Constantinos Kolias
University of Idaho
H-index: 20
North America-United States
Top articles of Constantinos Kolias
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks | Future Internet | Vyron Kampourakis Georgios Michail Makrakis Constantinos Kolias | 2024/4/19 |
WIPP: Towards IEC 62443-3-3 Network Compliance via Software-Defined Networking in Digital Substations | Georgios Michail Makrakis Dakota Roberson Constantinos Kolias | 2023/11/27 | |
Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis | Kurt A. Vedros Constantinos Kolias Robert C. Ivans | 2023 | |
Towards Scalable EM-based Anomaly Detection for Embedded Devices Through Synthetic Fingerprinting | Kurt A Vedros Georgios Michail Makrakis Constantinos Kolias Robert C. Ivans Craig Rieger | 2023/3/18 | |
Detecting Lateral Movement: A Systematic Survey | Heliyon | Christos Smiliotopoulos Georgios Kambourakis Constantinos Kolias | 2024/2 |
Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems | IEEE Access | Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias Christos Smiliotopoulos | 2022/6/16 |
Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces | Security and Communication Networks | Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias | 2022/2/12 |
Trade-off Analysis of Operational Technologies to Advance Cyber Resilience through Automated and Autonomous Response to Threats | Craig Rieger Constantinos Kolias Robert C Ivans Shannon Eggers | 2022/9/26 | |
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE | Journal of Information Security and Applications | Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias | 2022/2/1 |
Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising | Ekaterina Miller Georgios Michail Makrakis Kurt A. Vedros Constantinos Kolias Craig Rieger | 2022/7/25 | |
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features | Sensors | Efstratios Chatzoglou Georgios Kambourakis Christos Smiliotopoulos Constantinos Kolias | 2022/7/28 |
On the Limits of EM Based Detection of Control Logic Injection Attacks In Noisy Environments | Kurt Vedros Georgios Michail Makrakis Constantinos Kolias Min Xian Daniel Barbara | 2021/10/18 | |
Wif0: All your passphrase are belong to us | Computer | Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias | 2021/7/2 |
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors | Panagiotis Chatzigiannis Foteini Baldimtsi Constantinos Kolias Angelos Stavrou | 2021/5/18 | |
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset | IEEE Access | Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias | 2021/2/23 |
Cybersecurity | Resilient Control Architectures and Power Systems | Daniel Conte de Leon Georgios M Makrakis Constantinos Kolias | 2021/12/9 |
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents | IEEE Access | Georgios Michail Makrakis Constantinos Kolias Georgios Kambourakis Craig Rieger Jacob Benjamin | 2021/12/6 |
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks | Georgios Kambourakis Constantinos Kolias Dimitrios Geneiatakis Georgios Karopoulos Georgios Michail Makrakis | 2020/4/6 | |
EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle | Constantinos Kolias Daniel Barbará Craig Rieger Jacob Ulrich | 2020/5/21 | |
A Cyber Resilient Design for Control Systems | Craig Rieger Constantinos Kolias Jacob Ulrich Timothy R McJunkin | 2020/10/19 |