Seguir
George Theodorakopoulos
George Theodorakopoulos
Dirección de correo verificada de cardiff.ac.uk - Página principal
Título
Citado por
Citado por
Año
Quantifying location privacy
R Shokri, G Theodorakopoulos, JY Le Boudec, JP Hubaux
2011 IEEE symposium on security and privacy, 247-262, 2011
9542011
On trust models and trust evaluation metrics for ad hoc networks
G Theodorakopoulos, JS Baras
IEEE Journal on selected areas in Communications 24 (2), 318-328, 2006
7752006
A supervised intrusion detection system for smart home IoT devices
E Anthi, L Williams, M Słowińska, G Theodorakopoulos, P Burnap
IEEE Internet of Things Journal 6 (5), 9042-9053, 2019
5692019
Protecting Location Privacy: Optimal Strategy against Localization Attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
ACM Conference on Computer and Communications Security (CCS), 2012
5312012
Trust evaluation in ad-hoc networks
G Theodorakopoulos, JS Baras
Proceedings of the 3rd ACM workshop on Wireless security, 1-10, 2004
3742004
Hiding in the mobile crowd: Location privacy through collaboration
R Shokri, G Theodorakopoulos, P Papadimitratos, E Kazemi, JP Hubaux
IEEE Transactions on Dependable and Secure Computing 11 (3), 266-279, 2013
2342013
Quantifying Location Privacy: The Case of Sporadic Location Exposure
R Shokri, G Theodorakopoulos, G Danezis, JP Hubaux, JY Le Boudec
Privacy Enhancing Technologies, 57-76, 2011
1732011
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
R Shokri, P Pedarsani, G Theodorakopoulos, JP Hubaux
Proceedings of the third ACM conference on Recommender systems, 157-164, 2009
1532009
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos, C Troncoso
ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016
1202016
Path problems in networks
JS Baras, G Theodorakopoulos
Synthesis Lectures on Communication Networks 3 (1), 1-77, 2010
117*2010
Game theoretic modeling of malicious users in collaborative networks
G Theodorakopoulos, JS Baras
Selected Areas in Communications, IEEE Journal on 26 (7), 1317-1327, 2008
992008
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
962014
Collaborative location privacy
R Shokri, P Papadimitratos, G Theodorakopoulos, JP Hubaux
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
842011
Selfish Response to Epidemic Propagation
G Theodorakopoulos, JY Le Boudec, J Baras
IEEE Transactions on Automatic Control 58 (2), 363--376, 2013
652013
Selfish response to epidemic propagation
G Theodorakopoulos, JY Le Boudec, JS Baras
American Control Conference (ACC), 2011, 4069-4074, 2011
652011
GDPR compliance verification in internet of things
M Barati, O Rana, I Petri, G Theodorakopoulos
IEEE access 8, 119697-119709, 2020
612020
Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks
N Ristanovic, G Theodorakopoulos, JY Le Boudec
Computer Communications (IEEE INFOCOM 2012), 31st Annual IEEE International …, 2012
582012
Detecting IoT user behavior and sensitive information in encrypted IoT-app traffic
A Subahi, G Theodorakopoulos
Sensors 19 (21), 2019
532019
EclipseIoT: A secure and adaptive hub for the Internet of Things
E Anthi, S Ahmad, O Rana, G Theodorakopoulos, P Burnap
Computers & Security 78, 477-490, 2018
522018
Ensuring compliance of IoT devices with their privacy policy agreement
A Subahi, G Theodorakopoulos
2018 IEEE 6th International Conference on Future Internet of Things and …, 2018
502018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20