Nikos Komninos
Nikos Komninos
City, University of London
Verified email at - Homepage
Cited by
Cited by
Survey in smart grid and smart home security: Issues, challenges and countermeasures
N Komninos, E Philippou, A Pitsillides
IEEE Communications Surveys & Tutorials 16 (4), 1933-1954, 2014
Detecting unauthorized and compromised nodes in mobile ad hoc networks
N Komninos, D Vergados, C Douligeris
Ad Hoc Networks 5 (3), 289-298, 2007
A new framework architecture for next generation e-health services
MA Fengou, G Mantas, D Lymberopoulos, N Komninos, S Fengos, ...
IEEE journal of biomedical and health informatics 17 (1), 9-18, 2012
Security for 5G communications
G Mantas, N Komninos, J Rodriguez, E Logota, H Marques
Fundamentals of 5G mobile networks, 207-220, 2015
A study on the evolution of ransomware detection using machine learning and deep learning techniques
DW Fernando, N Komninos, T Chen
IoT 1 (2), 551-604, 2020
Security in smart home environment
G Mantas, D Lymberopoulos, N Komninos
Wireless Technologies for Ambient Assisted Living and Healthcare: Systems†…, 2011
Survey of approaches and features for the identification of HTTP-based botnet traffic
D Acarali, M Rajarajan, N Komninos, I Herwono
Journal of network and computer applications 76, 1-15, 2016
Modelling the spread of botnet malware in IoT‐based wireless sensor networks
D Acarali, M Rajarajan, N Komninos, BB Zarpel„o
Security and Communication Networks 2019 (1), 3745619, 2019
Intrusion detection with neural networks and watermarking techniques for MANET
A Mitrokotsa, N Komninos, C Douligeris
IEEE International Conference on Pervasive Services, 118-127, 2007
ForChaos: Real time application DDoS detection using forecasting and chaos theory in smart home IoT network
A Procopiou, N Komninos, C Douligeris
Wireless Communications and Mobile Computing 2019 (1), 8469410, 2019
The lord of the sense: A privacy preserving reputation system for participatory sensing applications
A Michalas, N Komninos
2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014
Layered security design for mobile ad hoc networks
N Komninos, D Vergados, C Douligeris
computers & security 25 (2), 121-130, 2006
Protecting biometric templates with image watermarking techniques
N Komninos, T Dimitriou
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea†…, 2007
LIDF: Layered intrusion detection framework for ad-hoc networks
N Komninos, C Douligeris
Ad Hoc Networks 7 (1), 171-182, 2009
Degree-based clustering algorithms for wireless ad hoc networks under attack
C Tselikis, S Mitropoulos, N Komninos, C Douligeris
IEEE Communications Letters 16 (5), 619-621, 2012
New client puzzle approach for dos resistance in ad hoc networks
A Michalas, N Komninos, NR Prasad, VA Oleshchuk
2010 IEEE International Conference on Information Theory and Information†…, 2010
Trustee: A trust management system for fog-enabled cyber physical systems
AK Junejo, N Komninos, M Sathiyanarayanan, BS Chowdhry
IEEE transactions on emerging topics in computing 9 (4), 2030-2041, 2019
Current and future threats framework in smart grid domain
A Procopiou, N Komninos
2015 IEEE international conference on cyber technology in automation†…, 2015
Authentication in a layered security approach for mobile ad hoc networks
N Komninos, DD Vergados, C Douligeris
computers & security 26 (5), 373-380, 2007
FeSA: Feature selection architecture for ransomware detection under concept drift
DW Fernando, N Komninos
Computers & Security 116, 102659, 2022
The system can't perform the operation now. Try again later.
Articles 1–20