default search action
Panayiotis Kotzanikolaou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Christos Theodoropoulos, Dimitris Koutras, Christos Douligeris, Panayiotis Kotzanikolaou:
An Edge Multi Factor Authentication System for Cyber Physical Systems Based on OTP. ISCC 2024: 1-3 - 2023
- [j33]George Stergiopoulos, Panayiotis Kotzanikolaou, Charalambos Konstantinou, Achilleas Tsoukalis:
Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps. IEEE Syst. J. 17(2): 1831-1842 (2023) - [c42]Vangelis Malamas, Thomas K. Dasaklis, Theodore G. Voutsinas, Panayiotis Kotzanikolaou:
Blockchain Service Layer for ERP data interoperability among multiple supply chain stakeholders. CoDIT 2023: 145-150 - [c41]George Chatzisofroniou, Chris Markellos, Panayiotis Kotzanikolaou:
Assessing the Security Risks of Medical Mobile Applications. ISCC 2023: 1-7 - [c40]Dimitris Koutras, Panos Dimitrellos, Panayiotis Kotzanikolaou, Christos Douligeris:
Automated WiFi Incident Detection Attack Tool on 802.11 Networks. ISCC 2023: 464-469 - [c39]Vangelis Malamas, Dimitris Koutras, Panayiotis Kotzanikolaou:
Uninterrupted Trust: Continuous Authentication in Blockchain-Enhanced Supply Chains. SEEDA-CECNSM 2023: 1-6 - 2022
- [j32]Ioannis Stellios, Kostas Mokos, Panayiotis Kotzanikolaou:
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services. Connect. Sci. 34(1): 1401-1429 (2022) - [j31]George Chatzisofroniou, Panayiotis Kotzanikolaou:
Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls. J. Comput. Secur. 30(3): 357-380 (2022) - [j30]Panayiotis Kalogeropoulos, Dimitrios Papanikas, Panayiotis Kotzanikolaou:
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation. J. Cybersecur. Priv. 2(4): 778-799 (2022) - [j29]Christos Grigoriadis, Romain Laborde, Antonin Verdier, Panayiotis Kotzanikolaou:
An Adaptive, Situation-Based Risk Assessment and Security Enforcement Framework for the Maritime Sector. Sensors 22(1): 238 (2022) - [j28]Mohammad Shahraeini, Panayiotis Kotzanikolaou, Mehrab Nasrolahi:
Communication Resilience for Smart Grids Based on Dependence Graphs and Eigenspectral Analysis. IEEE Syst. J. 16(4): 6558-6568 (2022) - [c38]Dimitris Koutras, Christos Grigoriadis, Michalis Papadopoullos, Panayiotis Kotzanikolaou, Christos Douligeris:
Automating environmental vulnerability analysis for network services. ISCC 2022: 1-7 - 2021
- [j27]Vangelis Malamas, Fotis Chantzis, Thomas K. Dasaklis, George Stergiopoulos, Panayiotis Kotzanikolaou, Christos Douligeris:
Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal. IEEE Access 9: 40049-40075 (2021) - [j26]Ioannis Stellios, Panayiotis Kotzanikolaou, Christos Grigoriadis:
Assessing IoT enabled cyber-physical attack paths against critical systems. Comput. Secur. 107: 102316 (2021) - [c37]Christos Grigoriadis, Adamantios Marios Berzovitis, Ioannis Stellios, Panayiotis Kotzanikolaou:
A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systems. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 23-39 - [c36]Ioannis Stellios, Kostas Mokos, Panayiotis Kotzanikolaou:
Assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting Systems. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 199-217 - [c35]Christos Grigoriadis, Spyridon Papastergiou, Panayiotis Kotzanikolaou, Christos Douligeris, Antreas Dionysiou, Elias Athanasopoulos, Karin Bernsmed, Per Håkon Meland, Liina Kamm:
Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator. IC3 2021: 371-377 - [c34]Célia Martinie, Christos Grigoriadis, Eleni-Maria Kalogeraki, Panayiotis Kotzanikolaou:
Modelling Human Tasks to Enhance Threat Identification in Critical Maritime Systems. PCI 2021: 375-380 - 2020
- [j25]Vangelis Malamas, Panayiotis Kotzanikolaou, Thomas K. Dasaklis, Mike Burmester:
A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data. IEEE Access 8: 134393-134412 (2020) - [j24]Dimitrios Zorbas, Khaled Q. Abdelfadeel, Panayiotis Kotzanikolaou, Dirk Pesch:
TS-LoRa: Time-slotted LoRaWAN for the Industrial Internet of Things. Comput. Commun. 153: 1-10 (2020) - [j23]Mohammad Shahraeini, Panayiotis Kotzanikolaou:
A Dependency Analysis Model for Resilient Wide Area Measurement Systems in Smart Grid. IEEE J. Sel. Areas Commun. 38(1): 156-168 (2020) - [j22]Dimitris Koutras, George Stergiopoulos, Thomas K. Dasaklis, Panayiotis Kotzanikolaou, Dimitris Glynos, Christos Douligeris:
Security in IoMT Communications: A Survey. Sensors 20(17): 4828 (2020) - [c33]Konstantinos Nomikos, Athanasios Papadimitriou, George Stergiopoulos, Dimitris Koutras, Mihalis Psarakis, Panayiotis Kotzanikolaou:
On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective. DSD 2020: 301-308
2010 – 2019
- 2019
- [j21]Cristina Alcaraz, Mike Burmester, Jorge Cuéllar, Xinyi Huang, Panayiotis Kotzanikolaou, Mihalis Psarakis:
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures. IEEE Internet Things J. 6(5): 7988-7991 (2019) - [c32]Stamatia Triantopoulou, Dimitrios Papanikas, Panayiotis Kotzanikolaou:
An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet. IISA 2019: 1-5 - [c31]Vangelis Malamas, Thomas K. Dasaklis, Panayiotis Kotzanikolaou, Mike Burmester, Sokratis K. Katsikas:
A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain. SERVICES 2019: 35-40 - [c30]George Chatzisofroniou, Panayiotis Kotzanikolaou:
Association Attacks in IEEE 802.11: Exploiting WiFi Usability Features. STAST 2019: 107-123 - [p1]Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis:
Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 47-68 - 2018
- [j20]Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis, Cristina Alcaraz, Javier López:
A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services. IEEE Commun. Surv. Tutorials 20(4): 3453-3495 (2018) - [j19]Spyridon Papastergiou, Nineta Polemi, Panayiotis Kotzanikolaou:
Design and validation of the Medusa supply chain risk assessment methodology and system. Int. J. Crit. Infrastructures 14(1): 1-39 (2018) - [c29]Dimitrios Zorbas, Panayiotis Kotzanikolaou, Christos Douligeris:
R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks. ISCC 2018: 766-771 - [c28]Georgios Makrodimitris, Panayiotis Kotzanikolaou, Christos Douligeris:
Preliminary design of a new approach to choose cyber exercise methodologies for critical infrastructures. PCI 2018: 40-45 - 2017
- [j18]Panayiotis Kotzanikolaou, George Chatzisofroniou, Mike Burmester:
Broadcast anonymous routing (BAR): scalable real-time anonymous communication. Int. J. Inf. Sec. 16(3): 313-326 (2017) - [j17]Vasileios Gkioulos, Gaute Wangen, Sokratis K. Katsikas, George K. Karagiannidis, Panayiotis Kotzanikolaou:
Security Awareness of the Digital Natives. Inf. 8(2): 42 (2017) - 2016
- [j16]Panayiotis Kotzanikolaou, Constantinos Patsakis, Emmanouil Magkos, Michalis Korakakis:
Lightweight private proximity testing for geospatial social networks. Comput. Commun. 73: 263-270 (2016) - [j15]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Georgia Lykou, Dimitris Gritzalis:
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. Int. J. Crit. Infrastructure Prot. 12: 46-60 (2016) - [j14]Emmanouil Magkos, Panayiotis Kotzanikolaou:
SCN-SI-021 achieving privacy and access control in pervasive computing environments. Secur. Commun. Networks 9(2): 94-105 (2016) - [c27]Dimitris Gritzalis, George Stergiopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos, Georgia Lykou:
Critical Infrastructure Protection: A Holistic Methodology for Greece. CyberICPS@ESORICS 2016: 19-34 - [c26]George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Classification and Comparison of Critical Infrastructure Protection Tools. Critical Infrastructure Protection 2016: 239-255 - 2015
- [j13]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Dimitris Gritzalis:
Risk mitigation strategies for critical infrastructures based on graph centrality analysis. Int. J. Crit. Infrastructure Prot. 10: 34-44 (2015) - [c25]Nineta Polemi, Panayiotis Kotzanikolaou:
Medusa: A Supply Chain Risk Assessment Methodology. CSP Forum 2015: 79-90 - [c24]George Stergiopoulos, Marianthi Theocharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation. Critical Infrastructure Protection 2015: 299-314 - [c23]Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche:
Private Proximity Testing on Steroids: An NTRU-based Protocol. STM 2015: 172-184 - [i1]Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche:
Private Proximity Testing on Steroids: An NTRU-based Protocol. IACR Cryptol. ePrint Arch. 2015: 917 (2015) - 2014
- [c22]Emmanouil Magkos, Panayiotis Kotzanikolaou, Marios Magioladitis, Spyros Sioutas, Vassilios S. Verykios:
Towards Secure and Practical Location Privacy through Private Equality Testing. Privacy in Statistical Databases 2014: 312-325 - 2013
- [j12]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Assessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastructures 9(1/2): 93-110 (2013) - [j11]Emmanouil Magkos, Markos Avlonitis, Panayiotis Kotzanikolaou, Michalis Stefanidakis:
Toward early warning against Internet worms based on critical-sized networks. Secur. Commun. Networks 6(1): 78-88 (2013) - [c21]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Cascading Effects of Common-Cause Failures in Critical Infrastructures. Critical Infrastructure Protection 2013: 171-182 - [c20]Dimitrios Moustis, Panayiotis Kotzanikolaou:
Evaluating security controls against HTTP-based DDoS attacks. IISA 2013: 1-6 - 2012
- [j10]Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris, Mike Burmester:
Chord-PKI: A distributed trust infrastructure based on P2P networks. Comput. Networks 56(1): 378-398 (2012) - [c19]Panayiotis Kotzanikolaou, Emmanouil Magkos, Nikolaos Petrakos, Christos Douligeris, Vassilios Chrissikopoulos:
Fair Anonymous Authentication for Location Based Services. DPM/SETOP 2012: 1-14 - [c18]Nikolaos Petrakos, Panayiotis Kotzanikolaou, Christos Douligeris:
Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme. Panhellenic Conference on Informatics 2012: 105-110 - 2011
- [c17]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. CRITIS 2011: 104-115 - 2010
- [j9]Dimitrios Zorbas, Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris:
Solving coverage problems in wireless sensor networks using cover sets. Ad Hoc Networks 8(4): 400-415 (2010) - [j8]Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
A multi-layer Criticality Assessment methodology based on interdependencies. Comput. Secur. 29(6): 643-658 (2010) - [c16]Emmanouil Magkos, Panayiotis Kotzanikolaou:
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments. MobiSec 2010: 53-64 - [c15]Emmanouil Magkos, Panayiotis Kotzanikolaou, Spyros Sioutas, Konstantinos Oikonomou:
A distributed privacy-preserving scheme for location-based queries. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [j7]Panayiotis Kotzanikolaou, Emmanouil Magkos, Dimitrios D. Vergados, Michalis Stefanidakis:
Secure and practical key establishment for distributed sensor networks. Secur. Commun. Networks 2(6): 595-610 (2009) - [c14]Panayiotis Kotzanikolaou, Sotirios Maniatis, Eugenia G. Nikolouzou, Vassilios Stathopoulos:
Evaluating Common Privacy Vulnerabilities in Internet Service Providers. e-Democracy 2009: 161-170 - [c13]Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Risk-Based Criticality Analysis. Critical Infrastructure Protection 2009: 35-49 - 2008
- [j6]Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
Secure log management for privacy assurance in electronic communications. Comput. Secur. 27(7-8): 298-308 (2008) - [j5]Panayiotis Kotzanikolaou:
Data Retention and Privacy in Electronic Communications. IEEE Secur. Priv. 6(5): 46-52 (2008) - [j4]Panayiotis Kotzanikolaou, Dimitrios D. Vergados, Giannis Stergiou, Emmanouil Magkos:
Multilayer key establishment for large-scale sensor networks. Int. J. Secur. Networks 3(1): 1-9 (2008) - 2007
- [j3]Rosa Mavropodi, Panayiotis Kotzanikolaou, Christos Douligeris:
SecMR - a secure multipath routing protocol for ad hoc networks. Ad Hoc Networks 5(1): 87-99 (2007) - [j2]Emmanouil Magkos, Panayiotis Kotzanikolaou, Christos Douligeris:
Towards secure online elections: models, primitives and open issues. Electron. Gov. an Int. J. 4(3): 249-268 (2007) - [c12]Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris:
Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network. EuroPKI 2007: 354-361 - [c11]Panayiotis Kotzanikolaou, Christos Douligeris:
Privacy Threats of Data Retention in Internet Communications. PIMRC 2007: 1-4 - 2006
- [j1]Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris, Vassilios Chrissikopoulos:
Secure distributed intelligent networks. Comput. Commun. 29(3): 325-336 (2006) - [c10]Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
A Framework for Secure and Verifiable Logging in Public Communication Networks. CRITIS 2006: 273-284 - 2005
- [c9]Panayiotis Kotzanikolaou, Dimitrios D. Vergados, Giannis Stergiou:
Performance Analysis of a Hybrid Key Establishment Protocol for Wireless Sensor Networks. ISM 2005: 719-724 - [c8]Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris:
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. WiOpt 2005: 59-64 - [c7]Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris:
Secure Multipath Routing for Mobile Ad Hoc Networks. WONS 2005: 89-96 - [c6]Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos:
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. WOWMOM 2005: 581-587 - [c5]Rosa Mavropodi, Panayiotis Kotzanikolaou, Christos Douligeris:
Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks. WWIC 2005: 269-278 - 2003
- [b1]Panayiotis Kotzanikolaou:
Ασφαλή συστήματα κινητών πρακτόρων. University of Piraeus, Greece, 2003 - 2001
- [c4]Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos:
Dynamic Multi-signatures for Secure Autonomous Agents. DEXA Workshop 2001: 587-591 - [c3]Emmanouil Magkos, Panayiotis Kotzanikolaou, Vassilios Chrissikopoulos:
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions. EC-Web 2001: 186-195 - [c2]Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
Strong Forward Security. SEC 2001: 109-122 - 2000
- [c1]Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos:
Secure Transactions with Mobile Agents in Hostile Environments. ACISP 2000: 289-297
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint