[ Journals ] [ Conferences & Workshops ] [ Books] [ Book Chapters ]


Journals

  • S. Li, B. Liang, A. Mitrokotsa and R. Xue
    Homomorphic signcryption with public plaintext-result checkability. IET Information Security, 15(5), 37, doi:10.1049/ise2.12026, Sept. 2021, pp. 333-350. [ Full Text ]

  • B. Liang, G. Banegas, A. Mitrokotsa
    Statically Aggregate Verifiable Random Functions and Application to E-Lottery. Cryptograhy (MDPI), 4(4), 37, doi:10.3390/cryptography4040037, 2020. [ Full Text ]

  • G. Tsaloli, G. Banegas, A. Mitrokotsa
    Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing. Cryptograhy (MDPI), 4(3), 25, doi:10.3390/cryptography4030025, 2020. [ Full Text ]

  • D. Fiore, A. Mitrokotsa, L. Nizzardo, E. Pagnin.
    Multi-key homomorphic authenticators. IET Information Security, doi:10.1049/iet-ifs.2018.5341, 2019. 🏆 [ IET Premium Award ] (Best paper published within the last two years in the IET Information Security Journal) [ Full Text ]

  • B. Liang, A. Mitrokotsa.
    Decentralised Functional Signatures. Mobile Networks and Applications (Springer), doi:10.1007/s11036-018-1149-1, 2018. [ Full Text ]

  • C. Brunetta, B. Liang, A. Mitrokotsa.
    Lattice-based Simulatable VRFs: Challenges and Future Directions. Journal of Internet Services and Information Security, Vol.8, No.4, pp. 57-69, doi:10.22667/JISIS.2018.11.30.057, Nov. 2018. [ Full Text ]

  • Q. Hu, J. Zhang, A. Mitrokotsa, G. Hancke.
    Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context. Computers & Security (Elsevier), Vol. 78, pp. 281-300, 2018. [ Full Text ]

  • L. Luceri, F. Cardoso, M. Papandrea, S. Giordano, J. Buwaya, S. Kündig, C.M. Angelopoulos, J.D.P. Rolim, Z. Zhao, J.L. Carrera, T. Braun, A.C.Y. Tossou, C. Dimitrakakis, A. Mitrokotsa.
    VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things. Pervasive and Mobile Computing (Elsevier) Vol. 49, pp. 126-138, 2018.

  • A. Yang, E. Pagnin, A. Mitrokotsa, G. Hancke, D.S. Wong.
    Two-hop Distance-Bounding Protocols: Keep your Friends Close.
    IEEE Transactions on Mobile Computing, Vol. 17, No. 7, pp. 1723-1736, 2018. [ Full Text ] [ Bib ]

  • E. Pagnin, A. Yang, Q. Hu, G. Hancke, A. Mitrokotsa.
    HB+DB: Distance bounding meets human based authentication.
    Future Generation Computer Systems, Elsevier, Vol. 80, pp. 627-639, March 2018. [ Full Text ] [ Bib ]

  • E. Pagnin, A. Mitrokotsa.
    Privacy-preserving biometric authentication: Challenges & Directions .
    Security and Communication Networks, Vol. 2017 (2017), Article ID 7129505, doi:0.1155/2017/7129505 [ Full Text ] [ Bib ]

  • C. Dimitrakakis, B. Nelson, Z. Zhang, A. Mitrokotsa, B.I.P. Rubinstein.
    Differential Privacy for Bayesian Inference through Posterior Sampling.
    Journal of Machine Learning Research, Vol. 18, Issue 11 pages 1-39, 2017. [ Full Text ] [ Bib ]

  • C. Dimitrakakis, A. Mitrokotsa.
    Near-Optimal Blacklisting.
    Computers & Security, Elsevier, Vol. 64, pages 110-121, doi: 10.1016/j.cose.2015.06.010, January 2017. [ Full Text ] [ Bib ]

