2021
Myridakis, Dimitrios; Myridakis, Paul; Kakarountas, Athanasios
A Power Dissipation Monitoring Circuit for Intrusion Detection and Botnet Prevention on IoT Devices Journal Article
In: Computation, vol. 9, no. 2, pp. 19, 2021.
BibTeX | Tags: Hardware, IoT, security, Smart Devices
@article{myridakis2021power,
title = {A Power Dissipation Monitoring Circuit for Intrusion Detection and Botnet Prevention on IoT Devices},
author = {Dimitrios Myridakis and Paul Myridakis and Athanasios Kakarountas},
year = {2021},
date = {2021-01-01},
journal = {Computation},
volume = {9},
number = {2},
pages = {19},
publisher = {Multidisciplinary Digital Publishing Institute},
keywords = {Hardware, IoT, security, Smart Devices},
pubstate = {published},
tppubtype = {article}
}
Maglogiannis, Ilias; Kontogianni, Georgia; Papadodima, Olga; Karanikas, Haralampos; Billiris, Antonis; Chatziioannou, Aristotle
An Integrated Platform for Skin Cancer Heterogenous and Multilayered Data Management Journal Article
In: Journal of Medical Systems, vol. 45, 2021.
@article{articleb,
title = {An Integrated Platform for Skin Cancer Heterogenous and Multilayered Data Management},
author = {Ilias Maglogiannis and Georgia Kontogianni and Olga Papadodima and Haralampos Karanikas and Antonis Billiris and Aristotle Chatziioannou},
doi = {10.1007/s10916-020-01679-3},
year = {2021},
date = {2021-01-01},
journal = {Journal of Medical Systems},
volume = {45},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Spathoulas, Georgios; Negka, Lydia; Pandey, Pankaj; Katsikas, Sokratis
Can Blockchain Technology Enhance Security and Privacy in the Internet of Things? Book Chapter
In: Tsihrintzis, George A; Virvou, Maria (Ed.): pp. 199–228, Springer International Publishing, Cham, 2021, ISBN: 978-3-030-41196-1.
BibTeX | Tags: blockchain, IoT, privacy, security
@inbook{Spathoulas2021,
title = {Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?},
author = {Georgios Spathoulas and Lydia Negka and Pankaj Pandey and Sokratis Katsikas},
editor = {George A Tsihrintzis and Maria Virvou},
isbn = {978-3-030-41196-1},
year = {2021},
date = {2021-01-01},
pages = {199--228},
publisher = {Springer International Publishing},
address = {Cham},
keywords = {blockchain, IoT, privacy, security},
pubstate = {published},
tppubtype = {inbook}
}
Kavallieratos, Georgios; Spathoulas, Georgios; Katsikas, Sokratis
Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems Journal Article
In: Sensors, vol. 21, no. 5, 2021, ISSN: 1424-8220.
Abstract | Links | BibTeX | Tags:
@article{s21051691,
title = {Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems},
author = {Georgios Kavallieratos and Georgios Spathoulas and Sokratis Katsikas},
url = {https://www.mdpi.com/1424-8220/21/5/1691},
doi = {10.3390/s21051691 keywords=security, cyberphysical},
issn = {1424-8220},
year = {2021},
date = {2021-01-01},
journal = {Sensors},
volume = {21},
number = {5},
abstract = {The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other to form systems-of-systems. This interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at component systems. The complexity of the resulting systems-of-systems in many cases leads to difficulty in analyzing cyber risk. Additionally, the selection of cybersecurity controls that will effectively and efficiently treat the cyber risk is commonly performed manually, or at best with limited automated decision support. In this work, we propose a method for analyzing risk propagation and aggregation in complex CPSs utilizing the results of risk assessments of their individual constituents. Additionally, we propose a method employing evolutionary programming for automating the selection of an optimal set of cybersecurity controls out of a list of available controls, that will minimize the residual risk and the cost associated with the implementation of these measures. We illustrate the workings of the proposed methods by applying them to the navigational systems of two variants of the Cyber-Enabled Ship (C-ES), namely the autonomous ship and the remotely controlled ship. The results are sets of cybersecurity controls applied to those components of the overall system that have been identified in previous studies as the most vulnerable ones; such controls minimize the residual risk, while also minimizing the cost of implementation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2020
Giannoukos, Georgios; Kakarountas, Athanasios; Chioktour, Vasileios
Interaction between two cells based on a recurrent neural network using the impedance concept Journal Article
In: Journal of Computational Methods in Sciences and Engineering, pp. 1–7, 2020, ISSN: 14727978, 18758983.
Links | BibTeX | Tags: Hardware, Neural Networks
@article{Giannoukos_Kakarountas_Chioktour_2020,
title = {Interaction between two cells based on a recurrent neural network using the impedance concept},
author = {Georgios Giannoukos and Athanasios Kakarountas and Vasileios Chioktour},
doi = {10.3233/JCM-204367},
issn = {14727978, 18758983},
year = {2020},
date = {2020-07-01},
journal = {Journal of Computational Methods in Sciences and Engineering},
pages = {1–7},
keywords = {Hardware, Neural Networks},
pubstate = {published},
tppubtype = {article}
}
Myridakis, Dimitrios; Spathoulas, Georgios; Kakarountas, Athanasios; Schinianakis, Dimitrios
Smart Devices Security Enhancement via Power Supply Monitoring Journal Article
In: Future Internet, vol. 12, no. 3, 2020, ISSN: 1999-5903.
Abstract | Links | BibTeX | Tags: Anomaly Detection, Hardware, IoT, security, smart device; current monitoring; physical characteristics
@article{fi12030048,
title = {Smart Devices Security Enhancement via Power Supply Monitoring},
author = {Dimitrios Myridakis and Georgios Spathoulas and Athanasios Kakarountas and Dimitrios Schinianakis},
url = {https://www.mdpi.com/1999-5903/12/3/48},
doi = {10.3390/fi12030048},
issn = {1999-5903},
year = {2020},
date = {2020-01-01},
journal = {Future Internet},
volume = {12},
number = {3},
abstract = {The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal and public security. This may be easily understood either due to the sensitivity of the collected data, or by our dependability to the devices' operation. Considering that most IoT devices are of low cost and are used for various tasks, such as monitoring people or controlling indoor environmental conditions, the security factor should be enhanced. This paper presents the exploitation of side-channel attack technique for protecting low-cost smart devices in an intuitive way. The work aims to extend the dataset provided to an Intrusion Detection Systems (IDS) in order to achieve a higher accuracy in anomaly detection. Thus, along with typical data provided to an IDS, such as network traffic, transmitted packets, CPU usage, etc., it is proposed to include information regarding the device’s physical state and behaviour such as its power consumption, the supply current, the emitted heat, etc. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn of an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aimed to affect the intrusion detection process of IoT and proposes for consideration new inputs of interest with a collateral interest of study. In parallel, malfunction of the device is also detected, extending this work’s application to issues of reliability and maintainability. The results present 100% attack detection and this is the first time that a low-cost security solution suitable for every type of target devices is presented.},
keywords = {Anomaly Detection, Hardware, IoT, security, smart device; current monitoring; physical characteristics},
pubstate = {published},
tppubtype = {article}
}
Kavallieratos, Georgios; Spathoulas, Georgios; Katsikas, Sokratis
Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems Journal Article
In: Sensors, vol. 21, no. 5, 2021, ISSN: 1424-8220.
@article{s21051691,
title = {Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems},
author = {Georgios Kavallieratos and Georgios Spathoulas and Sokratis Katsikas},
url = {https://www.mdpi.com/1424-8220/21/5/1691},
doi = {10.3390/s21051691 keywords=security, cyberphysical},
issn = {1424-8220},
year = {2021},
date = {2021-01-01},
journal = {Sensors},
volume = {21},
number = {5},
abstract = {The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other to form systems-of-systems. This interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at component systems. The complexity of the resulting systems-of-systems in many cases leads to difficulty in analyzing cyber risk. Additionally, the selection of cybersecurity controls that will effectively and efficiently treat the cyber risk is commonly performed manually, or at best with limited automated decision support. In this work, we propose a method for analyzing risk propagation and aggregation in complex CPSs utilizing the results of risk assessments of their individual constituents. Additionally, we propose a method employing evolutionary programming for automating the selection of an optimal set of cybersecurity controls out of a list of available controls, that will minimize the residual risk and the cost associated with the implementation of these measures. We illustrate the workings of the proposed methods by applying them to the navigational systems of two variants of the Cyber-Enabled Ship (C-ES), namely the autonomous ship and the remotely controlled ship. The results are sets of cybersecurity controls applied to those components of the overall system that have been identified in previous studies as the most vulnerable ones; such controls minimize the residual risk, while also minimizing the cost of implementation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Spathoulas, Georgios; Negka, Lydia; Pandey, Pankaj; Katsikas, Sokratis
Can Blockchain Technology Enhance Security and Privacy in the Internet of Things? Book Chapter
In: Tsihrintzis, George A; Virvou, Maria (Ed.): pp. 199–228, Springer International Publishing, Cham, 2021, ISBN: 978-3-030-41196-1.
@inbook{Spathoulas2021,
title = {Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?},
author = {Georgios Spathoulas and Lydia Negka and Pankaj Pandey and Sokratis Katsikas},
editor = {George A Tsihrintzis and Maria Virvou},
isbn = {978-3-030-41196-1},
year = {2021},
date = {2021-01-01},
pages = {199--228},
publisher = {Springer International Publishing},
address = {Cham},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
Maglogiannis, Ilias; Kontogianni, Georgia; Papadodima, Olga; Karanikas, Haralampos; Billiris, Antonis; Chatziioannou, Aristotle
An Integrated Platform for Skin Cancer Heterogenous and Multilayered Data Management Journal Article
In: Journal of Medical Systems, vol. 45, 2021.
@article{articleb,
title = {An Integrated Platform for Skin Cancer Heterogenous and Multilayered Data Management},
author = {Ilias Maglogiannis and Georgia Kontogianni and Olga Papadodima and Haralampos Karanikas and Antonis Billiris and Aristotle Chatziioannou},
doi = {10.1007/s10916-020-01679-3},
year = {2021},
date = {2021-01-01},
journal = {Journal of Medical Systems},
volume = {45},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Myridakis, Dimitrios; Myridakis, Paul; Kakarountas, Athanasios
A Power Dissipation Monitoring Circuit for Intrusion Detection and Botnet Prevention on IoT Devices Journal Article
In: Computation, vol. 9, no. 2, pp. 19, 2021.
@article{myridakis2021power,
title = {A Power Dissipation Monitoring Circuit for Intrusion Detection and Botnet Prevention on IoT Devices},
author = {Dimitrios Myridakis and Paul Myridakis and Athanasios Kakarountas},
year = {2021},
date = {2021-01-01},
journal = {Computation},
volume = {9},
number = {2},
pages = {19},
publisher = {Multidisciplinary Digital Publishing Institute},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Giannoukos, Georgios; Kakarountas, Athanasios; Chioktour, Vasileios
Interaction between two cells based on a recurrent neural network using the impedance concept Journal Article
In: Journal of Computational Methods in Sciences and Engineering, pp. 1–7, 2020, ISSN: 14727978, 18758983.
@article{Giannoukos_Kakarountas_Chioktour_2020,
title = {Interaction between two cells based on a recurrent neural network using the impedance concept},
author = {Georgios Giannoukos and Athanasios Kakarountas and Vasileios Chioktour},
doi = {10.3233/JCM-204367},
issn = {14727978, 18758983},
year = {2020},
date = {2020-07-01},
journal = {Journal of Computational Methods in Sciences and Engineering},
pages = {1–7},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Kakarountas, Athanasios; Spathoulas, Georgios; Trivellas, Panagiotis; Reklitis, Panagiotis; Malindretos, George
Survey on Routing Services for Smart Delivery in Urban Environments Proceedings Article
In: 2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pp. 1–5, IEEE 2020.
@inproceedings{kakarountas2020survey,
title = {Survey on Routing Services for Smart Delivery in Urban Environments},
author = {Athanasios Kakarountas and Georgios Spathoulas and Panagiotis Trivellas and Panagiotis Reklitis and George Malindretos},
year = {2020},
date = {2020-01-01},
booktitle = {2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)},
pages = {1--5},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Kalovrektis, Konstantinos; Xenakis, Apostolos; Korinthios, Ioannis; Kakarountas, Athanasios; Gotsinas, Antonios; Stamoulis, George
An IoT--Sensor Based Hand Trembling Robotic System for Studying Parkinson’s Symptoms Journal Article
In: 2020.
@article{kalovrektis2020iot,
title = {An IoT--Sensor Based Hand Trembling Robotic System for Studying Parkinson’s Symptoms},
author = {Konstantinos Kalovrektis and Apostolos Xenakis and Ioannis Korinthios and Athanasios Kakarountas and Antonios Gotsinas and George Stamoulis},
year = {2020},
date = {2020-01-01},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Vassiliou, Alice G; Georgakopoulou, Christina; Papageorgiou, Alexandra; Georgakopoulos, Spiros; Goulas, Spiros; Paschalis, Theodoros; Paterakis, Panagiotis; Gallos, Parisis; Kyriazis, Dimos; Plagianakos, Vassilis
Health in All Policy Making Utilizing Big Data Journal Article
In: Acta Informatica Medica, vol. 28, no. 1, pp. 65, 2020.
@article{vassiliou2020health,
title = {Health in All Policy Making Utilizing Big Data},
author = {Alice G Vassiliou and Christina Georgakopoulou and Alexandra Papageorgiou and Spiros Georgakopoulos and Spiros Goulas and Theodoros Paschalis and Panagiotis Paterakis and Parisis Gallos and Dimos Kyriazis and Vassilis Plagianakos},
year = {2020},
date = {2020-01-01},
journal = {Acta Informatica Medica},
volume = {28},
number = {1},
pages = {65},
publisher = {The Academy of Medical Sciences of Bosnia and Herzegovina},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Myridakis, Dimitrios; Spathoulas, Georgios; Kakarountas, Athanasios; Schinianakis, Dimitrios
Smart Devices Security Enhancement via Power Supply Monitoring Journal Article
In: Future Internet, vol. 12, no. 3, 2020, ISSN: 1999-5903.
@article{fi12030048,
title = {Smart Devices Security Enhancement via Power Supply Monitoring},
author = {Dimitrios Myridakis and Georgios Spathoulas and Athanasios Kakarountas and Dimitrios Schinianakis},
url = {https://www.mdpi.com/1999-5903/12/3/48},
doi = {10.3390/fi12030048},
issn = {1999-5903},
year = {2020},
date = {2020-01-01},
journal = {Future Internet},
volume = {12},
number = {3},
abstract = {The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal and public security. This may be easily understood either due to the sensitivity of the collected data, or by our dependability to the devices' operation. Considering that most IoT devices are of low cost and are used for various tasks, such as monitoring people or controlling indoor environmental conditions, the security factor should be enhanced. This paper presents the exploitation of side-channel attack technique for protecting low-cost smart devices in an intuitive way. The work aims to extend the dataset provided to an Intrusion Detection Systems (IDS) in order to achieve a higher accuracy in anomaly detection. Thus, along with typical data provided to an IDS, such as network traffic, transmitted packets, CPU usage, etc., it is proposed to include information regarding the device’s physical state and behaviour such as its power consumption, the supply current, the emitted heat, etc. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn of an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aimed to affect the intrusion detection process of IoT and proposes for consideration new inputs of interest with a collateral interest of study. In parallel, malfunction of the device is also detected, extending this work’s application to issues of reliability and maintainability. The results present 100% attack detection and this is the first time that a low-cost security solution suitable for every type of target devices is presented.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Myridakis, Dimitrios; Spathoulas, Georgios; Kakarountas, Athanasios; Schinianakis, Dimitrios
Smart Devices Security Enhancement via Power Supply Monitoring Journal Article
In: Future Internet, vol. 12, no. 3, pp. 48, 2020.
@article{myridakis2020smart,
title = {Smart Devices Security Enhancement via Power Supply Monitoring},
author = {Dimitrios Myridakis and Georgios Spathoulas and Athanasios Kakarountas and Dimitrios Schinianakis},
year = {2020},
date = {2020-01-01},
journal = {Future Internet},
volume = {12},
number = {3},
pages = {48},
publisher = {Multidisciplinary Digital Publishing Institute},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Anagnostopoulos, M; Spathoulas, G; Viaño, B; Augusto-Gonzalez, J
Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set Journal Article
In: Sensors, vol. 20, no. 22, pp. 6600, 2020.
@article{anagnostopoulos2020,
title = {Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set},
author = {M Anagnostopoulos and G Spathoulas and B Viaño and J Augusto-Gonzalez},
year = {2020},
date = {2020-01-01},
journal = {Sensors},
volume = {20},
number = {22},
pages = {6600},
publisher = {Multidisciplinary Digital Publishing Institute},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Spathoulas, Georgios; Theodoridis, Georgios; Damiris, Georgios-Paraskevas
Using homomorphic encryption for privacy preserving clustering of intrusion detection alerts Journal Article
In: International Journal of Information Security, Springer (paper accepted), 2020.
