Volgen
George Theodorakopoulos
George Theodorakopoulos
Geverifieerd e-mailadres voor cardiff.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Quantifying location privacy
R Shokri, G Theodorakopoulos, JY Le Boudec, JP Hubaux
2011 IEEE symposium on security and privacy, 247-262, 2011
8282011
On trust models and trust evaluation metrics for ad hoc networks
G Theodorakopoulos, JS Baras
IEEE Journal on selected areas in Communications 24 (2), 318-328, 2006
7302006
Protecting Location Privacy: Optimal Strategy against Localization Attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
ACM Conference on Computer and Communications Security (CCS), 2012
4432012
Trust evaluation in ad-hoc networks
G Theodorakopoulos, JS Baras
Proceedings of the 3rd ACM workshop on Wireless security, 1-10, 2004
3692004
A supervised intrusion detection system for smart home IoT devices
E Anthi, L Williams, M Słowińska, G Theodorakopoulos, P Burnap
IEEE Internet of Things Journal 6 (5), 9042-9053, 2019
2262019
Hiding in the mobile crowd: Location privacy through collaboration
R Shokri, G Theodorakopoulos, P Papadimitratos, E Kazemi, JP Hubaux
IEEE Transactions on Dependable and Secure Computing 11 (3), 266-279, 2013
2142013
Quantifying Location Privacy: The Case of Sporadic Location Exposure
R Shokri, G Theodorakopoulos, G Danezis, JP Hubaux, JY Le Boudec
Privacy Enhancing Technologies, 57-76, 2011
1542011
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
R Shokri, P Pedarsani, G Theodorakopoulos, JP Hubaux
Proceedings of the third ACM conference on Recommender systems, 157-164, 2009
1472009
Game theoretic modeling of malicious users in collaborative networks
G Theodorakopoulos, JS Baras
Selected Areas in Communications, IEEE Journal on 26 (7), 1317-1327, 2008
1002008
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos, C Troncoso
ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016
912016
Path problems in networks
JS Baras, G Theodorakopoulos
Synthesis Lectures on Communication Networks 3 (1), 1-77, 2010
832010
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
822014
Collaborative location privacy
R Shokri, P Papadimitratos, G Theodorakopoulos, JP Hubaux
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
742011
Selfish Response to Epidemic Propagation
G Theodorakopoulos, JY Le Boudec, J Baras
IEEE Transactions on Automatic Control 58 (2), 363--376, 2013
612013
Selfish response to epidemic propagation
G Theodorakopoulos, JY Le Boudec, JS Baras
American Control Conference (ACC), 2011, 4069-4074, 2011
612011
Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks
N Ristanovic, G Theodorakopoulos, JY Le Boudec
Computer Communications (IEEE INFOCOM 2012), 31st Annual IEEE International …, 2012
562012
Malicious users in unstructured networks
G Theodorakopoulos, JS Baras
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
502007
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
JS Baras, S Radosavac, G Theodorakopoulos, D Sterne, P Budulas, ...
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
432007
Detecting IoT user behavior and sensitive information in encrypted IoT-app traffic
A Subahi, G Theodorakopoulos
Sensors 19 (21), 2019
282019
EclipseIoT: A secure and adaptive hub for the Internet of Things
E Anthi, S Ahmad, O Rana, G Theodorakopoulos, P Burnap
Computers & Security 78, 477-490, 2018
272018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20