Author of the publication

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.

, , , , , , , , , , , , , and . Euro-CYBERSEC, volume 821 of Communications in Computer and Information Science, page 68-78. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compliance of the LinkedIn Privacy Policy with the Principles of the ISO 29100: 2011 Standard., and . WISE Workshops, volume 9051 of Lecture Notes in Computer Science, page 72-83. Springer, (2014)Disaster Recovery Analysis and Management Method (DRAMM): An IT Management Tool., and . Panhellenic Conference on Informatics, page 99-104. IEEE Computer Society, (2012)Intrusion Detection Using Evolutionary Neural Networks., , and . Panhellenic Conference on Informatics, page 8-12. IEEE Computer Society, (2008)Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues., , , and . EMS, page 130-135. IEEE Computer Society, (2009)Revisiting Legal and Regulatory Requirements for Secure E-Voting., , and . SEC, volume 214 of IFIP Conference Proceedings, page 469-480. Kluwer, (2002)Underwater tracking of a maneuvering target using time delay measurements., , and . Signal Processing, 41 (1): 17-29 (1995)Building a Reliable e-Voting System: Functional Requirements and Legal Constraints., , and . DEXA Workshops, page 435. IEEE Computer Society, (2002)Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications., , , and . Secure Electronic Voting, volume 7 of Advances in Information Security, Springer, (2003)Design of a neural network for recognition and classification of computer viruses., , , and . Computers & Security, 14 (5): 435-448 (1995)Panel Discussion: Managing Digital Identities - Challenges and Opportunities., , , , , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 2. Springer, (2007)