@article{spathoulas2020ppcolab,
title = {Using homomorphic encryption for privacy preserving clustering of intrusion detection alerts},
author = {Georgios Spathoulas and Georgios Theodoridis and Georgios-Paraskevas Damiris},
year = {2020},
date = {2020-01-01},
journal = {International Journal of Information Security, Springer (paper accepted)},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Belalis, Ilias; Kavallieratos, Georgios; Gkioulos, Vasileios; Spathoulas, Georgios
Enabling Defensive Deception by Leveraging Software Defined Networks Proceedings Article
In: INTERNET 2020 The Twelfth International Conference on Evolving Internet, International Academy, Research and Industry Association (IARIA) keywords=network, security 2020.
@inproceedings{belalis2020enabling,
title = {Enabling Defensive Deception by Leveraging Software Defined Networks},
author = {Ilias Belalis and Georgios Kavallieratos and Vasileios Gkioulos and Georgios Spathoulas},
year = {2020},
date = {2020-01-01},
booktitle = {INTERNET 2020 The Twelfth International Conference on Evolving Internet},
organization = {International Academy, Research and Industry Association (IARIA) keywords=network, security},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Giannoutakis, KM; Spathoulas, G; Filelis-Papadopoulos, CK; Collen, A; Anagnostopoulos, M; Votis, K; Nijdam, NA
A Blockchain Solution for Enhancing Cybersecurity Defence of IoT Proceedings Article
In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 490–495, IEEE keywords=security, privacy, blockchain, iot 2020.
@inproceedings{giannoutakis2020blockchain,
title = {A Blockchain Solution for Enhancing Cybersecurity Defence of IoT},
author = {KM Giannoutakis and G Spathoulas and CK Filelis-Papadopoulos and A Collen and M Anagnostopoulos and K Votis and NA Nijdam},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE International Conference on Blockchain (Blockchain)},
pages = {490--495},
organization = {IEEE keywords=security, privacy, blockchain, iot},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Toutara, Foteini; Spathoulas, Georgios
A distributed biometric authentication scheme based on blockchain Proceedings Article
In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 470–475, blockchain, biometrics, security 2020.
@inproceedings{toutara2020distributed,
title = {A distributed biometric authentication scheme based on blockchain},
author = {Foteini Toutara and Georgios Spathoulas},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE International Conference on Blockchain (Blockchain)},
pages = {470--475},
organization = {blockchain, biometrics, security},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Dimitrios, Myridakis; Georgios, Spathoulas; Athanasios, Kakarountas; Schoinianakis, Dimitrios; Lueken, Joachim
Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems Book Chapter
In: Gupta, Nishu; Paiva, Sara (Ed.): IoT and ICT for Healthcare Applications, pp. 175–189, Springer International Publishing, Cham, 2020, ISBN: 978-3-030-42934-8.
@inbook{Dimitrios2020,
title = {Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems},
author = {Myridakis Dimitrios and Spathoulas Georgios and Kakarountas Athanasios and Dimitrios Schoinianakis and Joachim Lueken},
editor = {Nishu Gupta and Sara Paiva},
doi = {10.1007/978-3-030-42934-8_10},
isbn = {978-3-030-42934-8},
year = {2020},
date = {2020-01-01},
booktitle = {IoT and ICT for Healthcare Applications},
pages = {175--189},
publisher = {Springer International Publishing},
address = {Cham},
abstract = {The Internet of Things (IoT) encompasses cyber and physical objects in multidisciplinary applications such as home automation, industrial process, environmental monitoring, and human health, to mention a few. Especially the latter systems have seen rapid growth in hospitals and health centers over the last decade. The wireless healthcare monitoring devices of various technologies are presenting global interest, since they offer valuable health metrics to users and physicians and also they are easy to use on a day-to-day basis. This chapter refers to security issues associated to IoT devices in general and how a technique of bio-mimicking on smart devices may reveal potential attacks or malfunctions. The case of systems for healthcare and health monitoring is considered, in order to highlight the techniques' benefits in this topic. The approach is bio-inspired by human biometrics and adopted to fit the cyber world, referring to a device's state; specifically the paradigm of side channel attack is exploited. This introduces the notion that to secure devices for healthcare, the designer has to consider the ``health status'' of the device itself. Taking into consideration that these devices are limited by their functionality and functional characteristics, it is expected that any deviation from the expected normal operation would result in a similar deviation in any operational parameter.},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
Tasoulis, Sotiris; Pavlidis, Nicos G; Roos, Teemu
Nonlinear dimensionality reduction for clustering Journal Article
In: Pattern Recognition, vol. 107, pp. 107508, 2020, ISSN: 0031-3203.
