Name
Papers
Collaborators
KONSTANTINOS FYSARAKIS
38
70
Citations 
PageRank 
Referers 
83
15.84
193
Referees 
References 
1094
464
Search Limit
1001000
Title
Citations
PageRank
Year
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device00.342021
A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties.00.342020
Networking-Aware IoT Application Development.00.342020
Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models.00.342020
Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees00.342019
Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments00.342019
Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS).00.342019
Secure Semantic Interoperability for IoT Applications with Linked Data.00.342019
SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT30.452019
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective00.342019
The Threat-Arrest Cyber-Security Training Platform00.342019
VirtuWind - An SDN- and NFV-Based Architecture for Softwarized Industrial Networks.30.402019
Architectural Patterns for Secure IoT Orchestrations20.432019
CloudNet Anti-malware Engine - GPU-Accelerated Network Monitoring for Cloud Services.00.342018
The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network.30.402018
A review of lightweight block ciphers.100.692018
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources50.472018
Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things00.342018
Reactive security for SDN/NFV‐enabled industrial networks leveraging service function chaining40.592018
XSACd - Cross-domain resource sharing & access control for smart environments.30.412018
The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.020.422018
SecRoute: End-to-end secure communications for wireless ad-hoc networks30.422017
A survey of lightweight stream ciphers for embedded systems120.912016
RtVMF: A Secure Real-Time Vehicle Management Framework.70.532016
Node.DPWS: Efficient Web Services for the Internet of Things.20.372016
Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application.00.342016
Secure and Authenticated Access to LLN Resources Through Policy Constraints00.342015
RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems.40.462015
WSACd - A Usable Access Control Framework for Smart Home Devices00.342015
Embedded Systems Security: A Survey of EU Research Efforts20.372015
Node.DPWS: High performance and scalable Web Services for the IoT.10.412015
Embedded Systems Security Challenges.00.342014
Policy-Based Access Control for Body Sensor Networks.10.372014
Policy-Based Access Control For Dpws-Enabled Ubiquitous Devices30.482014
DSAPE - Dynamic Security Awareness Program Evaluation.00.342014
Lightweight Cryptography For Embedded Systems - A Comparative Analysis40.642013
How Effective Is Your Security Awareness Program? An Evaluation Methodology70.502012
Secure policy-based management solutions in heterogeneous embedded systems networks20.382012