | mathematical analysis, receive antennas, predefined authentication signals, wireless communications, mobile MIMO systems, physical-layer entity authentication scheme | mobile device security; risk-based adaptive user authentication; dataset generation; record selection | mobile user authentication; benefits of behavioral biometrics; limitations of behavioral biometrics | network coding, HMAC, data pollution attack, tag pollution attack | network coding, pollution attacks, intrusion detection, location-aware prevention, effi-ciency, 5G | network coding, pollution attacks, mobile small cells | network coding, security, homomorphic message authentication code, data pollution attack, tag pollution attack | network coding; pollution attacks; IDPS; locating attacks; 5G | novelty detection; risk-based user authentication; behavioral biometric-based user authentication; mobile devices | outlier detection; behavioral biometric-based user authentication; risk-based user authentication; mobile devices | personalization, trust management, ubiquitous healthcare | personalized healthcare services, context-awareness, user profiles, ubiquitous technology | privacy preservation, authentication, pseudonimity smart cities, cloud computing | privacy-preserving, authentication, pseudonym-based signatures, OAuth 2.0, Smart City | privacy-preserving, mobile applications, bilinear pairings | privacy-preserving, signature scheme, pseudonymity, crowdsensing, Smart Cities | profile, trust management, ubiquitous healthcare | random linear network coding (RLNC), homomorphic message authentication code (HMAC), pollution detection, tag pollution | risk-based user authentication, adaptive user authentication, mobile passenger ID devices, border control security | risk-based user authentication, risk estimation, mobile passenger ID devices, border control security | risk-based user authentication; risk score estimation; behavioral biometrics-based user authentication; mobile devices | secure XOR network coding, pollution attacks, MAC-based scheme, key management, m-Health, WBANs, remote patient monitoring | secure network coding, homomorphic MAC, random linear network coding, data pollution attacks, tag pollution attacks | security threats; internet of medical things; edge networks | security, smart home | security, ultra-dense networks, mobile small cells, 6G, network coding | security; cryptography; vehicle dynamics; spread spectrum communication; servers; intelligent transportation systems; smart cities | smart cities; authentication; privacy; protocols; public key; cloud computing; costs | smart city security, denial of service attacks, security modeling, queueing theory | ubiquitous healthcare, contex-awareness, extended framework, security mechanisms, sensor networks mechanisms | ubiquitous healthcare, group profile management | ubiquitous healthcare, group profile, analytic hierarchy process | ubiquitous healthcare, healthcare profile management system, smart cards | ubiquitous healthcare, personalized services, NGN | ubiquitous healthcare, profile management, smart card technology
Number of items: 105.

5G Communications, C-RAN, Security, Intrusion Attacks, Denial of Service Attacks

Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2016) Security challenges for cloud radio access networks. In: Huq, Kazi Mohammed Saidul and Rodriguez, Jonathan, (eds.) Backhauling/Fronthauling for Future Wireless Systems. Wiley-Blackwell, pp. 195-209. ISBN 978-1119170341 (doi:10.1002/9781119170402.ch9)

5G communications, homomorphic messagevauthentication codes (MACs), intrusion detection and prevention, mobile small cells, pollution attacks, random linear network coding

Parsamehr, Reza ORCID logoORCID: https://orcid.org/0000-0002-3461-433X, Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Radwan, Ayman ORCID logoORCID: https://orcid.org/0000-0003-1935-6077, Mumtaz, Shahid ORCID logoORCID: https://orcid.org/0000-0001-6364-6149, Rodriguez, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955 and Martinez-Ortega, Jose-Fernan ORCID logoORCID: https://orcid.org/0000-0002-7635-4564 (2019) A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Transactions on Computational Social Systems, 6 (6). pp. 1467-1477. ISSN 2373-7476 (Print), 2329-924X (Online) (doi:10.1109/TCSS.2019.2949153)

5G communications, security

Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Komninos, Nikos, Rodriguez, Jonathan, Logota, Evariste and Marques, Hugo (2015) Security for 5G Communications. In: Rodriguez, Jonathan, (ed.) Fundamentals of 5G Mobile Networks. John Wiley and Sons - Wiley Telecom, Southern Gave, Chichester, West Sussex, UK, pp. 207-220. ISBN 9781118867525 (doi:10.1002/9781118867464.ch9)

5G, beyond 5G, decentralized systems, device-to-device communication, key management, mobile small cells, security, small cells, wireless ad hoc networks

De Ree, Marcus ORCID logoORCID: https://orcid.org/0000-0002-7453-4019, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Radwan, Ayman, Mumtaz, Shahid, Rodriguez, Jonathan and Otung, Ifiok E. (2019) Key management for beyond 5G mobile small cells: a survey. IEEE Access, 7. pp. 59200-59236. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2914359)

5G, mobile small cells, network coding, pollution attacks, intrusion detection, location-aware prevention

Parsamehr, Reza ORCID logoORCID: https://orcid.org/0000-0002-3461-433X, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955 and Martinez-Ortega, Jose-Fernan ORCID logoORCID: https://orcid.org/0000-0002-7635-4564 (2020) On the performance analysis of IDLP and SpaceMac for network coding-enabled mobile small cells. IEEE Communications Letters, 25 (2). pp. 407-411. ISSN 1558-2558 (Print), 1089-7798 (Online) (doi:10.1109/LCOMM.2020.3027972)

5G, privacy-preservation, user authentication, smart city applications

Papaioannou, Maria, Ribeiro, Jose C, Monteiro, Valdemar, Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2021) A privacy-preserving user authentication mechanism for smart city mobile apps. In: 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 978-1665417792 ; 978-1665417808 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD52502.2021.9617809)

5G, security, privacy, key management, mobile small cells, network coding, D2D communications

de Ree, Marcus, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Radwan, Ayman, Rodriguez, Jonathan and Otung, Ifiok (2018) Key management for secure network coding-enabled mobile small cells. In: Broadband Communications, Networks, and Systems. 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering . Springer, pp. 327-336. ISBN 978-3030051945 ISSN 1867-822X (Online) (doi:10.1007/978-3-030-05195-2_32)

6G, 6G vision, massive IoT applications, security threats

Papaioannou, Maria, Mantas, Georgios and Rodriguez, Jonathan (2024) An overview of security and privacy threats for massive IoT applications in the 6G era. In: 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). Institute of Electrical and Electronics Engineers (IEEE). (In Press)

6G, mobile small cells, security

Rodriguez, Jonathan, Koudouridis, Georgios P., Gelabert, Xavier, Tayyab, Muhammad, Bassoli, Riccardo, Fitzek, Frank H. P., Torre, Roberto, Abd-Alhameed, Raed, Sajedin, Maryam, Elfergani, Issa, Irum, Sarah, Schulte, Gerrit, Diogo, Pedro, Marzouk, Fatma, De Ree, Marcus, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Politis, Ilias (2021) Secure virtual mobile small cells: a stepping stone toward 6G. IEEE Communications Standards Magazine, 5 (2). pp. 28-36. ISSN 2471-2825 (doi:10.1109/MCOMSTD.001.2000019)

Adaptive user authentication, border control security, mobile passenger ID devices, risk-based user authentication

Papaioannou, Maria ORCID logoORCID: https://orcid.org/0000-0003-3830-7190, Zachos, Georgios ORCID logoORCID: https://orcid.org/0000-0001-9130-4605, Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodrigue, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955 (2022) Toward a secure and usable user authentication mechanism for mobile passenger ID devices for land/sea border control. IEEE Access, 10. pp. 38832-38849. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2022.3164245)

Android, intrusion detection system, security, 5G, machine learning, malware detection, host-based IDS, statistical anomaly detection.

