Follow
Nikolaos E. Petroulakis
Title
Cited by
Cited by
Year
Botnet attack detection at the IoT edge based on sparse representation
C Tzagkarakis, N Petroulakis, S Ioannidis
2019 Global IoT Summit (GIoTS), 1-6, 2019
462019
Blockchain-based electronic patient records for regulated circular healthcare jurisdictions
S Alexaki, G Alexandris, V Katos, NE Petroulakis
2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design …, 2018
452018
Anomaly‐based intrusion detection of jamming attacks, local versus collaborative detection
AG Fragkiadakis, VA Siris, NE Petroulakis, AP Traganitis
Wireless Communications and Mobile Computing 15 (2), 276-294, 2015
452015
Life-logging in smart environments: Challenges and security threats
NE Petroulakis, IG Askoxylakis, T Tryfonas
2012 IEEE International Conference on Communications (ICC), 5680-5684, 2012
412012
VirtuWind: virtual and programmable industrial network prototype deployed in operational wind park
T Mahmoodi, V Kulkarni, W Kellerer, P Mangan, F Zeiger, S Spirou, ...
Transactions on Emerging Telecommunications Technologies 27 (9), 1281-1288, 2016
342016
A lightweight framework for secure life-logging in smart environments
NE Petroulakis, EZ Tragos, AG Fragkiadakis, G Spanoudakis
information security technical report 17 (3), 58-70, 2013
322013
Anomaly-based intrusion detection algorithms for wireless networks
AG Fragkiadakis, VA Siris, N Petroulakis
International Conference on Wired/Wireless Internet Communications, 192-203, 2010
312010
Experiences with a metropolitan multiradio wireless mesh network: design, performance, and application
VA Siris, EZ Tragos, NE Petroulakis
IEEE Communications Magazine 50 (7), 128-136, 2012
302012
Semiotics architectural framework: End-to-end security, connectivity and interoperability for industrial iot
NE Petroulakis, E Lakka, E Sakic, V Kulkarni, K Fysarakis, I Somarakis, ...
2019 Global IoT Summit (GIoTS), 1-6, 2019
222019
Reactive security for SDN/NFV‐enabled industrial networks leveraging service function chaining
NE Petroulakis, K Fysarakis, I Askoxylakis, G Spanoudakis
Transactions on Emerging Telecommunications Technologies 29 (7), e3269, 2018
212018
Architectural patterns for secure IoT orchestrations
K Fysarakis, G Spanoudakis, N Petroulakis, O Soultatos, A Bröring, ...
2019 Global IoT Summit (GIoTS), 1-6, 2019
192019
Pairing a circular economy and the 5G-enabled internet of things: Creating a class of? looping smart assets?
A Miaoudakis, K Fysarakis, N Petroulakis, S Alexaki, G Alexandirs, ...
IEEE Vehicular Technology Magazine 15 (3), 20-31, 2020
182020
Patterns for the design of secure and dependable software defined networks
NE Petroulakis, G Spanoudakis, IG Askoxylakis
Computer Networks 109, 39-49, 2016
182016
Fault tolerance using an sdn pattern framework
NE Petroulakis, G Spanoudakis, IG Askoxylakis
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
172017
Threat landscape and good practice guide for software defined networks/5g
A Belmonte Martin, L Marinos, E Rekleitis, G Spanoudakis, ...
European Union Agency for Network and Information Security (ENISA), 2015
162015
Heraklion MESH an experimental metropolitan multi-radio mesh network
V Angelakis, M Genetzakis, N Kossifidis, K Mathioudakis, M Ntelakis, ...
Proceedings of the second ACM international workshop on Wireless network …, 2007
162007
VirtuWind–An SDN-and NFV-based architecture for softwarized industrial networks
E Sakic, V Kulkarni, V Theodorou, A Matsiuk, S Kuenzer, NE Petroulakis, ...
Measurement, Modelling and Evaluation of Computing Systems: 19th …, 2018
142018
Experiences and investigations with Heraklion mesh: an experimental metropolitan multi-radio mesh network
M Delakis, K Mathioudakis, N Petroulakis, VA Siris
4th International ICST Conference on Testbeds and Research Infrastructures …, 2010
142010
A reactive security framework for operational wind parks using service function chaining
K Fysarakis, NE Petroulakis, A Roos, K Abbasi, P Vizarreta, ...
2017 IEEE Symposium on Computers and Communications (ISCC), 663-668, 2017
132017
A privacy-level model of user-centric cyber-physical systems
NE Petroulakis, IG Askoxylakis, A Traganitis, G Spanoudakis
Human Aspects of Information Security, Privacy, and Trust: First …, 2013
132013
The system can't perform the operation now. Try again later.
Articles 1–20