  • C. Karlsson, A. Mitrokotsa.
    Grouping-Proof-Distance-Bounding Protocols: Keep all your friends close.
    IEEE Communications Letters, 20(7):1365-1368, doi: 10.1109/LCOMM.2016.2562618, July 2016. [ Full Text ] [ Bib ]

  • E. Pagnin, G. Hancke, A. Mitrokotsa.
    Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours
    IEEE Communications Letters, 19(7):1173-1176, doi: 10.1109/LCOMM.2015.2434373. July 2015. [ Full Text ] [ Bib ]

  • C. Dimitrakakis, A. Mitrokotsa.
    Distance Bounding Protocols: Are you Close Enough?
    IEEE Security & Privacy, 13(4):47-51, July/August 2015. [ Full Text ] [ Bib ]

  • C. Dimitrakakis, A. Mitrokotsa, S. Vaudenay.
    Expected loss analysis for authentication in constrained channels.
    Journal of Computer Security, 23(3):309-329, doi: 10.3233/JCS-140521, 2015. [ Full Text ] [ Bib ]

  • I. Boureanu, A. Mitrokotsa, S. Vaudenay.
    Practical & Provably Secure Distance Bounding.
    Journal of Computer Security, 23(2):229-257 doi: 10.3233/JCS-140518, 2015. [ Full Text ] [ Bib ]

  • A. Mitrokotsa, C. Onete, S. Vaudenay.
    Location Leakage in Distance Bounding: Why Location Privacy Does not Work.
    Computers & Security (Elsevier) Vol. 45, 199-209, 2014. doi: 10.1016/j.cose.2014.06.001. [ Full Text ] [ Bib ]

  • A. Mitrokotsa, P. Peris-Lopez, C. Dimitrakakis, S. Vaudenay.
    On selecting the nonce length in distance-bounding protocols.
    The Computer Journal (Oxford University Press), Special Issue on "Advanced Semantic and Social Multimedia Technologies for Future Computing Environment". 2013. doi: 10.1093/comjnl/bxt033. [ Full Text ][ Bib ] 🏆 Received the Wilkes Award!

  • S. Pastrana, A. Mitrokotsa, A. Orfila, P. Peris-Lopez.
    Evaluation of Classification Algorithms for Intrusion Detection in MANETs.
    Knowledge-Based Systems, Elsevier, 36:217-225, December 2012. doi: 10.1016/j.knosys.2012.06.016. [ Full Text ][ Bib ]

  • A. Mitrokotsa, C. Dimitrakakis.
    Intrusion Detection in MANET using Classification Algorithms: The Effects of Cost and Model Selection. Ad hoc Networks, Elsevier, 11(11):226-237, January 2013. doi: 10.1016/j.adhoc.2012.05.006. [ Full Text ][ Bib ]

  • P. Peris-Lopez, A. Orfila, A. Mitrokotsa, J.C.A. van der Lubbe.
    A Comprehensive RFID Solution to Enhance Inpatient Medication Safety.
    International Journal of Medical Informatics, 80(1): 13-24, January 2011. doi: 10.1016/j.ijmedinf.2010. 10.008. [ Full Text ][ Bib ]

  • A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J.C. Hernandez-Castro.
    Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels.
    IEEE Communications Letters, February 2010, 14 (2):121-123. [ Full Text ][ Bib ]

  • A. Mitrokotsa, N. Komninos, and C. Douligeris.
    Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks.
    International Journal of Network Security, 10(2): 93-106, March 2010. [ Full Text ][ Bib ]

  • A. Mitrokotsa, M.R. Rieback, and A.S. Tanenbaum.
    Classifying RFID Attacks and Defenses. Special Issue on Advances in RFID Technology, Information Systems Frontiers, Springer, Springer Science & Business Media, LLC 2009, DOI 10.1007/s10796-009-9210-z., July 2009. [ Full Text ][ Bib ]

  • A. Mitrokotsa, N. Komninos, C. Douligeris.
    Intrusion Detection and Response in Ad hoc Networks. International Journal on Computer Research, Special Issue on Advances in Ad Hoc Network Security, Nova Science Publishing Inc., 15(1):23-55, 2007. [ Full Text ][ Bib ]

  • A. Mitrokotsa and C. Douligeris.
    DDoS Attacks and Defense Mechanisms: Classification and State-of-the-art.
    Computer Networks, 44(5):643-666, 5 April 2004. [ Full Text ][ Bib ]


Conferences & Workshops

  • C. Brunetta, G. Tsaloli, B. Liang, G. Banegas, A. Mitrokotsa:
    Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. In Proceedings of ACISP 2021, Dec. 2021. [ Full Version ]

  • G. Tsaloli, B. Liang, C. Brunetta, G. Banegas, A. Mitrokotsa:
    DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning. In Proceedings of ISC 2021, Nov. 2021. [ Pdf ]

  • C. Brunetta, M. Larangeira, B. Liang, A. Mitrokotsa, K. Tanaka:
    Turn-Based Communication Channels. In Proceedings of ProvSec2021, Nov. 2021. [ Full Version ]

  • L. Ledwaba, G.P. Hancke, A. Mitrokotsa, S.J. Isaac:.
    A Delegated Proof of Proximity Scheme for Industrial Internet of Things Consensus. In Proceedings of IECON 2020, pp 4441--4446, IEEE, Oct. 2020. [ Pdf ]

  • B. Liang, A. Mitrokotsa.
    Robust Distributed Pseudorandom Functions for mNP Access Structures. In Proceedings of International Conference on Information Security (ISC 2019), pp 107-126, LNCS, New York, US, Sept. 2019. 🏆 Best Paper Award! [ Full Text ]

  • C. Brunetta, B. Liang, A. Mitrokotsa.
    Code-Based Zero Knowledge PRF Arguments. In Proceedings of International Conference on Information Security (ISC 2019), pp 171-189, LNCS, New York, US, Sept. 2019. [ Pdf ]

  • G. Tsaloli, A. Mitrokotsa.
    Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees. In Proceedings of SECRYPT 2019, Prague, Czech Republic, June 2019. [ Pdf ]

  • G. Tsaloli, A. Mitrokotsa.
    Sum It Up: Verifiable Additive Homomorphic Secret Sharing. In Proceedings of ICISC 2019, Seoul, South Korea, Dec. 2019. [ Pdf ] [ Bib ]

  • G. Tsaloli, B. Liang, A. Mitrokotsa.
    Verifiable Homomorphic Secret Sharing. In Proceedings of ProvSec 2018, Jeju Island, Republic of Korea, Oct. 2018. [ Pdf ] [ Bib ]

  • B. Liang, A. Mitrokotsa.
    Distributed Pseudorandom Functions for General Access Structures in NP. In Proceedings of ICICS 2017, Beijing, China, Dec. 2017. [ Pdf ] [ Bib ]

  • B. Liang, A. Mitrokotsa.
    Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation. In Proceedings of ISPEC 2017, Australia, Dec. 2017, LNCS, vol. 10701, pp. 422-431. [ Pdf ] [ Bib ] [ Full Version ]

  • C. Brunetta, C. Dimitrakakis, B. Liang, A. Mitrokotsa.
    A Differential Private Encryption Scheme. In Proceedings of ISC 2017, Vietnam, Nov. 2017. [ Pdf ] [ Bib ]

  • E. Pagnin, J. Liu, A. Mitrokotsa.
    Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?. In Proceedings of CANS 2017, HK, Nov. 2017. [ Pdf ] [ Bib ]

  • E. Pagnin, A. Mitrokotsa, K. Tanaka.
    Anonymous Single-Round Server-Aided Verification. In Proceedings of Latincrypt 2017, Cuba, Sep. 2017. [ Pdf ] [ Bib ] [ Full Version ]