Ribeiro, José ORCID logoORCID: https://orcid.org/0000-0002-6526-7334, Saghezchi, Firooz B., Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan, Shepherd, Simon J. and Abd-Alhameed, Raed A. (2020) An autonomous host-based intrusion detection system for Android mobile devices. Mobile Networks and Applications, 25 (1). pp. 164-172. ISSN 1383-469X (Print), 1572-8153 (Online) (doi:10.1007/s11036-019-01220-y)

Byzantine attack, cyber-physical systems, eavesdropping attack, entropy attack, network coding security, stateless network coding, state-aware network coding, wireless sensor networks

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Yang, Du, Nascimento, Alberto, Rodriguez, Jonathan and Neves, Jose Carlos (2015) Towards secure network coding-enabled wireless sensor networks in cyber-physical systems. In: Rawat, Danda B., Rodrigues, Joel J.P.C. and Stojmenovic, Ivan, (eds.) Cyber-Physical Systems: From Theory to Practice. CRC Press, pp. 395-414. ISBN 978-1482263329

Cybersecurity attacks; Medical IoT devices; Smart city healthcare services

Karageorgou, M, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Rodriguez, J and Lymberopoulos, D (2020) Cybersecurity Attacks on Medical IoT Devices for Smart City Healthcare Services. In: AI-Turjman, Fadi and Imran, Muhammad, (eds.) IOT Technologies in Smart-Cities: From Sensors to Big Data, Security and Trust. Institution of Engineering & Technology, pp. 171-187. ISBN 9781785618697 (doi:10.1049/PBCE128E)

Denial of service attacks, application-layer attacks, taxonomy

Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Stakhanova, Natalia, Gonzalez, Hugo, Jazi, Hossein Hadian and Ghorbani, Ali A. (2015) Application-layer denial of service attacks: taxonomy and survey. International Journal of Information and Computer Security, 7 (2/3/4). pp. 216-239. ISSN 1744-1765 (Print), 1744-1773 (Online) (doi:10.1504/IJICS.2015.073028)

European telecommunications standards institute (ETSI)/parlay architecture, personalized healthcare services, profiling mechanisms, security mechanisms, sensor networks mechanisms

Fengou, Maria-Anna, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Lymberopoulos, Dimitrios, Komninos, Nikos, Fengos, Spyros and Lazarou, Nikolaos (2012) A new framework architecture for next generation e-health services. IEEE Journal of Biomedical and Health Informatics, 17 (1). pp. 9-18. ISSN 2168-2194 (Print), 2168-2208 (Online) (doi:10.1109/TITB.2012.2224876)

Industrial IoT, M2M Communications, Lightweight authentication, Security, Sensors

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Matischek, Rainer, Saghezchi, Firooz B., Rodriguez, Jonathan, Bicaku, Ani, Maksuti, Silia, Tauber, Markus, Schmittner, Christoph and Bastos, Joaquim (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet of Things. pp. 1-8. ISSN 2327-4662 (doi:10.1109/JIOT.2017.2737630)

Industry 4.0, Cyber-Physical Production Systems, Security, Machine Learning, Network Segregation, IIoT, MTC, Traffic Classification

Saghezchi, Firooz B., Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Ribeiro, José, Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Alizadeh, Hassan, Bastos, Joaquim and Rodriguez, Jonathan (2018) Machine Learning to Automate Network Segregation for Enhanced Security in Industry 4.0. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (263). Springer, Cham, Switzerland, pp. 149-158. ISBN 978-3030051945 ISSN 1867-8211 (doi:10.1007/978-3-030-05195-2_15)

Industry 4.0, Semiconductor Supply Chain, Network Secure Com-munications, SSL/TLS, OAuth2

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Barcelos, Mariana, Saghezchi, Firooz B., Sucasas, Victor, Bastos, Joaquim and Rodriguez, Jonathan (2018) Security framework for the semiconductor supply chain environment. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (263). Springer, Cham, Switzerland, pp. 159-168. ISBN 978-303005194-5 ISSN 1867-8211 (doi:10.1007/978-3-030-05195-2_16)

Industry 4.0, machine learning, network-based intrusion detection

Saghezchi, Firooz, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Bastos, Joaquim and Rodriguez, Jonathan (2019) Machine learning for network-based intrusion detection in industry 4.0. In: 19th European Advanced Process Control and Manufacturing Conference (apc|m), April 08-10, 2019, Villach, AUSTRIA. (Unpublished)

Industry 4.0; cybersecurity; intrusion detection system (IDS); DDoS attack detection; machine learning; SCADA; industrial control system (ICS); cyber-physical system (CPS)

Saghezchi, Firooz B., Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Violas, Manuel A., de Oliveira Duarte, A. Manuel and Rodriguez, Jonathan (2022) Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics, 11 (4):602. ISSN 2079-9292 (Online) (doi:10.3390/electronics11040602)

Internet of Medical Things (IoMT); intrusion detection system (IDS); machine learning algorithms; anomaly-based intrusion detection; IoMT AIDS implementation

Zachos, Georgios, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Porfyrakis, Kyriakos ORCID logoORCID: https://orcid.org/0000-0003-1364-0261, Ribeiro, Jose C. and Rodriguez, Jonathan (2022) Prototyping an anomaly-based intrusion detection system for Internet of Medical Things Networks. In: 2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 02-03 November 2022. Paris, France. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 179-183. ISBN 978-1665461290; 978-1665461306 ISSN 2378-4873 (Print), 2378-4865 (Online) (doi:10.1109/CAMAD55695.2022.9966912)

Internet of Medical Things, Key Management, Patient Monitoring, Privacy, Security

