Emmanouil (Manos) Panaousis
Emmanouil (Manos) Panaousis
Verified email at greenwich.ac.uk - Homepage
Title
Cited by
Cited by
Year
Decision support approaches for cyber security investment
A Fielder, E Panaousis, P Malacaria, C Hankin, F Smeraldi
Decision Support Systems 86, 13-23, 2016
1462016
Game theory meets information security management
A Fielder, E Panaousis, P Malacaria, C Hankin, F Smeraldi
IFIP International Information Security Conference, 15-29, 2014
612014
Securing AODV against wormhole attacks in emergency MANET multimedia communications
EA Panaousis, L Nazaryan, C Politis
5th International Mobile Multimedia Communications Conference, 2009
512009
Cybersecurity games and investments: a decision support approach
E Panaousis, A Fielder, P Malacaria, C Hankin, F Smeraldi
5th International Conference on Decision and Game Theory for Security, 266-286, 2014
402014
A game theoretic approach for securing AODV in emergency mobile ad hoc networks
EA Panaousis, C Politis
IEEE 34th Conference on Local Computer Networks (LCN), 2009
272009
An options approach to cybersecurity investment
M Chronopoulos, E Panaousis, J Grossklags
IEEE Access 6, 12175 - 12186, 2017
222017
Risk assessment uncertainties in cybersecurity investments
A Fielder, S König, E Panaousis, S Schauer, S Rass
Games 9 (2), 34, 2018
20*2018
Secure message delivery games for device-to-device communications
E Panaousis, T Alpcan, H Fereidooni, M Conti
5th Conference on Decision and Game Theory for Security (GameSec), 2014
202014
A case study of internet of things based on wireless sensor networks and smartphones
A Tsitsigkos, F Entezami, T Ramrekha, C Politis, E Panaousis
28th Wireless World Research Forum meeting, 2012
18*2012
A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles
G Loukas, E Karapistoli, E Panaousis, P Sarigiannidis, A Bezemskij, ...
Ad Hoc Networks 84, 124-147, 2019
172019
A game-theoretic approach for minimizing security risks in the internet-of-things
G Rontidis, E Panaousis, A Laszka, T Dagiuklas, P Malacaria, T Alpcan
IEEE International Conference on Communication Workshop, 2639-2644, 2015
172015
Performance evaluation of secure video transmission over WIMAX
F Ehtisham, E Panaousis, C Politis
International Journal of Computer Networks & Communications, 3 (6), 131-144, 2011
162011
Adaptive and secure routing protocol for emergency mobile ad hoc networks
EA Panaousis, TA Ramrekha, GP Millar, C Politis
International Journal of Wireless & Mobile Computing,, 2010
162010
End-to-end security protection
L Nazaryan, EA Panaousis, C Politis
IEEE Vehicular Technology Magazine, 5 (1), 85-90, 2010
16*2010
Security model for emergency real-time communications in autonomous networks
EA Panaousis, C Politis, K Birkos, C Papageorgiou, T Dagiuklas
Information Systems Frontiers, 14 (3), 541-553, 2012
152012
ROBUST: Reliable Overlay Based Utilisation of Services and Topology for emergency MANETs
GP Millar, EA Panaousis, C Politis
19th Future Network and Mobile Summit, 2010
152010
ChaMeLeon (CML): a hybrid and adaptive routing protocol for emergency situations
T Ramrekha, E Panaousis, C Politis
152010
The applicability of ambient sensors as proximity evidence for NFC transactions
C Shepherd, I Gurulian, E Frank, K Markantonakis, R Naeem Akram, ...
IEEE Security and Privacy Workshops (SPW), 2017
142017
Optimizing the channel load reporting process in IEEE 802.11 k-enabled WLANs
EA Panaousis, PA Frangoudis, CN Ververidis, GC Polyzos
16th Workshop on Local and Metropolitan Area Networks, 2008
14*2008
ASTo: a tool for security analysis of IoT systems
O Mavropoulos, H Mouratidis, A Fish, E Panaousis
1st IEEE SERA Workshop on the Internet of People And Things, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20