Secure routing for mobile ad hoc networks. PG Argyroudis, D O'mahony IEEE Commun. Surv. Tutorials 7 (1-4), 2-21, 2005 | 212 | 2005 |
Real-time intrusion detection for ad hoc networks L Stamouli, PG Argyroudis, H Tewari Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 128 | 2005 |
Performance analysis of cryptographic protocols on handheld devices PG Argyroudis, R Verma, H Tewari, D O'Mahony Third IEEE International Symposium on Network Computing and Applications …, 2004 | 128 | 2004 |
Exploiting the jemalloc memory allocator: Owning Firefox’s heap P Argyroudis, C Karamitas Blackhat USA, 2012 | 24 | 2012 |
Securing communications in the smart home PG Argyroudis, D O’Mahony International Conference on Embedded and Ubiquitous Computing, 891-902, 2004 | 22 | 2004 |
Grouping abstraction and authority control in policy-based spectrum management K Feeney, D Lewis, P Argyroudis, K Nolan, D O'Sullivan 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2007 | 15 | 2007 |
Managing policies for dynamic spectrum access D Lewis, K Feeney, K Foley, L Doyle, T Forde, P Argyroudis, J Keeney, ... Autonomic Networking: First International IFIP TC6 Conference, AN 2006 …, 2006 | 15 | 2006 |
A policy-driven trading framework for market-based spectrum assignment P Argyroudis, T Forde, L Doyle, D O'Mahony Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007 | 12 | 2007 |
Matching electricity supply and demand using smart meters and home automation R Verma, P Argyroudis, D O'Mahony 2009 IEEE PES/IAS Conference on Sustainable Alternative Energy (SAE), 1-7, 2009 | 10 | 2009 |
Collaborative service evaluation with the TwoHop trust framework D Glynos, P Argyroudis, C Douligeris Security and Communication Networks 5 (6), 594-613, 2012 | 9 | 2012 |
Protecting the core: Kernel exploitation mitigations P Argyroudis, D Glynos Black Hat Europe’11, 2011 | 9 | 2011 |
ÆTHER: An authorization management architecture for ubiquitous computing PG Argyroudis, D O’Mahony European Public Key Infrastructure Workshop, 246-259, 2004 | 8 | 2004 |
Twohop: metric-based trust evaluation for peer-to-peer collaboration environments D Glynos, P Argyroudis, C Douligeris, D O'Mahony IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008 | 6 | 2008 |
Comparing the costs of public key authentication infrastructures P Argyroudis, R McAdoo, D O’Mahony Proc. 1st Workshop on the Economics of Securing the Information …, 2006 | 6 | 2006 |
University Of Dublin PG Argyroudis, D O’mahony Trinity College,“Secure Routing for Mobile Ad hoc Networks, 0 | 6 | |
Analysing the security threats against network convergence architectures P Argyroudis, R McAdoo, S Toner, L Doyle, D O'Mahony Third International Symposium on Information Assurance and Security, 241-246, 2007 | 5 | 2007 |
Authorization Management for Pervasive Computing P Argyroudis Trinity College, 2006 | 5 | 2006 |
Towards flexible authorization management PG Argyroudis, D O'Mahony 10th IEEE Symposium on Computers and Communications (ISCC'05), 421-426, 2005 | 5 | 2005 |
PR3 email honeypot J Seigneur, A Lambert, P Argyroudis, C Jensen Department of Computer Science, University of Dublin, Tech. Rep. TCD-CS-2003-39, 2003 | 5 | 2003 |
Current state of secure routing for mobile ad hoc networks P Argyroudis Trinity College Dublin Security Interest Group, 2002 | 3 | 2002 |