De Ree, Marcus, Vizar, Damian, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Bastos, Joaquim, Kassapoglou-Faist, Corinne and Rodriguez, Jonathan (2021) A key management framework to secure IoMT-enabled healthcare systems. In: 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 25-27 Oct 2021. Port, Portugal. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-6. ISBN 978-1665417792 ; 978-1665417808 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD52502.2021.9617796)

Internet of Medical Things; blockchain; hyperledger fabric; healthcare

Pelekoudas-Oikonomou, Filippos, Ribeiro, José C., Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 and Gonzalez, Jonathan (2023) Prototyping a hyperledger fabric-based security architecture for IoMT-based health monitoring systems. Future Internet, 15 (9):308. pp. 1-22. ISSN 1999-5903 (Online) (doi:10.3390/fi15090308)

Internet of Things; Internet of Medical Things; hyperledger fabric; blockchain

Pelekoudas-Oikonomou, Filippos, Ribeiro, Jose, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Bashashi, Firooz, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 and Gonzalez, Jonathan (2023) A tutorial on the implementation of a hyperledger fabric-based security architecture for IoMT. In: 2023 IFIP Networking Conference (IFIP Networking). IEEE, Laxenburg, Austria. ISBN 979-8350339383 ISSN 1861-2288 (Online) (doi:10.23919/IFIPNetworking57963.2023.10186443)

IoMT networks; anomaly-based intrusion detection; blockchain; hyperledger fabric

Zachos, Georgios, Pelekoudas-Oikonomou, Filippos, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Porfyrakis, Kyriakos ORCID logoORCID: https://orcid.org/0000-0003-1364-0261, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 and Rodriguez, Jonathan (2023) Design of a blockchain-based Anomaly-based Intrusion Detection System (AIDS) for IoMT networks. In: 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall) 10th - 13th Oct. 2023. Hong Kong. IEEE eXpress Conference Publishing . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New York, p. 34. ISBN 979-8350329285; 979-8350329278 ISSN 2577-2465 (doi:10.1109/VTC2023-Fall60731.2023)

IoMT; blockchain; authentication; authorization; anomaly-based IDS; healthcare

Pelekoudas-Oikonomou, Filippos, Zachos, Georgios, Papaioannou, Maria, de Ree, Marcus, Ribeiro, José C., Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2022) Blockchain-based security mechanisms for IoMT Edge networks in IoMT-based healthcare monitoring systems. Sensors, 22 (7):2449. ISSN 1424-8220 (Online) (doi:10.3390/s22072449)

IoMT; security; blockchain; PBFT

Pelekoudas-Oikonomou, Filippos, Zachos, Georgios, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Ribeiro, Jose, Bastos, Joaquim Manuel C.S. and Rodriguez, Jonathan (2022) A scalable approach of practical Byzantine fault tolerance algorithms for IoMT blockchains. In: 2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom). 5-8 Sept. 2022. Athens, Greece. IEEE Xplore (992873). Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 124-129. ISBN 978-1665498265; 978-1665498258 (doi:10.1109/MeditCom55741.2022.9928737)

IoT cybersecurity, anomaly-based intrusion detection, dataset generation, record selection

Zachos, Georgios, Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Kyriakos, Porfyrakis ORCID logoORCID: https://orcid.org/0000-0003-1364-0261, Jose, Ribeiro and Jonathan, Rodriguez (2021) Generating IoT Edge Network Datasets based on the TON_IoT telemetry dataset. In: 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). Porto, Portugal 25-27 Oct. 2021. IEEExplore - CFP21CAM-ART (Xplore) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-6. ISBN 978-1-6654-1779-2 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD52502.2021.9617799)

IoT security; blockchain; hyperledger fabric; healthcare

Oikonomou, Filippos Pelekoudas, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Cox, Phil, Bashashi, Firooz, Gil-Castineira, Felipe and Gonzalez, Jonathan (2021) A blockchain-based architecture for secure IoT-based health monitoring systems. In: 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 25-27 Oct. 2021. Porto, Portugal. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-6. ISBN 978-1665417792 ; 978-1665417808 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD52502.2021.9617803)

IoT, industrial IoT, benign datasets generation, malicious datasets generation, Cooja simulator, Contiki OS, anomaly-based intrusion detection

Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Ribeiro, José C., Papaioannou, Maria, Zachos, Georgios, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2021) Generating datasets for anomaly-based intrusion detection systems in IoT and industrial IoT networks. Sensors, 21 (4):1528. ISSN 1424-8220 (Online) (doi:10.3390/s21041528)

IoT/IoMT; IoT/IoMT Testbed; Intrusion Detection System (IDS); Eclipse Hono; Eclipse Ditto; Influxdb; Grafana; Suricata

Zachos, Georgios, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Porfyrakis, Kyriakos ORCID logoORCID: https://orcid.org/0000-0003-1364-0261, Bastos, Joaquim and Rodriguez, Jonathan (2023) An IoT/IoMT security testbed for anomaly-based intrusion detection systems. In: International Federation for Information Processing (IFIP) Networking 2023 Conference. IFIP Networking 2023: Sec4IoT (Security for IoT Networks and Devices in 6G) Barcelona, Spain, June 12th - 15th 2023. IEEE, Laxenburg, Austria. ISBN 979-8350339383 ISSN 1861-2288 (Online) (doi:10.23919/IFIPNetworking57963.2023.10186428)

IoT; security; blockchain; healthcare; Hyperledger

Oikonomou, Filippos Pelekoudas, Ribeiro, Jose, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Bastos, Joaquim Manuel C.S. and Rodriguez, Jonathan (2021) A Hyperledger fabric-based blockchain architecture to secure IoT-based health monitoring systems. In: 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom). 7-10 Sept. 2021. Athens, Greece. IEEE Xplore (964743). Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 186-190. ISBN 978-1665445054 ; 978-1665445061 (doi:10.1109/MeditCom49071.2021.9647521)

Mobile Intrusion Detection System, Android, Security, 5G Communications, Machine Learning, Malware Detection, Host-based IDS

Ribeiro, José, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Saghezchi, Firooz B., Rodriguez, Jonathan, Shepherd, Simon J. and Abd-Alhameed, Raed A. (2018) Towards an autonomous host-based intrusion detection system for android mobile devices. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (263). Springer, Cham, Switzerland, pp. 139-148. ISBN 978-3030-051945 ISSN 1867-8211 (doi:10.1007/978-3-030-05195-2_14)

Mobile Small Cells, 5G Communications, Security, Network Coding, D2D Communications

Parsamehr, Reza, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Radwan, Ayman, Rodriguez, Jonathan and Martínez, José-Fernán (2018) Security threats in network coding-enabled mobile small cells. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (263). Springer, Cham, Switzerland, pp. 337-346. ISBN 978-3030-051945 ISSN 1867-8211 (doi:10.1007/978-3-030-05195-2_33)

