Sofia Anna Menesidou
Sofia Anna Menesidou
Digital Security & Trusted Computing Group at UBITECH Ltd
Verified email at
Cited by
Cited by
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
Human-centric artificial intelligence architecture for industry 5.0 applications
JM Rožanec, I Novalija, P Zajec, K Kenda, H Tavakoli Ghinani, S Suh, ...
International journal of production research 61 (20), 6847-6872, 2023
MILC: A secure and privacy-preserving mobile instant locator with chatting
A Loukas, D Damopoulos, SA Menesidou, ME Skarkala, G Kambourakis, ...
Information Systems Frontiers 14, 481-497, 2012
Sdn-based resilient smart grid: The sdn-microsense architecture
PR Grammatikis, P Sarigiannidis, C Dalamagkas, Y Spyridis, T Lagkas, ...
Digital 1 (4), 173-187, 2021
Secure edge computing with lightweight control-flow property-based attestation
N Koutroumpouchos, C Ntantogian, SA Menesidou, K Liang, P Gouvas, ...
2019 IEEE Conference on Network Softwarization (NetSoft), 84-92, 2019
Automated cyber and privacy risk management toolkit
G Gonzalez-Granadillo, SA Menesidou, D Papamartzivanos, R Romeu, ...
Sensors 21 (16), 5493, 2021
SECONDO: A platform for cybersecurity investments and cyber insurance decisions
A Farao, S Panda, SA Menesidou, E Veliou, N Episkopos, ...
Trust, Privacy and Security in Digital Business: 17th International …, 2020
Cryptographic key management in delay tolerant networks: A survey
SA Menesidou, V Katos, G Kambourakis
Future Internet 9 (3), 26, 2017
Authenticated key exchange (ake) in delay tolerant networks
SA Menesidou, V Katos
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
A perfect match: Converging and automating privacy and security impact assessment on-the-fly
D Papamartzivanos, SA Menesidou, P Gouvas, T Giannetsos
Future Internet 13 (2), 30, 2021
STARdom: an architecture for trusted and secure human-centered manufacturing systems
JM Rožanec, P Zajec, K Kenda, I Novalija, B Fortuna, D Mladenić, ...
Advances in Production Management Systems. Artificial Intelligence for …, 2021
A secure protocol for managing and sharing personal healthcare data
A Kiourtis, A Mavrogiorgou, SA Menesidou, P Gouvas, D Kyriazis
Integrated Citizen Centered Digital Health and Social Care, 92-96, 2020
The March 2012 heat wave in Northeast America as a possible effect of strong solar activity and unusual space plasma interactions
GC Anagnostopoulos, SAI Menesidou, DA Efthymiadis
Atmosphere 13 (6), 926, 2022
Automated key exchange protocol evaluation in delay tolerant networks
SA Menesidou, D Vardalis, V Katos
Computers & Security 59, 1-8, 2016
Identity management standards: A literature review
A Kiourtis, T Giannetsos, SA Menesidou, A Mavrogiorgou, C Symvoulidis, ...
Computers and Informatics 3 (1), 35-46, 2023
Dynamic risk assessment and certification in the power grid: a collaborative approach
A Liatifis, PR Alcazar, PR Grammatikis, D Papamartzivanos, S Menesidou, ...
2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022
ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing
P Radoglou-Grammatikis, A Liatifis, C Dalamagkas, A Lekidis, ...
Proceedings of the 18th International Conference on Availability …, 2023
Towards efficient control-flow attestation with software-assisted multi-level execution tracing
D Papamartzivanos, SA Menesidou, P Gouvas, T Giannetsos
2021 IEEE International Mediterranean Conference on Communications and …, 2021
Artificial intelligence and secure manufacturing: Filling gaps in making industrial environments safer
E Veliou, D Papamartzivanos, SA Menesidou, P Gouvas, T Giannetsos
Trusted Artificial Intelligence in Manufacturing, 30, 2021
A novel security architecture for a space-data DTN
NL Clarke, V Katos, SA Menesidou, B Ghita, S Furnell
Wired/Wireless Internet Communication: 10th International Conference, WWIC …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20