Research Output

Filter
Chapter
2015

TPM-based authentication mechanism for apache hadoop

Khalil, I., Dou, Z. & Khreishah, A., 2015, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. Springer Verlag, Vol. 152. p. 105-122 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 152).

Research output: Chapter in Book/Report/Conference proceedingChapter

8 Citations (Scopus)
2014

Ensemble learning of high-dimensional stock market data

Maragoudakis, M. & Serpanos, D., 20 Aug 2014, Computational Intelligence Techniques for Trading and Investment. Taylor and Francis, p. 192-215 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2010

Assessing cybercrime through the eyes of the WOMBAT

Dacier, M., Leita, C., Thonnard, O., Pham, V. H. & Kirda, E., 1 Dec 2010, Cyber Situational Awareness: Issues and Research. Jajodia, S., Liu, P., Swarup, V. & Wang, C. (eds.). p. 103-136 34 p. (Advances in Information Security; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Cyber SA: Situational awareness for cyber defense

Barford, P., Dacier, M., Dietterich, T. G., Fredrikson, M., Giffin, J., Jajodia, S., Jha, S., Li, J., Liu, P., Ning, P., Ou, X., Song, D., Strater, L., Swarup, V., Tadda, G., Wang, C. & Yen, J., 1 Dec 2010, Cyber Situational Awareness: Issues and Research. Jajodia, S., Liu, P., Swarup, V. & Wang, C. (eds.). p. 3-13 11 p. (Advances in Information Security; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingChapter

75 Citations (Scopus)
2007

Automated Trust Negotiation in Open Systems

Lee, A. J., Seamons, K. E., Winslett, M. & Yu, T., 1 Jan 2007, Secure Data Management in Decentralized Systems. Springer New York LLC, p. 217-258 42 p. (Advances in Information Security; vol. 33).

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Basic Security Concepts

Jajodia, S. & Yu, T., 1 Dec 2007, Secure Data Management in Decentralized Systems. Yu, T. & Jajodia, S. (eds.). p. 3-20 18 p. (Advances in Information Security; vol. 33).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Secure Data Management in Decentralized Systems

Yu, T. & Jajodia, S., 1 Dec 2007, Secure Data Management in Decentralized Systems. Yu, T. & Jajodia, S. (eds.). p. III-IV (Advances in Information Security; vol. 33).

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)
2006

Collection and Analysis of attack data based on Honeypots deployed on the Internet

Alata, E., Dacier, M., Deswarte, Y., Kaaâniche, M., Kortchinsky, K., Nicomette, V., Pham, V. H. & Pouget, F., 1 Dec 2006, Quality of Protection: Security Measurements and Metrics. Gollmann, D., Massacci, F. & Yautsiukhin, A. (eds.). p. 79-91 13 p. (Advances in Information Security; vol. 23).

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Grid Security

Stefanidis, K., Voyiatzis, A. G. & Serpanos, D. N., 14 Jun 2006, Network Security: Current Status and Future Directions. Wiley-IEEE Press, p. 247-256 10 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1994

Protocol processing in communication subsystems for high speed networks

Serpanos, D. N., 1 Jan 1994, IFIP Transactions C: Communication Systems. C-21 ed. Publ by Elsevier Science Publishers B.V., p. 351-360 10 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)