Mobile communication, Protocols, Browsers, Authentication, Servers, Mobile handsets, Authorization

Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Radwan, Ayman and Rodriguez, Jonathan (2017) A Lightweight Privacy-Preserving OAuth2-Based Protocol for Smart City Mobile Apps. In: 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, pp. 1-6. ISBN 978-1509024834 (doi:10.1109/GLOCOMW.2016.7848816)

Network coding, Random linear network coding, Tag pollution attacks, Homomorphic MACs

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2016) An efficient null space-based Homomorphic MAC scheme against tag pollution attacks in RLNC. IEEE Communications Letters, 20 (5). pp. 918-921. ISSN 1089-7798 (doi:10.1109/LCOMM.2016.2547420)

Network coding, Security, Data pollution attack, Tag pollution attack, Wireless networks

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan and Neves, José Carlos (2016) An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. International Journal of Information Security, 16 (6). pp. 627-639. ISSN 1615-5262 (Print), 1615-5270 (Online) (doi:10.1007/s10207-016-0351-z)

Network coding, homomorphic message authentication code, data pollution attack, tag pollution attack

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Monteiro, Valdemar, Ramantasy, Kostas, Datsikay, Eftychia and Rodriguez, Jonathan (2016) Analysis of a Homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks. In: 2015 IEEE 20th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD). IEEE, pp. 156-160. ISBN 978-1467381864 (doi:10.1109/CAMAD.2015.7390500)

PKI, healthcare network, trust list, identity certificates, attribute certificates

Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Lymberopoulos, Dimitrios and Komninos, Nikos (2010) PKI security in large-scale healthcare networks. Journal of Medical Systems, 36 (3). pp. 1107-1116. ISSN 0148-5598 (Print), 1573-689X (Online) (doi:10.1007/s10916-010-9573-1)

Privacy, Authentication, Pseudonyms, Vehicular, Intelligent Transportation Systems

Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Saghezchi, Firooz B., Radwan, Ayman and Rodriguez, Jonathan (2016) An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Computers & Security, 60. pp. 193-205. ISSN 0167-4048 (doi:10.1016/j.cose.2016.04.006)

Security, Protocols, Industries, Safety, Law, Quality of service

Bicaku, Ani, Maksuti, Silia, Palkovits-Rauter, Silke, Tauber, Markus, Matischek, Rainer, Schmittner, Christoph, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Thron, Mario and Delsing, Jerker (2017) Towards trustworthy end-to-end communication in industry 4.0. In: 2017 IEEE 15th International Conference on Industrial Informatics (INDIN). IEEE, pp. 889-896. ISBN 978-1538608388 ISSN 2378-363X (Online) (doi:10.1109/INDIN.2017.8104889)

Smart Grid, Smart Home, AMI, IoT, M2M, Security, Intrusion Detection, Price Integrity, Load Alteration

Saghezchi, Firooz B., Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Ribeiro, José, Al-Rawi, Mohammed, Mumtaz, Shahid and Rodriguez, Jonathan (2017) Towards a secure network architecture for smart grids in 5G era. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, pp. 121-126. ISBN 978-1509043736 ISSN 2376-6506 (Online) (doi:10.1109/IWCMC.2017.7986273)

Software defined network; Body area networks; Ubiquitous healthcare service delivery

Andriopoulou, Foteini, Birkos, Konstantinos, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Lymberopoulos, Dimitrios (2018) Software-defined networking for ubiquitous healthcare service delivery. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (263). Springer, Cham, Switzerland, pp. 95-104. ISBN 978-3030051945 ISSN 1867-8211 (doi:10.1007/978-3-030-05195-2_10)

TLS, MITM attack, authentication, impersonation, HTTPS, Industry 4.0 Supply Chain

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Ribeiro, Jose, Bastos, Joaquim, Mumtaz, Shahid, Violas, Manuel A., De Oliveira Duarte, A. Manuel and Rodriguez, Jonathan (2019) An efficient web authentication mechanism preventing man-in-the-middle attacks in industry 4.0 supply chain. IEEE Access, 7. pp. 58981-58989. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2914454)

Ubiquitous healthcare; Cloud computing; Profile management system; Smart card technology

Karavatselou, Evy, Fengou, Maria-Anna, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Lymberopoulos, Dimitrios (2018) Profile Management System in Ubiquitous Healthcare Cloud Computing Environment. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (263). Springer, Cham, Switzerland, pp. 105-114. ISBN 978-3030051945 ISSN 1867-8211 (doi:10.1007/978-3-030-05195-2_11)

User Privacy, OAuth 2.0, Smart City, e-Health, Mobile

Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Radwan, Ayman and Rodriguez, Jonathan (2016) An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps. In: 2016 IEEE International Conference on Communications (ICC). IEEE, pp. 1-6. ISBN 978-1-4799-6665-3 ISSN 1938-1883 (Online) (doi:10.1109/ICC.2016.7511598)

WLAN, authentication, intelligent, protocol, supplicant, authenticator, authentication server

Komninos, N and Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 (2009) Intelligent authentication and key agreement mechanism for WLAN in e-hospital applications. Wireless Networks: Research, Technology and Applications. Nova Science Publishers, pp. 165-180.

adaptive user authentication, risk-based user authentication, risk estimation, novelty detection, outlier detection, mobile passenger ID devices, prototype development

Papaioannou, Maria ORCID logoORCID: https://orcid.org/0000-0003-3830-7190, Zachos, Georgios ORCID logoORCID: https://orcid.org/0000-0001-9130-4605, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Rodriguez, Jonathan (2024) Prototyping a secure and usable user authentication mechanism for mobile passenger ID devices for land/sea border control. Sensors, 24 (16):5193. ISSN 1424-8220 (Online) (doi:10.3390/s24165193)

android, security and privacy, intrusion detection and prevention system (IDPS), anomalydetection, malware detection, behavior analysis, machine learning, prototype development

Ribeiro, Jose ORCID logoORCID: https://orcid.org/0000-0002-6526-7334, Saghezchi, Firooz B. ORCID logoORCID: https://orcid.org/0000-0002-7429-2144, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955 and Abd-Alhameed, Raed A. ORCID logoORCID: https://orcid.org/0000-0003-2972-9965 (2020) HIDROID: prototyping a behavioral host-based intrusion detection and prevention system for android. IEEE Access, 8. pp. 23154-23168. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2020.2969626)

beyond 5G security, decentralized system, D2D communication, key management, mobile small cell

de Ree, Marcus ORCID logoORCID: https://orcid.org/0000-0002-7453-4019, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan, Otung, Ifiok E. and Verikoukis, Christos (2021) DISTANT: DIStributed trusted Authority-based key managemeNT for beyond 5G wireless mobile small cells. Computer Communications, 176. pp. 218-233. ISSN 0140-3664 (doi:10.1016/j.comcom.2021.06.012)

beyond 5G, decentralized systems, D2D communications, key management, mobile small cells, network, coding, security, small cells, wireless ad hoc networks.

