2017
Chamatidis, Ilias; Katsika, Aggeliki; Spathoulas, Georgios
Using deep learning neural networks for ECG based authentication Proceedings Article
In: 2017 International Carnahan Conference on Security Technology (ICCST), pp. 1–6, IEEE 2017.
BibTeX | Tags: biometrics, security
@inproceedings{chamatidis2017usingc,
title = {Using deep learning neural networks for ECG based authentication},
author = {Ilias Chamatidis and Aggeliki Katsika and Georgios Spathoulas},
year = {2017},
date = {2017-01-01},
booktitle = {2017 International Carnahan Conference on Security Technology (ICCST)},
pages = {1--6},
organization = {IEEE},
keywords = {biometrics, security},
pubstate = {published},
tppubtype = {inproceedings}
}
0000
"Dimitrios, Myridakis; Georgios, Spathoulas; Athanasios, Kakarountas; Schoinianakis, Dimitrios; Lueken, Joachim"
"Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems" Book Chapter
In: "Gupta, Nishu; Paiva, Sara" (Ed.): "IoT and ICT for Healthcare Applications", pp. "175–189", "Springer International Publishing", "Cham", 0000, ISBN: "978-3-030-42934-8".
Abstract | Links | BibTeX | Tags: Anomaly Detection, biometrics, Hardware Security, Health Applications, Intrusion Detection, IoT, Smart Device
@inbook{Dimitrios2020b,
title = {"Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems"},
author = {Myridakis "Dimitrios and Spathoulas Georgios and Kakarountas Athanasios and Dimitrios Schoinianakis and Joachim" Lueken},
editor = {Nishu "Gupta and Sara" Paiva},
url = {"https://doi.org/10.1007/978-3-030-42934-8_10"},
doi = {"10.1007/978-3-030-42934-8_10"},
isbn = {"978-3-030-42934-8"},
booktitle = {"IoT and ICT for Healthcare Applications"},
pages = {"175--189"},
publisher = {"Springer International Publishing"},
address = {"Cham"},
abstract = {"The Internet of Things (IoT) encompasses cyber and physical objects in multidisciplinary applications such as home automation, industrial process, environmental monitoring, and human health, to mention a few. Especially the latter systems have seen rapid growth in hospitals and health centers over the last decade. The wireless healthcare monitoring devices of various technologies are presenting global interest, since they offer valuable health metrics to users and physicians and also they are easy to use on a day-to-day basis. This chapter refers to security issues associated to IoT devices in general and how a technique of bio-mimicking on smart devices may reveal potential attacks or malfunctions. The case of systems for healthcare and health monitoring is considered, in order to highlight the techniques' benefits in this topic. The approach is bio-inspired by human biometrics and adopted to fit the cyber world, referring to a device's state; specifically the paradigm of side channel attack is exploited. This introduces the notion that to secure devices for healthcare, the designer has to consider the ``health status'' of the device itself. Taking into consideration that these devices are limited by their functionality and functional characteristics, it is expected that any deviation from the expected normal operation would result in a similar deviation in any operational parameter."},
keywords = {Anomaly Detection, biometrics, Hardware Security, Health Applications, Intrusion Detection, IoT, Smart Device},
pubstate = {published},
tppubtype = {inbook}
}
Chamatidis, Ilias; Katsika, Aggeliki; Spathoulas, Georgios
Using deep learning neural networks for ECG based authentication Proceedings Article
In: 2017 International Carnahan Conference on Security Technology (ICCST), pp. 1–6, IEEE 2017.
@inproceedings{chamatidis2017usingc,
title = {Using deep learning neural networks for ECG based authentication},
author = {Ilias Chamatidis and Aggeliki Katsika and Georgios Spathoulas},
year = {2017},
date = {2017-01-01},
booktitle = {2017 International Carnahan Conference on Security Technology (ICCST)},
pages = {1--6},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
"Dimitrios, Myridakis; Georgios, Spathoulas; Athanasios, Kakarountas; Schoinianakis, Dimitrios; Lueken, Joachim"
"Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems" Book Chapter
In: "Gupta, Nishu; Paiva, Sara" (Ed.): "IoT and ICT for Healthcare Applications", pp. "175–189", "Springer International Publishing", "Cham", 0000, ISBN: "978-3-030-42934-8".
@inbook{Dimitrios2020b,
title = {"Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems"},
author = {Myridakis "Dimitrios and Spathoulas Georgios and Kakarountas Athanasios and Dimitrios Schoinianakis and Joachim" Lueken},
editor = {Nishu "Gupta and Sara" Paiva},
url = {"https://doi.org/10.1007/978-3-030-42934-8_10"},
doi = {"10.1007/978-3-030-42934-8_10"},
isbn = {"978-3-030-42934-8"},
booktitle = {"IoT and ICT for Healthcare Applications"},
pages = {"175--189"},
publisher = {"Springer International Publishing"},
address = {"Cham"},
abstract = {"The Internet of Things (IoT) encompasses cyber and physical objects in multidisciplinary applications such as home automation, industrial process, environmental monitoring, and human health, to mention a few. Especially the latter systems have seen rapid growth in hospitals and health centers over the last decade. The wireless healthcare monitoring devices of various technologies are presenting global interest, since they offer valuable health metrics to users and physicians and also they are easy to use on a day-to-day basis. This chapter refers to security issues associated to IoT devices in general and how a technique of bio-mimicking on smart devices may reveal potential attacks or malfunctions. The case of systems for healthcare and health monitoring is considered, in order to highlight the techniques' benefits in this topic. The approach is bio-inspired by human biometrics and adopted to fit the cyber world, referring to a device's state; specifically the paradigm of side channel attack is exploited. This introduces the notion that to secure devices for healthcare, the designer has to consider the ``health status'' of the device itself. Taking into consideration that these devices are limited by their functionality and functional characteristics, it is expected that any deviation from the expected normal operation would result in a similar deviation in any operational parameter."},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
