Name
Affiliation
Papers
EMMANOUIL A. PANAOUSIS
Kingston University London, London, United Kingdom
36
Collaborators
Citations 
PageRank 
107
101
14.94
Referers 
Referees 
References 
317
754
297
Search Limit
100754
Title
Citations
PageRank
Year
TT-SVD: an Efficient Sparse Decision Making Model with Two-way Trust Recommendation in the AI Enabled IoT Systems20.352021
Data-Driven Decision Support For Optimizing Cyber Forensic Investigations00.342021
Post Quantum Proxy Signature Scheme Based On The Multivariate Public Key Cryptographic Signature10.382020
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data00.342020
SECONDO - A Platform for Cybersecurity Investments and Cyber Insurance Decisions.20.402020
Distributed Key Management in Microgrids.10.392020
Multiobjective Optimization Algorithms For Wireless Sensor Networks10.362020
A New Encrypted Data Switching Protocol: Bridging Ibe And Abe Without Loss Of Data Confidentiality00.342019
Apparatus: A framework for security analysis in internet of things systems00.342019
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.00.342019
A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles50.402019
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.00.342019
A taxonomy and survey of attacks against machine learning90.632019
Post-incident audits on cyber insurance discounts.10.352019
Curex: Secure And Private Health Data Exchange00.342019
An Enhanced Cyber Attack Attribution Framework.10.402018
An Options Approach to Cybersecurity Investment.30.432018
Uncertainty in Cyber Security Investments.00.342017
Selecting Security Mechanisms in Secure Tropos.10.342017
A conceptual model to support security analysis in the internet of things.40.482017
COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks.10.422017
Game theoretic path selection to support security in device-to-device communications.30.412017
Decision support approaches for cyber security investment.231.042016
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.00.342016
A Game-Theoretic Approach For Minimizing Security Risks In The Internet-Of-Things50.432015
Secure Message Delivery Games For Device-To-Device Communications70.402014
A Probabilistic Algorithm for Secret Matrix Share Size Reduction.00.342013
Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions.50.452012
Secure decentralised ubiquitous networking for emergency communications20.422012
Recipients' Anonymity In Multihop Ad-Hoc Networks10.352012
Security model for emergency real-time communications in autonomous networks50.472012
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks50.482010
An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas00.342010
A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks40.512010
Securing AODV against wormhole attacks in emergency MANET multimedia communications30.412009
A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks60.502009