@article{TASOULIS2020107508,
title = {Nonlinear dimensionality reduction for clustering},
author = {Sotiris Tasoulis and Nicos G Pavlidis and Teemu Roos},
url = {https://www.sciencedirect.com/science/article/pii/S0031320320303113},
doi = {https://doi.org/10.1016/j.patcog.2020.107508},
issn = {0031-3203},
year = {2020},
date = {2020-01-01},
journal = {Pattern Recognition},
volume = {107},
pages = {107508},
abstract = {We introduce an approach to divisive hierarchical clustering that is capable of identifying clusters in nonlinear manifolds. This approach uses the isometric mapping (Isomap) to recursively embed (subsets of) the data in one dimension, and then performs a binary partition designed to avoid the splitting of clusters. We provide a theoretical analysis of the conditions under which contiguous and high-density clusters in the original space are guaranteed to be separable in the one-dimensional embedding. To the best of our knowledge there is little prior work that studies this problem. Extensive experiments on simulated and real data sets show that hierarchical divisive clustering algorithms derived from this approach are effective.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
KONTZINOS, C; KONTOULIS, M; KAPSALIS, P; MARKAKI, O; MOUZAKITIS, S; MANTA, R; ANDROUTSOU, T; KOURIS, I; KARANIKAS, H; BILLIRIS, A; CHRISTODOULAKIS, A; THIREOS, E
Methodology for secure storage and information exchange of medical data based on blockchain. Journal Article
In: Archives of Hellenic Medicine / Arheia Ellenikes Iatrikes, vol. 37, no. 4, pp. 542 - 554, 2020, ISSN: 11053992.
@article{14564951920200701,
title = {Methodology for secure storage and information exchange of medical data based on blockchain.},
author = {C KONTZINOS and M KONTOULIS and P KAPSALIS and O MARKAKI and S MOUZAKITIS and R MANTA and T ANDROUTSOU and I KOURIS and H KARANIKAS and A BILLIRIS and A CHRISTODOULAKIS and E THIREOS},
url = {http://search.ebscohost.com/login.aspx?direct=true&db=asn&AN=145649519&site=ehost-live},
issn = {11053992},
year = {2020},
date = {2020-01-01},
journal = {Archives of Hellenic Medicine / Arheia Ellenikes Iatrikes},
volume = {37},
number = {4},
pages = {542 - 554},
abstract = {The rapid technological developments of the 21st century and the adoption of Internet 4.0 technologies in all facets of everyday life, has led to the digitization of services even in areas that have traditionally operated without the help of technology. One of the areas that is being modernized due to the abovementioned developments is that of health care. Medical process automation, robotics and medical devices are creating a wealth of digital health data. Each patient's health data is organized and structured in electronic health records (EHR), which are usually stored in the central databases of healthcare providers. Although EHRs offer many possibilities, the centralized data storage makes them vulnerable to malicious attack, and they do not provide interoperability between the systems of different healthcare providers. Blockchain is a technology that provides appropriate solutions and which can eliminate the abovementioned challenges in the healthcare sector. Decentralized data s},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Tsoukas, Vasileios; Gkogkidis, Anargyros; Kakarountas, Athanasios
A Survey on Mobile User Perceptions of Sensitive Data and Authentication Methods Proceedings Article
In: 24th Pan-Hellenic Conference on Informatics, pp. 346–349, 2020.
@inproceedings{tsoukas2020survey,
title = {A Survey on Mobile User Perceptions of Sensitive Data and Authentication Methods},
author = {Vasileios Tsoukas and Anargyros Gkogkidis and Athanasios Kakarountas},
year = {2020},
date = {2020-01-01},
booktitle = {24th Pan-Hellenic Conference on Informatics},
pages = {346--349},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Petroulaki, Olga; Bicaku, Angeliki; Kakarountas, Athanasios
A Generalized Tonic-Clonic Seizure Detection Method in a Bathtub using a Natural Language Verification Step Proceedings Article
In: 24th Pan-Hellenic Conference on Informatics, pp. 407–410, 2020.
@inproceedings{petroulaki2020generalized,
title = {A Generalized Tonic-Clonic Seizure Detection Method in a Bathtub using a Natural Language Verification Step},
author = {Olga Petroulaki and Angeliki Bicaku and Athanasios Kakarountas},
year = {2020},
date = {2020-01-01},
booktitle = {24th Pan-Hellenic Conference on Informatics},
pages = {407--410},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}