Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An HMM-Based Anomaly Detection Approach for SCADA Systems., and . WISTP, volume 9895 of Lecture Notes in Computer Science, page 85-99. Springer, (2016)Προστασία συστημάτων από κατανεμημένες επιθέσεις στο διαδίκτυο. University of Patras, Greece, (2013)National Archive of PhD Theses: oai:10442/31563.Leveraging Deep Learning and Online Source Sentiment for Financial Portfolio Management., , , , , , , , , and 3 other author(s). CoRR, (2023)Towards Run-Time Security Monitoring of Distributed Industrial Control Systems., , , , and . ETFA, page 1-8. IEEE, (2023)Piveau: A Large-Scale Open Data Management Platform Based on Semantic Web Technologies., , , , , and . ESWC, volume 12123 of Lecture Notes in Computer Science, page 648-664. Springer, (2020)TERO-Based Detection of Hardware Trojans on FPGA Implementation of the AES Algorithm., , and . DSD, page 678-681. IEEE Computer Society, (2016)Detection, traceback and filtering of denial of service attacks in networked embedded systems., , , and . WESS, page 5:1-5:8. ACM, (2014)A Private Key Recovery Scheme Using Partial Knowledge., , and . NTMS, page 1-5. IEEE, (2021)Battling Data Counterfeiting in Industrial Data Trading Environments., and . ETFA, page 1-4. IEEE, (2024)DECIDE: DevOps for Trusted, Portable and Interoperable Multi-cloud Applications Towards the Digital Single Market., , , , and . PROFES, volume 11915 of Lecture Notes in Computer Science, page 602-607. Springer, (2019)