[go: up one dir, main page]

Follow
Constantinos Kolias
Constantinos Kolias
Associate Professor, University of Idaho
Verified email at uidaho.edu
Title
Cited by
Cited by
Year
DDoS in the IoT: Mirai and Other Botnets
C Kolias, G Kambourakis, A Stavrou, J Voas
Computer 50 (7), 80-84, 2017
26192017
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
C Kolias, G Kambourakis, A Stavrou, S Gritzalis
Communications Surveys & Tutorials, 2015
6842015
The mirai botnet and the iot zombie armies
G Kambourakis, C Kolias, A Stavrou
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 267-272, 2017
3342017
Swarm intelligence in intrusion detection: A survey
C Kolias, G Kambourakis, M Maragoudakis
Computers & Security 30 (8), 625-642, 2011
2482011
Learning Internet-of-Things Security" Hands-On"
C Kolias, A Stavrou, J Voas, I Bojanova, R Kuhn
IEEE Security & Privacy 14 (1), 37-46, 2016
1722016
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset
E Chatzoglou, G Kambourakis, C Kolias
IEEE Access 9, 34188-34205, 2021
1412021
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents
GM Makrakis, C Kolias, G Kambourakis, C Rieger, J Benjamin
IEEE Access 9, 165295-165325, 2021
1272021
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset
S Vidros, C Kolias, G Kambourakis, L Akoglu
Future Internet 9 (1), 6, 2017
1212017
TermID: A distributed swarm intelligence-based approach for wireless intrusion detection
C Kolias, V Kolias, G Kambourakis
International Journal of Information Security 16, 401-416, 2017
742017
Online recruitment services: another playground for fraudsters
S Vidros, C Kolias, G Kambourakis
Computer Fraud & Security 2016 (3), 8-13, 2016
712016
Attacks and Countermeasures on 802.16: Analysis and Assessment
C Kolias, G Kambourakis, S Gritzalis
702013
DoS attacks exploiting signaling in UMTS and IMS
G Kambourakis, C Kolias, S Gritzalis, JH Park
Computer Communications 34 (3), 226-235, 2011
612011
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE
E Chatzoglou, G Kambourakis, C Kolias
Journal of Information Security and Applications 64, 103058, 2022
522022
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks
G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos, GM Makrakis, ...
Symmetry 12 (4), 579, 2020
492020
Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems
E Chatzoglou, G Kambourakis, C Kolias, C Smiliotopoulos
IEEE Access 10, 64761-64784, 2022
482022
Breaking BLE Beacons For Fun But Mostly Profit
C Kolias, L Copi, F Zhang, A Stavrou
Proceedings of the 10th European Workshop on Systems Security, 4, 2017
352017
Detecting Lateral Movement: A Systematic Survey
C Smiliotopoulos, G Kambourakis, C Kolias
Available at SSRN 4606223, 2023
292023
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features
E Chatzoglou, G Kambourakis, C Smiliotopoulos, C Kolias
Sensors 22 (15), 5633, 2022
282022
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?
Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ...
2015 12th International Joint Conference on e-Business and …, 2015
282015
Securely Making" Things" Right
C Kolias, A Stavrou, J Voas
Computer 48 (9), 84-88, 2015
262015
The system can't perform the operation now. Try again later.
Articles 1–20