  • N. Kaloudi, A. Mitrokotsa.
    Revisiting Two-hop distance bounding protocols: Are you really close enough?. In Proceedings of WISTP 2017, Heraklion, Greece, Sept. 2017. [ Pdf ] [ Bib ]

  • D. Fiore, A. Mitrokotsa, L. Nizzardo, E. Pagnin.
    Multi-Key Homomorphic Authenticators. In Proceedings of ASIACRYPT 2016, Hanoi, Vietnam, Dec. 2016. [ Pdf ] [ Bib ] [ Full Version ]

  • A. Abidin, A. Aly, E. Argones Rua, A. Mitrokotsa.
    Efficient Verifiable Computation of XOR for Biometric Authentication. In Proceedings of CANS 2016, Milan, Italy, Dec. 2016. [ Full Text ] [ Bib ]

  • E. Pagnin, A. Yang, G. Hancke, A. Mitrokotsa.
    HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding. In Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2015), New York, June 2015. [ Full Text ] [ Bib ]

  • A. Hossmann-Picu , Z. Li, Z. Zhao, T. Braun, C. M. Angelopoulos, O. Evangelatos, J. Rolim, M. Papandrea, K. Garg, S. Giordano, A. C. Y. Tossou, C. Dimitrakakis and A. Mitrokotsa. Synergistic User: Context Analytics. In Proceedings of the 7th ICT Innovations Conference, October 2015. [ Full Text ] [ Bib ]

  • E. Pagnin, C. Dimitrakakis, A. Abidin, A. Mitrokotsa.
    On the Leakage of Information in Biometric Authentication. In Proceedings of Indocrypt 2014, New Delhi, India, December 2014. [ Full Text ] [ Bib ]

  • A. Abidin, A. Mitrokotsa.
    Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE. In Proceedings of the IEEE Workshop on Information Forensics and Security 2014 (WIFS 2014), Atlanta, USA, December 2014. [ Full Text ] [ Bib ]

  • A. Abidin, K. Matsuura, A. Mitrokotsa.
    Security of a Privacy-Preserving Biometric Authentication Protocol Revisited. In Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), Heraklion, Greece, October 2014. [ Full Text ] [ Bib ]

  • C. Dimitrakakis, B. Nelson, A. Mitrokotsa, B.I.R. Rubinstein.
    Robust and private Bayesian inference. In Proceedings of the International Conference on Algorithmic Learning Theory (ALT 2014), Bled, Slovenia, October 2014. [ Full Text ] [ Bib ]

  • A. Mitrokotsa.
    Authentication in Constrained Settings. In Proceedings of BalkanCryptSec 2014, Istanbul, Turkey 2014.[ Full Text ] [ Bib ]

  • A. Abidin, E. Pagnin, A. Mitrokotsa.
    Attacks on Privacy-Preserving Biometric Authentication. In Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Poster, Tromso, Norway, October 2014. [ Full Text ] [ Bib ].

  • C. Dimitrakakis, B. Nelson, A. Mitrokotsa, B.I.R. Rubinstein.
    Differential Privacy and Private Bayesian Inference. In Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Poster, Tromso, Norway, October 2014. [ Full Text ] [ Bib ].

  • A. Abidin, A. Mitrokotsa.
    A Privacy-preserving Biometric Authentication Protocol Revisited. In Proceedings of YACC 2014, Porquerolles island, France, June 2014. [ Full Text ] [ Bib ]

  • I. Boureanu, A. Mitrokotsa, and S. Vaudenay.
    Practical and Provably Secure Distance-Bounding. In Proceedings of the 16th Information Security Conference (ISC'13), Dallas, Texas, USA, 13-15 November 2013. [ Full Text ] [ Bib ]

  • I. Boureanu, A. Mitrokotsa, and S. Vaudenay.
    Towards Secure Distance-Bounding. In Proceedings of the 20th International Workshop on Fast Software Encryption, Singapore, 10-13 March 2013. [ Full Text ] [ Bib ]

  • I. Boureanu, A. Mitrokotsa, and S. Vaudenay.
    Secure & Lightweight Distance-Bounding. In Proceedings of Second International Workshop on Lightweight Cryptography for Security & Privacy - LightSec 2013, Gebze, Turkey, May 6-7, 2013. [ Full Text ] [ Bib ]

  • C. Dimitrakakis, A. Mitrokotsa, and S. Vaudenay.
    Expected loss bounds for authentication in constrained channels. In Proceedings of INFOCOM 2012, Orlando Florida 2012, 25-30 March 2012. [ Full Text ] [ Bib ]

  • I. Boureanu, A. Mitrokotsa, and S. Vaudenay.
    On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds!In Proceedings of LATINCRYPT 2012, 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, pp. 100-120, LNCS 7533 Springer 2012. [ Full Text ] [ Bib ]

  • A. Bay, I. Boureanu, A. Mitrokotsa, I. Spulber, S. Vaudenay.
    The Bussard-Bagga and Other Distance Bounding Protocols under Man-in-the-Middle Attacks. In Proceedings of Inscrypt'2012, 8th China International Conference on Information Security and Cryptology, Nov. 28- Dec. 1, 2012, Beijing, China. [ Full Text ] [ Bib ]

  • C. Dimitrakakis, A. Mitrokotsa,
    Near-Optimal Node Blacklisting in Adversarial Networks. 2012 Conference on Decision and Game Theory for Security (GameSec 2012), Poster Session. Budapest, Hungary, November 2012.

  • A. Mitrokotsa, C. Onete and S. Vaudenay,
    Mafia Fraud Attack against the RC Distance-Bounding Protocol. In Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A). November 2012, Nice, France, pages 74-79, IEEE Press. [ Full Text ] [ Bib ]

  • M. Safkhani, N. Bagheri, A. Mitrokotsa, P. Peris-Lopez
    On the Traceability of Tags in SUAP RFID Authentication Protocols. In Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A). November 2012, Nice, France, pages 80-84, IEEE Press. [ Bib ]

  • M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, J.C. Hernandez-Castro.
    Weaknesses in another Gen2-Based RFID Authentication Protocol. In Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A), November 2012, Nice, France, pages 292-296, IEEE Press. [ Bib ]

  • J.-P. Aumasson, A. Mitrokotsa, P. Peris-Lopez.
    A Note on a Privacy-Preserving Distance Bounding Protocol. In Proceedings of the 13th International Conference on Information and Communication Security (ICICS 2011), 23-26 November, Beijng China. Springer Vol. 7043, pp. 78-92. [ Full Text ] [ Bib ]

  • J.-P. Aumasson, A. Mitrokotsa, P. Peris-Lopez.
    Cryptanalysis of a Privacy-preserving Distance Bounding Protocol. In Proceedings of the International Conference on Applications of Cryptography and Network Security (ACNS 2011), Industrial Track, Madeira, Spain, June 2011.

  • P. Darcy, B. Stantic, A. Mitrokotsa, A. Sattar.
    Detecting Intrusions within RFID Systems through Non-Monotonic Reasoning Cleaning. In Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 7-10 December 2010, Brisbane, Australia. [ Bib ]

  • C. Dimitrakakis and A. Mitrokotsa.
    Statistical Decision Making for Authentication and Intrusion Detection. In Proceedings of the 8th IEEE International Conference on Machine Learning and Applications (ICMLA 2009), Miami, FL, USA, 13-15 December 2009, pp. 409-414, IEEE Computer Society. [ Full Text ] [ Bib ]

  • A. Mitrokotsa, M.R. Rieback, and A.S. Tanenbaum.
    Classification of RFID Attacks. In Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT 2008), in conjunction 10th International Conference on Enterprise Information Systems, pages 73-86, Barcelona, Spain, June 2008. INSTICC Press, Portugal. [ Full Text ] [ Bib ]

  • A. Mitrokotsa, M. Tsagkaris, and C. Douligeris.
    Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms. In Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008) - Advances in Ad Hoc Networking , Computer Science, pages 133-144, Palma de Mallorca, Spain, 23-27 June 2008. Springer. [ Full Text ] [ Bib ]

  • A. Mitrokotsa, C. Dimitrakakis, and C. Douligeris.
    Intrusion Detection Using Cost-Sensitive Classification. In Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND 2007), Lecture Notes in Electrical Engineering, pages 35-46, Heraklion, Crete, Greece, 4-5 October 2007. Springer-Verlag. [ Full Text ] [ Bib ]

  • A. Mitrokotsa, N. Komninos, and C. Douligeris.
    Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. In Proceedings of IEEE International Conference on Pervasive Services 2007 (ICPS 2007), pages 118-127, Istanbul, Turkey, July 2007. [ Full Text ] [ Bib ]

  • A. Mitrokotsa, N. Komninos, and C. Douligeris.
    Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks. In Proceedings of the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), pages 137-144, Corfu, Greece, June 2007. [ Full Text ] [ Bib ]

  • A. Mitrokotsa, R. Mavropodi, and C. Douligeris.
    Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks. In Proceedings of International Conference on Intelligent Systems and Computing: Theory and Applications, pages 111-118, Ayia Napa, Cyprus, 6-7 July 2006. [ Full Text ] [ Bib ]

  • A. Mitrokotsa and C. Douligeris.
    Intrusion Detection Using Emergent Self-Organizing Maps. In G. Antoniou et al., editor, SETN 2006, volume 3955 of Lecture Notes in Artificial Intelligence, pages 559-562, Heraklion, Greece, May 2006, Springer-Verlag. [ Full Text ] [ Bib ]

  • A. Mitrokotsa and C. Douligeris.
    Detecting Denial of Service attacks using Emergent Self-Organizing Maps. In Proceedings of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2005), pages 375-380, Athens, Greece, December 2005. [ Full Text ] [ Bib ]

  • A. Mitrokotsa and C. Douligeris.
    DDoS Attacks and Defense Mechanisms: A Classification. In Proceedings of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2003), pages 190-193, Darmstadt, Germany, 14-17 December 2003. [ Full Text ] [ Bib ]


Edited Books


Book Chapters

  • A. Mitrokotsa, M. Beye, P. Peris-Lopez.
    Chapter: "Security Primitive Classification of RFID Attacks" In Book: Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks. Eds. D. Ranasinghe, M. Sheng, S. Zeadally. Springer-Verlag. To Appear 2010. [ Full Text ] [ Bib ]

  • A. Mitrokotsa and C. Douligeris.
    Chapter: Integrated RFID and Sensor Networks: Architectures and Applications. In Book: RFID and Sensor Networks: Architectures, Protocols, Security and Integrations. Wireless Networks and Mobile Communication Series, pages 511-535. Auerbach Publications, CRC Press, Taylor and Francis Group, LLC 2010, ISBN: 978-1-4200-4288-7. [ Full Text ] [ Bib ]

  • A. Mitrokotsa and T. Karygiannis.
    Chapter: Intrusion Detection Techniques in Sensor Networks. In Book: Wireless Sensor Network Security, pages 251-272. Cryptology and Information Security Series. IOS Press, 2008. [ Full Text ] [ Bib ]

  • A. Mitrokotsa and C. Douligeris.
    Chapter: Denial of Service Attacks In Book: Network Security: Current Status and Future Directions, pages 117-134. John Wiley and Sons. John Wiley and Sons, June 2007. [ Full Text ] [ Bib ]

  • A. Mitrokotsa and C. Douligeris.
    Chapter: DoS Attacks and E-Government. In Book: Secure eGovernment Web Services, pages 124-142. Idea Group Publishing, Hershey PA, USA, 2007.
    reprinted in:
    Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Information Science Reference, 2008, IGI Global. [ Full Text ] [ Bib ]