Name
Papers
Collaborators
NIKOLAOS ANAGNOSTOPOULOS
27
53
Citations 
PageRank 
Referers 
22
9.61
72
Referees 
References 
406
152
Search Limit
100406
Title
Citations
PageRank
Year
Identification and Classification of Corrupted PUF Responses via Machine Learning00.342022
A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems00.342021
DRAM-based Authentication using Deep Convolutional Neural Networks00.342021
A design for a secure network of networks using a hardware and software co-engineering architecture00.342021
Safety Meets Security: Using IEC 62443 for a Highly Automated Road Vehicle00.342020
Securing FlexRay-Based In-Vehicle Networks00.342020
Low-cost Security for Next-generation IoT Networks20.372020
A Study of the Spatial Auto-Correlation of Memory-Based Physical Unclonable Functions00.342020
Using Implicit Certification to Efficiently Establish Authenticated Group Keys for In-Vehicle Networks40.422019
Spying on Temperature using DRAM00.342019
Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection.30.402019
DRAMNet: Authentication based on Physical Unique Features of DRAM Using Deep Convolutional Neural Networks.00.342019
Privacy & Usability of IPTV Recommender Systems00.342019
Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks.00.342019
Attacking SRAM PUFs using very-low-temperature data remanence10.352019
Ar-Pufs: Advanced Security Primitives For The Internet Of Things And Cyber-Physical Systems00.342019
Decay-Based DRAM PUFs in Commodity Devices30.402019
Low-temperature data remanence attacks against intrinsic SRAM PUFs.10.382018
Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular Networks00.342018
Intrinsic Run-Time Row Hammer Pufs: Leveraging The Row Hammer Effect For Run-Time Cryptography And Improved Security00.342018
Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks.00.342018
Securing IoT Devices Using Robust DRAM PUFs.20.372018
Tracking Private Browsing Sessions using CPU-based Covert Channels.10.362018
Behavioral Workload Generation for IPTV00.342018
An Overview Of Dram-Based Security Primitives00.342018
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security50.462017
Practical DRAM PUFs in Commodity Devices.00.342016