Intrusion detection of sinkhole attacks in wireless sensor networks I Krontiris, T Dimitriou, T Giannetsos, M Mpasoukos International symposium on algorithms and experiments for sensor systems …, 2007 | 208 | 2007 |
Towards intrusion detection in wireless sensor networks K Ioannis, T Dimitriou, FC Freiling Proc. of the 13th European Wireless Conference, 1-10, 2007 | 205 | 2007 |
Towards intrusion detection in wireless sensor networks I Krontiris, T Dimitriou, FC Freiling Proceedings of the 13th European Wireless Conference, 1-4, 2007 | 172 | 2007 |
Launching a sinkhole attack in wireless sensor networks; the intruder side I Krontiris, T Giannetsos, T Dimitriou 2008 IEEE International Conference on Wireless and Mobile Computing …, 2008 | 156 | 2008 |
Cooperative intrusion detection in wireless sensor networks I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009 | 149 | 2009 |
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks I Krontiris, T Giannetsos, T Dimitriou Proceedings of the 4th international conference on Security and privacy in …, 2008 | 114 | 2008 |
Location privacy in urban sensing networks: research challenges and directions [security and privacy in emerging wireless networks] I Krontiris, FC Freiling, T Dimitriou IEEE Wireless Communications 17 (5), 30-35, 2010 | 92 | 2010 |
Monetary incentives in participatory sensing using multi-attributive auctions I Krontiris, A Albers International Journal of Parallel, Emergent and Distributed Systems 27 (4 …, 2012 | 89 | 2012 |
Security issues in biomedical wireless sensor networks T Dimitriou, K Ioannis 2008 First International Symposium on Applied Sciences on Biomedical and …, 2008 | 83 | 2008 |
A localized, distributed protocol for secure information exchange in sensor networks T Dimitriou, I Krontiris 19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005 | 56 | 2005 |
Trust and privacy in mobile experience sharing: future challenges and avenues for research I Krontiris, M Langheinrich, K Shilton IEEE Communications Magazine 52 (8), 50-55, 2014 | 50 | 2014 |
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. Z Benenson, A Girard, I Krontiris WEIS, 2015 | 44 | 2015 |
Attribute-based credentials for trust (abc4trust) A Sabouri, I Krontiris, K Rannenberg Trust, Privacy and Security in Digital Business: 9th International …, 2012 | 44 | 2012 |
D2. 1 architecture for attribute-based credential technologies J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ... Deliverable, ABC4Trust EU Project, 2011 | 44 | 2011 |
Privacy-by-design based on quantitative threat modeling J Luna, N Suri, I Krontiris 2012 7th International Conference on Risks and Security of Internet and …, 2012 | 43 | 2012 |
Arbitrary code injection through self-propagating worms in von neumann architecture devices T Giannetsos, T Dimitriou, I Krontiris, NR Prasad The Computer Journal 53 (10), 1576-1593, 2010 | 40 | 2010 |
Privacy-respecting discovery of data providers in crowd-sensing applications I Krontiris, T Dimitriou 2013 IEEE International Conference on Distributed Computing in Sensor …, 2013 | 39 | 2013 |
PEPPeR: A querier’s privacy enhancing protocol for participatory sensing T Dimitriou, I Krontiris, A Sabouri Security and Privacy in Mobile Information and Communication Systems: 4th …, 2012 | 36 | 2012 |
A platform for privacy protection of data requesters and data providers in mobile sensing I Krontiris, T Dimitriou Computer Communications 65, 43-54, 2015 | 31 | 2015 |
User acceptance of privacy-abcs: An exploratory study Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 30 | 2014 |