Thanassis Giannetsos
Thanassis Giannetsos
Head of Unit - Secure Systems & Trusted Computing Group at UBITECH
Verified email at - Homepage
Cited by
Cited by
A taxonomy and survey of attacks against machine learning
N Pitropakis, E Panaousis, T Giannetsos, E Anastasiadis, G Loukas
Computer Science Review 34, 100199, 2019
Intrusion detection of sinkhole attacks in wireless sensor networks
I Krontiris, T Dimitriou, T Giannetsos, M Mpasoukos
International symposium on algorithms and experiments for sensor systems …, 2007
Launching a sinkhole attack in wireless sensor networks; the intruder side
I Krontiris, T Giannetsos, T Dimitriou
2008 IEEE International Conference on Wireless and Mobile Computing …, 2008
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009
Security, privacy, and incentive provision for mobile crowd sensing systems
S Gisdakis, T Giannetsos, P Papadimitratos
IEEE Internet of Things Journal 3 (5), 839-853, 2016
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
I Krontiris, T Giannetsos, T Dimitriou
Proceedings of the 4th international conference on Security and privacy in …, 2008
SPPEAR: security & privacy-preserving architecture for participatory-sensing applications
S Gisdakis, T Giannetsos, P Papadimitratos
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)
S Liaqat, A Akhunzada, FS Shaikh, A Giannetsos, MA Jan
IEEE Computer Communications, 2020
Human-centric artificial intelligence architecture for industry 5.0 applications
JM Rožanec, I Novalija, P Zajec, K Kenda, H Tavakoli Ghinani, S Suh, ...
International journal of production research 61 (20), 6847-6872, 2023
SHIELD: A data verification framework for participatory sensing systems
S Gisdakis, T Giannetsos, P Papadimitratos
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
SEROSA: SERvice Oriented Security Architecture for Vehicular Communications
S Gisdakis, M Lagana, T Giannetsos, P Papadimitratos
Vehicular Networking Conference (VNC), 2013 IEEE, 111-118, 2013
Toward practical privacy-preserving processing over encrypted data in IoT: an assistive healthcare use case
L Jiang, L Chen, T Giannetsos, B Luo, K Liang, J Han
IEEE Internet of Things Journal 6 (6), 10177-10190, 2019
People‐centric sensing in assistive healthcare: Privacy challenges and directions
T Giannetsos, T Dimitriou, NR Prasad
Security and Communication Networks 4 (11), 1295-1307, 2011
Privacy-enhanced capabilities for vanets using direct anonymous attestation
J Whitefield, L Chen, T Giannetsos, S Schneider, H Treharne
2017 IEEE Vehicular Networking Conference (VNC), 123-130, 2017
Trustworthy people-centric sensing: Privacy, security and user incentives road-map
T Giannetsos, S Gisdakis, P Papadimitratos
2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), 39-46, 2014
Arbitrary code injection through self-propagating worms in von neumann architecture devices
T Giannetsos, T Dimitriou, I Krontiris, NR Prasad
The Computer Journal 53 (10), 1576-1593, 2010
Spy-sense: Spyware tool for executing stealthy exploits against sensor networks
T Giannetsos, T Dimitriou
Proceedings of the 2nd ACM workshop on Hot topics on wireless network …, 2013
Unsupervised Learning for Trustworthy IoT
N Banerjee, T Giannetsos, E Panaousis, CC Took
2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1-8, 2018
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks
T Giannetsos, T Dimitriou
Journal of Computer and System Sciences 80 (3), 618-643, 2014
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation
N Koutroumpouchos, C Ntantogian, SA Menesidou, K Liang, P Gouvas, ...
2019 IEEE Conference on Network Softwarization (NetSoft), 2019
The system can't perform the operation now. Try again later.
Articles 1–20