Match!
Constantinos Kolias
George Mason University
26Publications
11H-index
659Citations
Publications 26
Newest
#1Jeffrey Voas (NIST: National Institute of Standards and Technology)H-Index: 12
#2Rick Kuhn (NIST: National Institute of Standards and Technology)H-Index: 16
Last.Georgios Kambourakis (University of the Aegean)H-Index: 24
view all 5 authors...
Will our smart devices betray us? Can we trust our smart beds, pet feeders, and watches to maintain the level of privacy we want and expect? As the numbers of devices coming online reach staggering levels, serious questions must be raised about the level of cybertrust we can reasonably expect to have in our modern lifestyle.
1 CitationsSource
#1Georgios Kambourakis (GMU: George Mason University)H-Index: 24
#2Constantinos Kolias (GMU: George Mason University)H-Index: 11
Last.Angelos Stavrou (GMU: George Mason University)H-Index: 31
view all 3 authors...
The rapidly growing presence of Internet of Things (IoT) devices is becoming a continuously alluring playground for malicious actors who try to harness their vast numbers and diverse locations. One of their primary goals is to assemble botnets that can serve their nefarious purposes, ranging from Denial of Service (DoS) to spam and advertisement fraud. The most recent example that highlights the severity of the problem is the Mirai family of malware, which is accountable for a plethora of massiv...
13 CitationsSource
Last.Dimitrios DamopoulosH-Index: 10
view all 4 authors...
Source
#1Constantinos Kolias (GMU: George Mason University)H-Index: 11
#2Vasilis Kolias (University of Strathclyde)H-Index: 3
Last.Georgios Kambourakis (University of the Aegean)H-Index: 24
view all 3 authors...
With the mushrooming of wireless access infrastructures, the amount of data generated, transferred and consumed by the users of such networks has taken enormous proportions. This fact further complicates the task of network intrusion detection, especially when advanced machine learning (ML) operations are involved in the process. In wireless environments, the monitored data are naturally distributed among the numerous sensor nodes of the system. Therefore, the analysis of data must either happen...
15 CitationsSource
#1Constantinos Kolias (GMU: George Mason University)H-Index: 11
#2Lucas Copi (WSU: Wayne State University)H-Index: 1
Last.Angelos Stavrou (GMU: George Mason University)H-Index: 31
view all 4 authors...
Bluetooth Low Energy (BLE) Beacons introduced a novel technology that enables devices to advertise their presence in an area by constantly broadcasting a static unique identifier. The aim was to enhance services with location and context awareness. Although the hardware components of typical BLE Beacons systems are able to support adequate cryptography, the design and implementation of most publicly available BLE Beacon protocols appears to render them vulnerable to a plethora of attacks. Indeed...
3 CitationsSource
#1Sokratis VidrosH-Index: 2
#2Constantinos KoliasH-Index: 11
Last.Leman AkogluH-Index: 26
view all 4 authors...
The critical process of hiring has relatively recently been ported to the cloud. Specifically, the automated systems responsible for completing the recruitment of new employees in an online fashion, aim to make the hiring process more immediate, accurate and cost-efficient. However, the online exposure of such traditional business procedures has introduced new points of failure that may lead to privacy loss for applicants and harm the reputation of organizations. So far, the most common case of ...
6 CitationsSource
#1Constantinos Kolias (GMU: George Mason University)H-Index: 11
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last.Jeffrey VoasH-Index: 24
view all 4 authors...
The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive distributed denial-of-service attacks.
241 CitationsSource
#1Angelos Stavrou (GMU: George Mason University)H-Index: 31
#2Daniel Fleck (GMU: George Mason University)H-Index: 7
Last.Constantinos Kolias (GMU: George Mason University)H-Index: 11
view all 3 authors...
A proposed moving-target defense against DDoS attacks repeatedly shuffles client-to-server assignments to identify and eventually quarantine malicious clients.
2 CitationsSource
#1Sokratis Vidros (University of the Aegean)H-Index: 2
#2Constantinos Kolias (GMU: George Mason University)H-Index: 11
Last.Georgios Kambourakis (University of the Aegean)H-Index: 24
view all 3 authors...
It is increasingly common for someone actively seeking a job online to come across appealing but fake ads offering high wages, flexible hours, teleworking and career growth opportunities. Usually, job ads with such favourable conditions are examples of Online Recruitment Fraud (ORF) which attempt to collect unsuspecting candidates’ personal information. ORF is a relatively new field of variable severity that can escalate quickly to extensive scams. Corporate hiring has recently been ported to th...
5 CitationsSource
#1Constantinos Kolias (University of the Aegean)H-Index: 11
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 31
view all 4 authors...
WiFi has become the de facto wireless technology for achieving short- to medium-range device connectivity. While early attempts to secure this technology have been proved inadequate in several respects, the current more robust security amendments will inevitably get outperformed in the future, too. In any case, several security vulnerabilities have been spotted in virtually any version of the protocol rendering the integration of external protection mechanisms a necessity. In this context, the c...
77 CitationsSource
123