Manos Panaousis
Manos Panaousis
Associate Professor, University of Greenwich
Verified email at - Homepage
TitleCited byYear
Decision Support Approaches for Cyber Security Investment
A Fielder, E Panaousis, P Malacaria, C Hankin, F Smeraldi
Decision Support Systems 86, 13-23, 2016
Game Theory Meets Information Security Management
A Fielder, E Panaousis, P Malacaria, C Hankin, F Smeraldi
IFIP International Information Security Conference, 15-29, 2014
Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications
EA Panaousis, L Nazaryan, C Politis
5th International Mobile Multimedia Communications Conference, 2009
Cybersecurity Games and Investments: A Decision Support Approach
E Panaousis, A Fielder, P Malacaria, C Hankin, F Smeraldi
5th International Conference on Decision and Game Theory for Security, 266-286, 2014
A Game Theoretic Approach for Securing AODV in Emergency Mobile Ad Hoc Networks
EA Panaousis, C Politis
IEEE 34th Conference on Local Computer Networks (LCN), 2009
Performance Evaluation of Secure Video Transmission over WIMAX
F Ehtisham, E Panaousis, C Politis
International Journal of Computer Networks & Communications, 3 (6), 131-144, 2011
Secure Message Delivery Games for Device-to-Device Communications
E Panaousis, T Alpcan, H Fereidooni, M Conti
5th Conference on Decision and Game Theory for Security (GameSec), 2014
A Case Study of Internet of Things Based on Wireless Sensor Networks and Smartphones
A Tsitsigkos, F Entezami, T Ramrekha, C Politis, E Panaousis
28th Wireless World Research Forum meeting, 2012
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks
EA Panaousis, TA Ramrekha, GP Millar, C Politis
International Journal of Wireless & Mobile Computing,, 2010
End-to-End Security Protection
L Nazaryan, EA Panaousis, C Politis
IEEE Vehicular Technology Magazine, 5 (1), 85-90, 2010
An Options Approach to Cybersecurity Investment
M Chronopoulos, E Panaousis, J Grossklags
IEEE Access 6, 12175 - 12186, 2017
ROBUST: Reliable Overlay Based Utilisation of Services and Topology for emergency MANETs
GP Millar, EA Panaousis, C Politis
19th Future Network and Mobile Summit, 2010
A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
G Rontidis, E Panaousis, A Laszka, T Dagiuklas, P Malacaria, T Alpcan
IEEE International Conference on Communication Workshop, 2639-2644, 2015
Security Model for Emergency Real-time Communications in Autonomous Networks
EA Panaousis, C Politis, K Birkos, C Papageorgiou, T Dagiuklas
Information Systems Frontiers, 14 (3), 541-553, 2012
ASTo: A Tool for Security Analysis of IoT Systems
O Mavropoulos, H Mouratidis, A Fish, E Panaousis
1st IEEE SERA Workshop on the Internet of People And Things, 2017
ChaMeLeon (CML): A Hybrid and Adaptive Routing Protocol for Emergency Situations
T Ramrekha, E Panaousis, C Politis
Optimizing the Channel Load Reporting Process in IEEE 802.11 k-enabled WLANs
EA Panaousis, PA Frangoudis, CN Ververidis, GC Polyzos
16th Workshop on Local and Metropolitan Area Networks, 2008
Uncertainty in Cyber Security Investments
A Fielder, S Konig, E Panaousis, S Schauer, S Rass
arXiv preprint arXiv:1712.05893, 2017
A Conceptual Model to Support Security Analysis in the Internet of Things
O Mavropoulos, H Mouratidis, A Fish, Panaousis, Emmanouil, ...
Computer Science and Information Systems. 14 (2), 557-578, 2017
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions
C Shepherd, I Gurulian, E Frank, K Markantonakis, R Naeem Akram, ...
IEEE Security and Privacy Workshops (SPW), 2017
The system can't perform the operation now. Try again later.
Articles 1–20