de Ree, Marcus, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan and Otung, Ifiok E. (2019) Distributed trusted authority-based key management for beyond 5G network coding-enabled mobile small cells. In: 2019 IEEE 2nd 5G World Forum (5GWF). Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 80-85. ISBN 1728136288, 9781728136288 ISSN 2168-7161 (Online) (doi:10.1109/5GWF.2019.8911711)

beyond 5G, mobile small cells, security, public Key cryptography

de Ree, Marcus, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Gao, James ORCID logoORCID: https://orcid.org/0000-0001-5625-3654, Rodriguez, Jonathan and Otung, Ifiok E. (2020) Public key cryptography without certificates for beyond 5G mobile small cells. In: 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-5. ISBN 1728160510, 9781728160511 (doi:10.1109/CSNDSP49049.2020.9249567)

border control security, mobile passenger ID devices, user authentication and authorization

Papaioannou, Maria, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Lymberopoulos, Dimitrios and Rodriguez, Jonathan (2020) User authentication and authorization for next generation mobile passenger ID devices for land and sea border control. In: 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). Proceedings of a meeting held 20-22 July 2020, Porto, Portugal. IEEE Xplore, 2 . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 9781728160511 (doi:10.1109/CSNDSP49049.2020.9249574)

broadband communications, networks, systems

Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Althunibat, Saud (eds.) (2018) Broadband communications, networks, and systems. 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings. Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 263 . Springer International Publishing, Cham, Switzerland. ISBN 9783030051952 ; 9783030051945 ISSN 1867-8211 (doi:10.1007/978-3-030-05195-2)

continuous user authentication; risk-based user authentication; quantitative risk estimation; mobile devices; security vs. usability

Papaioannou, Maria ORCID logoORCID: https://orcid.org/0000-0003-3830-7190, Pelekoudas-Oikonomou, Filippos, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Serrelis, Emmanouil, Rodriguez, Jonathan and Fengou, Maria-Anna (2023) A survey on quantitative risk estimation approaches for secure and usable user authentication on smartphones. Sensors, 23 (6):2979. pp. 1-34. ISSN 1424-8220 (Online) (doi:10.3390/s23062979)

cryptography, information leakage, key generation, physical layer security, security analysis

De Ree, Marcus ORCID logoORCID: https://orcid.org/0000-0002-7453-4019, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955 (2023) Bit security estimation for leakage-prone key establishment schemes. IEEE Communications Letters. p. 1. ISSN 1089-7798 (Print), 1558-2558 (Online) (doi:10.1109/LCOMM.2023.3275647)

cryptography; data confidentiality; information security; Internet of Things; physical-layer security

de Ree, Marcus, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan, Althunibat, Saud, Qaraqe, Marwa K., Alhasanat, Abdullah, Al-Kuwari, Saif M., Alsafasfeh, Moath, Oligeri, Gabriele, Tusha, Seda, Usman, Muhammad, Taha, Fatima Abu, Alfalahat, Samiha, Alshamaseen, Tasneem and Qaisi, Malak (2021) Data confidentiality for IoT networks: cryptographic gaps and physical-layer opportunities. In: 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 25-27 Oct. 2021. Porto, Portugal. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-6. ISBN 978-1665417792 ; 978-1665417808 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD52502.2021.9617779)

cryptography; information leakage; physical layer security; standardization

de Ree, Marcus, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2023) A cryptographic perspective to achieve practical physical layer security. In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 4038-4043. ISBN 978-1665435406; 978-1665435413 (doi:10.1109/GLOBECOM48099.2022.10001722)

cybersecurity, semiconductor, supply chain

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Saghezchi, Firooz, Bastos, Joaquim and Rodriguez, Jonathan (2019) Cybersecurity attacks in semiconductor supply chain environment. In: 19th European Advanced Process Control and Manufacturing Conference (apc|m), April 08-10, 2019, Villach, AUSTRIA. (Unpublished)

data confidentiality, Internet of Things, Physical Layer Encryption, stream cipher, Grain-128PLE

Zachos, Georgios, Ribeiro, Jose, Mantas, Georgios and Rodriguez, Jonathan (2024) Prototyping a generic physical layer encryption scheme for IoT networks. In: 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). Institute of Electrical and Electronics Engineers (IEEE). (In Press)

data confidentiality; Internet of Things; Physical Layer Encryption; Physical Layer Security; stream cipher

de Ree, Marcus, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2024) Grain-128PLE: generic physical-layer encryption for IoT networks. In: 2023 IEEE Globecom Workshops (GC Wkshps). Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1844-1849. ISBN 979-8350370225 (doi:10.1109/GCWkshps58843.2023.10464732)

data preprocessing; machine learning; data mining; classification algorithms; psychosomatic health; depression

Iliou, Theodoros, Konstantopoulou, Georgia, Anastasopoulos, Konstantinos, Lymperopoulou, Christina, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan, Lymberopoulos, Dimitrios and Anastassopoulos, George (2020) Classification of psychosomatic’s symptoms of depression: Iliou Versus PCA preprocessing methods. In: 2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728163390 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD50429.2020.9209288)

eavesdropping; Internet of Things; intrusion; malicious nodes detection; physical layer authentication; physical layer key establishment; physical layer security; radio-frequency fingerprinting

Illi, Elmehdi ORCID logoORCID: https://orcid.org/0000-0002-7169-3698, Qaraqe, Marwa ORCID logoORCID: https://orcid.org/0000-0003-0767-2478, Althunibat, Saud ORCID logoORCID: https://orcid.org/0000-0002-5017-5007, Alhasanat, Abdullah ORCID logoORCID: https://orcid.org/0000-0001-6082-2215, Alsafasfeh, Moath ORCID logoORCID: https://orcid.org/0000-0002-3370-2928, de Ree, Marcus ORCID logoORCID: https://orcid.org/0000-0002-7453-4019, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955, Aman, Waqas ORCID logoORCID: https://orcid.org/0000-0002-2443-1302 and Al-Kuwari, Saif ORCID logoORCID: https://orcid.org/0000-0002-4402-7710 (2023) Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks. IEEE Communications Surveys and Tutorials. p. 1. ISSN 2373-745X (Print), 1553-877X (Online) (doi:10.1109/COMST.2023.3327327)

ehealth, tele-monitoring, smart home, security, integrity mechanism

Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Lymberopoulos, D. and Komninos, N. (2009) Integrity mechanism for eHealth tele-monitoring system in smart home environment. In: 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Minneapolis, MN, USA, pp. 3509-3512. ISSN 1094-687X (Print), 1558-4615 (Online) (doi:10.1109/IEMBS.2009.5334524)

electronic passport, ICAO, LDS, PKI, BAC, EAC, SAC, authorization, authentication, verification, CSCA, CVCA, DVCA, NewP@ss

Bastos, Joaquim, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Ribeiro, José C. and Rodriguez, Jonathan (2015) Towards an advanced PKI-based security solution for next generation e-passport and associated applications: the NewP@ss approach. In: Wireless Internet: 8th International Conference, WICON 2014, Lisbon, Portugal, November 13-14, 2014, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 146 . Springer, pp. 105-112. ISBN 978-3319188010 ISSN 1867-8211 (Print), 1867-822X (Online) (doi:10.1007/978-3-319-18802-7_15)

emergency communications security, long-term evolution (LTE), migration roadmaps, public protection and disaster relief (PPDR), SALUS project, terrestrial trunked radio (TETRA), TETRAPOL technology, Wi-Fi networks, wireless local area networks (WLANs), wireless technologies

Marques, Hugo, Pereira, Luís, Rodriguez, Jonathan, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Sousa, Bruno, Fonseca, Hugo, Cordeiro, Luís, Palma, David, Barbatsalou, Konstantia, Simões, Paulo, Monteiro, Edmundo, Nyanyo, Andy, Wickson, Peter, Bouwers, Bert, Kolundzija, Branko, Olcan, Dragan, Zerbib, Daniel, Brouet, Jérôme, Lasserre, Philippe, Galiotos, Panagiotis, Chrysikos, Theofilos, Jelenc, David, Kos, Jernej, Trček, Denis, Ladas, Alexandros, Weerasinghe, Nuwan, Adigun, Olayinka, Politis, Christos and Müller, Wilmuth (2016) Next-generation communication systems for PPDR: the SALUS perspective. In: Camara, Daniel and Nikaein, Navid, (eds.) Wireless Public Safety Networks 1. Elsevier, pp. 49-93. ISBN 978-1785480225 (doi:10.1016/B978-1-78548-022-5.50003-0)

encryption algorithm, polymorphism, quantum computations, CNOT and SWAP quantum gates

Komninos, Nikos and Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 (2011) PEA: polymorphic encryption algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3 (1). pp. 1-18. ISSN 1755-9340 (Print), 1755-9359 (Online) (doi:10.1504/IJSCC.2011.039222)

hybrid intrusion detection system, android-based PPDR terminals, mobile devices, public protection and disaster relief, machine learning techniques, malware signatures

Borges, Pedro, Sousa, Bruno, Ferreira, Luis, Saghezchi, Firooz B., Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Ribeiro, Jose, Rodriguez, Jonathan, Cordeiro, Luis and Simoes, Paulo (2017) Towards a hybrid intrusion detection system for android-based PPDR terminals. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, pp. 1034-1039. ISBN 978-1509056583 (doi:10.23919/INM.2017.7987434)

internet of medical things (IoMT); intrusion detection system (IDS); machine learning algorithms; anomaly-based intrusion detection; IoT datasets

Zachos, Georgios, Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Porfyrakis, Kyriakos ORCID logoORCID: https://orcid.org/0000-0003-1364-0261, Ribeiro, Jose and Rodriguez, Jonathan (2021) An anomaly-based intrusion detection system for internet of medical things networks. Electronics, 10 (21):2562. ISSN 2079-9292 (Online) (doi:10.3390/electronics10212562)

key escrow, key agreement, key recovery, as hoc networks

Komninos, N. and Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 (2008) Efficient group key agreement & recovery in ad hoc networks. In: IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008), 12-15 October 2008. IET, Beijing, China, pp. 25-28. ISBN 978-0863419256 (doi:10.1049/cp:20080928)

mathematical analysis, receive antennas, predefined authentication signals, wireless communications, mobile MIMO systems, physical-layer entity authentication scheme

Althunibat, Saud, Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2018) Physical-layer entity authentication scheme for mobile MIMO systems. IET Communications, 12 (6). pp. 712-718. ISSN 1751-8628 (Print), 1751-8636 (Online) (doi:10.1049/iet-com.2017.0518)

mobile device security; risk-based adaptive user authentication; dataset generation; record selection

Papaioannou, Maria, Zachos, Georgios, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Essop, Aliyah ORCID logoORCID: https://orcid.org/0000-0002-6978-9359, Karasuwa, Abdulkareem and Rodriguez, Jonathan (2022) Generating datasets based on the HuMIdb dataset for risk-based user authentication on Smartphones. In: 2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 02-03 November 2022. Paris, France. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 134-139. ISBN 978-1665461290; 978-1665461306 ISSN 2378-4873 (Print), 2378-4865 (Online) (doi:10.1109/CAMAD55695.2022.9966901)

mobile user authentication; benefits of behavioral biometrics; limitations of behavioral biometrics

Papaioannou, Maria, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Essop, Aliyah ORCID logoORCID: https://orcid.org/0000-0002-6978-9359, Rodriguez, Jonathan and Sucasas, Victor (2023) Behavioral biometrics for mobile user authentication: benefits and limitations. In: 2023 IFIP Networking Conference (IFIP Networking). IEEE, Laxenburg, Austria. ISBN 979-8350339383 ISSN 1861-2288 (Online) (doi:10.23919/IFIPNetworking57963.2023.10186419)

network coding, HMAC, data pollution attack, tag pollution attack

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Yang, Du, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Nascimento, Alberto and Rodriguez, Jonathan (2015) An improved homomorphic message authentication code scheme for RLNC-enabled wireless networks. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, pp. 80-84. ISBN 978-1479957255 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD.2014.7033210)

network coding, pollution attacks, intrusion detection, location-aware prevention, effi-ciency, 5G

Parsamehr, Reza ORCID logoORCID: https://orcid.org/0000-0002-3461-433X, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955 and Martinez-Ortega, Jose-Fernan (2020) IDLP: an efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells. IEEE Access, 8. pp. 43863-43875. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2020.2977428)

network coding, pollution attacks, mobile small cells

Parsamehr, Reza, Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan and Martinez-Ortega, Jose-Fernan (2019) A location-aware IDPS scheme for network coding-enabled mobile small cells. In: 2019 IEEE 2nd 5G World Forum (5GWF). 30 Sept.-2 Oct. 2019, Dresden. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 91-96. ISBN 9781728136271 ; 9781728136288 (doi:10.1109/5GWF.2019.8911650)

network coding, security, homomorphic message authentication code, data pollution attack, tag pollution attack

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan, Nascimento, Alberto and Neves, Jose Carlos (2015) A null space-based MAC scheme against pollution attacks to random linear network coding. In: 2015 IEEE International Conference on Communication Workshop (ICCW). IEEE, pp. 1521-1526. ISBN 978-1467363051 ISSN 2164-7038 (doi:10.1109/ICCW.2015.7247395)

network coding; pollution attacks; IDPS; locating attacks; 5G

Parsamehr, Reza, Adat, Vipindev, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Politis, Ilias, Rodriguez, Jonathan and Martinez-Ortega, Jose-Feman (2021) IDLP mechanism for NC-enabled mobile small cells based on broadcast nature of wireless communication. In: 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom). 7-10 Sep. 2021. Athens, Greece. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 360-365. ISBN 978-1665445054 ; 978-1665445061 (doi:10.1109/MeditCom49071.2021.9647512)

novelty detection; risk-based user authentication; behavioral biometric-based user authentication; mobile devices

Papaioannou, Maria, Zachos, Georgios, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2023) Novelty detection for risk-based user authentication on mobile devices. In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 837-842. ISBN 978-1665435406; 978-1665435413 (doi:10.1109/GLOBECOM48099.2022.10000843)

outlier detection; behavioral biometric-based user authentication; risk-based user authentication; mobile devices

Papaioannou, Maria, Zachos, Georgios, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Saghezchi, Firooz and Rodriguez, Jonathan (2024) Outlier detection for risk-based user authentication on mobile devices. In: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 2023. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New York, pp. 2778-2783. ISBN 979-8350310900; 979-8350310917 ISSN 2576-6813 (Print), 1930-529X (Online) (doi:10.1109/GLOBECOM54140.2023.10437467)

personalization, trust management, ubiquitous healthcare

Athanasiou, Georgia, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Fengou, Maria-Anna and Lymberopoulos, Dimitrios (2014) Towards personalization of trust management service for ubiquitous healthcare environment. In: IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 297-301. ISSN 2168-2194 (Print), 2168-2208 (Online) (doi:10.1109/BHI.2014.6864362)

personalized healthcare services, context-awareness, user profiles, ubiquitous technology

Fengou, Maria-Anna, Athanasiou, Georgia, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Griva, Ismini and Lymberopoulos, Dimitrios (2013) Towards personalized services in the healthcare domain. In: Furht, Borko and Agarwal, Ankur, (eds.) Handbook of Medical and Healthcare Technologies. Springer, New York, USA, pp. 417-433. ISBN 978-1461484943 (doi:10.1007/978-1-4614-8495-0_19)

privacy preservation, authentication, pseudonimity smart cities, cloud computing

Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Papaioannou, Maria and Rodriguez, Jonathan (2021) Attribute-based pseudonymity for privacy-preserving authentication in cloud services. IEEE Transactions on Cloud Computing. ISSN 2372-0018 (doi:10.1109/TCC.2021.3084538)

privacy-preserving, authentication, pseudonym-based signatures, OAuth 2.0, Smart City

Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Althunibat, Saud, Oliveira, Leonardo, Antonopoulos, Angelos, Otung, Ifiok and Rodriguez, Jonathan (2018) A privacy-enhanced OAuth 2.0 based protocol for smart city mobile applications. Computers & Security, 74. pp. 258-274. ISSN 0167-4048 (doi:10.1016/j.cose.2018.01.014)

privacy-preserving, mobile applications, bilinear pairings

Oliveira, Leonardo ORCID logoORCID: https://orcid.org/0000-0002-6940-6223, Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2018) Implementation of a pseudonym-based signature scheme with bilinear pairings on Android. In: Cognitive Radio Oriented Wireless Networks: 12th International Conference, CROWNCOM 2017, Lisbon, Portugal, September 20-21, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 228 . Springer, pp. 75-87. ISBN 978-3319762067 ISSN 1867-8211 (doi:10.1007/978-3-319-76207-4_7)

privacy-preserving, signature scheme, pseudonymity, crowdsensing, Smart Cities

Sucasas, Victor, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Bastos, Joaquim, Damiao, Francisco and Rodriguez, Jonathan (2019) A signature scheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing. IEEE Transactions on Mobile Computing, 18. p. 1. ISSN 1536-1233 (doi:10.1109/TMC.2019.2901463)

profile, trust management, ubiquitous healthcare

Athanasiou, Georgia, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Fengou, Maria-Anna and Lymberopoulos, Dimitrios (2014) A profile-based trust management scheme for ubiquitous healthcare environment. In: 13th IEEE International Conference on BioInformatics and BioEngineering. IEEExplore . IEEE, Piscataway, NJ, pp. 1-5. ISBN 9781479931637 (doi:10.1109/BIBE.2013.6701678)

random linear network coding (RLNC), homomorphic message authentication code (HMAC), pollution detection, tag pollution

Yang, Du, Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2015) Jointly padding for subspace orthogonality against tag pollution. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, pp. 85-89. ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD.2014.7033211)

risk-based user authentication, adaptive user authentication, mobile passenger ID devices, border control security

Papaioannou, Maria, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Essop, Aliyah ORCID logoORCID: https://orcid.org/0000-0002-6978-9359, Cox, Phil ORCID logoORCID: https://orcid.org/0000-0003-4683-0627, Otung, I E and Rodriguez, Jonathan (2021) Risk-based adaptive user authentication for mobile passenger ID devices for land/sea border control. In: 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEExplore - CFP21CAM-ART (Xplore) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-6. ISBN 978-1-6654-1779-2 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:10.1109/CAMAD52502.2021.9617802)

risk-based user authentication, risk estimation, mobile passenger ID devices, border control security

Papaioannou, Maria, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Rodriguez, Jonathan (2021) Risk-based user authentication for mobile passenger ID devices for land and sea border control. In: 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom). 7-10 Sept. 2021. Athens, Greece. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 180-185. ISBN 978-1665445054 ; 978-1665445061 (doi:10.1109/MeditCom49071.2021.9647603)

risk-based user authentication; risk score estimation; behavioral biometrics-based user authentication; mobile devices

Papaioannou, Maria, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Essop, Aliyah ORCID logoORCID: https://orcid.org/0000-0002-6978-9359, Sucasas, Victor, Aaraj, Najwa and Rodriguez, Jonathan (2022) Risk estimation for a secure and usable user authentication mechanism for mobile passenger ID devices. In: 2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 02-03 November 2022. Paris, France. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 173-178. ISBN 978-1665461290; 978-1665461306 ISSN 2378-4873 (Print), 2378-4865 (Online) (doi:10.1109/CAMAD55695.2022.9966915)

secure XOR network coding, pollution attacks, MAC-based scheme, key management, m-Health, WBANs, remote patient monitoring

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Silva, Helio, Rodriguez, Jonathan and Neves, Jose Carlos (2016) An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems. EURASIP Journal on Wireless Communications and Networking, 2016 (113). pp. 1-10. ISSN 1687-1472 (Print), 1687-1499 (Online) (doi:10.1186/s13638-016-0601-9)

secure network coding, homomorphic MAC, random linear network coding, data pollution attacks, tag pollution attacks

Esfahani, Alireza ORCID logoORCID: https://orcid.org/0000-0002-2100-1569, Yang, Du, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Nascimento, Alberto and Rodriguez, Jonathan (2015) Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. International Journal of Distributed Sensor Networks, 11 (7):510251. ISSN 1550-1329 (Print), 1550-1477 (Online) (doi:10.1155/2015/510251)

security threats; internet of medical things; edge networks

Papaioannou, Maria, Karageorgou, Marine, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Sucasas, Victor, Essop, Ismael ORCID logoORCID: https://orcid.org/0000-0002-5583-0306, Rodriguez, Jonathan and Lymberopoulos, Dimitrios (2020) A survey on security threats and countermeasures in Internet of Medical Things (IoMT). Transactions on Emerging Telecommunications Technologies, 33 (6):e4049. ISSN 2161-3915 (Online) (doi:10.1002/ett.4049)

security, smart home

Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Lymberopoulos, Dimitrios and Komninos, Nikos (2010) Security in smart home environment. In: Lazakidou, Athena, Siassakos, Konstantinos and Ioannou, Konstantinos, (eds.) Wireless Technologies for Ambient Assisted Living and Healthcare. IGI Global, Hershey; New York, pp. 170-191. ISBN 1615208054 ; 978-1615208050 (doi:10.4018/978-1-61520-805-0.ch010)

security, ultra-dense networks, mobile small cells, 6G, network coding

de Ree, Marcus, Parsamehr, Reza, Adat, Vipindev, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Politis, Ilias, Rodriguez, Jonathan, Kotsopoulos, Stavros, Otung, Ifiok, Martínez-Ortega, José-Fernán and Gil-Castiñeira, Felipe (2022) Security for UDNs: a step toward 6G. In: Rodriguez, Jonathan, Verikoukis, C., Vardakas, J. and Passas, N., (eds.) Enabling 6G Mobile Networks. Communications Engineering, Networks . Springer International Publishing, Cham, Switzerland. ISBN 9783030746483 ; 9783030746476 (doi:10.1007/978-3-030-74648-3)

security; cryptography; vehicle dynamics; spread spectrum communication; servers; intelligent transportation systems; smart cities

de Ree, Marcus ORCID logoORCID: https://orcid.org/0000-0002-7453-4019, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955 and Otung, Ifiok E. (2022) DECENT: Decentralized and efficient key management to secure communication in dense and dynamic environments. IEEE Transactions on Intelligent Transportation Systems. pp. 1-13. ISSN 1524-9050 (Print), 1558-0016 (Online) (doi:10.1109/TITS.2022.3160068)

smart cities; authentication; privacy; protocols; public key; cloud computing; costs

Sucasas, Victor ORCID logoORCID: https://orcid.org/0000-0002-7981-401X, Aly, Abdelrahaman, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan ORCID logoORCID: https://orcid.org/0000-0001-9829-0955 and Aaraj, Najwa (2023) Secure multi-party computation-based privacy-preserving authentication for smart cities. IEEE Transactions on Cloud Computing. pp. 1-18. ISSN 2372-0018 (Print), 2168-7161 (Online) (doi:10.1109/TCC.2023.3294621)

smart city security, denial of service attacks, security modeling, queueing theory

Logota, Evariste, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Rodriguez, Jonathan and Marques, Hugo (2015) Analysis of the impact of denial of service attacks on centralized control in smart cities. In: Wireless Internet: 8th International Conference, WICON 2014, Lisbon, Portugal, November 13-14, 2014, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 146 . Springer, pp. 91-96. ISBN 978-3319188010 ISSN 1867-8211 (Print), 1867-822X (Online) (doi:10.1007/978-3-319-18802-7_13)

ubiquitous healthcare, contex-awareness, extended framework, security mechanisms, sensor networks mechanisms

Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Lymberopoulos, Dimitrios and Komninos, Nikos (2011) A new framework for ubiquitous context-aware healthcare applications. In: Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-4. (doi:10.1109/ITAB.2010.5687758)

ubiquitous healthcare, group profile management

Fengou, Maria-Anna, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Lymberopoulos, Dimitrios (2012) Group profile management in ubiquitous healthcare environment. In: 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 28 Aug.-1 Sept. 2012. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 2120-2123. ISBN 978-1-4577-1787-1 ; 978-1-4244-4119-8 ISSN 1558-4615 ; 1094-687X (doi:10.1109/EMBC.2012.6346379)

ubiquitous healthcare, group profile, analytic hierarchy process

Fengou, Maria-Anna, Athanasiou, Georgia, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Lymberopoulos, Dimitrios (2013) Group profile creation in ubiquitous healthcare environment applying the analytic hierarchy process. In: Wireless Mobile Communication and Healthcare. Springer, Berlin, Heidelberg, pp. 247-254. ISBN 978-3-642-37893-5 ISSN 1867-8211 (doi:10.1007/978-3-642-37893-5_28)

ubiquitous healthcare, healthcare profile management system, smart cards

Fengou, Maria-Anna, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Lymberopoulos, Dimitrios and Komninos, Nikos (2011) Healthcare profile management system in smart cards. In: International Conference on Advances of Information & Communication Technology in Health Care 2011, ACEEE, 14-Dec 2011, Jakarta, Indonesia.

ubiquitous healthcare, personalized services, NGN

Athanasiou, Georgia, Fengou, Maria-Anna, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417 and Lymberopoulos, Dimitrios (2012) Provision of Personalized Ubiquitous Healthcare Services over NGN Using Always Best Connected Service Provider. In: 9th International Conference on Ubiquitous Healthcare (uHealthcare2012), 10-13 Oct. 2012, Beijing, China. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 474-476. ISBN 978-1-4577-2040-6 ; 978-1-4577-2039-0 (doi:10.1109/HealthCom.2012.6379465)

ubiquitous healthcare, profile management, smart card technology

Fengou, Maria-Anna, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Lymberopoulos, Dimitrios and Komninos, Nikos (2012) Ubiquitous healthcare profile management applying smart card technology. In: Wireless Mobile Communication and Healthcare (MobiHealth 2011). Springer, Berlin, Heidelberg, pp. 248-255. ISSN 1867-8211 (doi:10.1007/978-3-642-29734-2_34)

This list was generated on Thu Dec 26 17:18:47 2024 UTC.