Follow
George Theodorakopoulos
George Theodorakopoulos
Verified email at cardiff.ac.uk - Homepage
Title
Cited by
Cited by
Year
Quantifying location privacy
R Shokri, G Theodorakopoulos, JY Le Boudec, JP Hubaux
2011 IEEE symposium on security and privacy, 247-262, 2011
8152011
On trust models and trust evaluation metrics for ad hoc networks
G Theodorakopoulos, JS Baras
IEEE Journal on selected areas in Communications 24 (2), 318-328, 2006
7292006
Protecting Location Privacy: Optimal Strategy against Localization Attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
ACM Conference on Computer and Communications Security (CCS), 2012
4322012
Trust evaluation in ad-hoc networks
G Theodorakopoulos, JS Baras
Proceedings of the 3rd ACM workshop on Wireless security, 1-10, 2004
3672004
Hiding in the mobile crowd: Location privacy through collaboration
R Shokri, G Theodorakopoulos, P Papadimitratos, E Kazemi, JP Hubaux
IEEE Transactions on Dependable and Secure Computing 11 (3), 266-279, 2013
2122013
A supervised intrusion detection system for smart home IoT devices
E Anthi, L Williams, M Słowińska, G Theodorakopoulos, P Burnap
IEEE Internet of Things Journal 6 (5), 9042-9053, 2019
2002019
Quantifying Location Privacy: The Case of Sporadic Location Exposure
R Shokri, G Theodorakopoulos, G Danezis, JP Hubaux, JY Le Boudec
Privacy Enhancing Technologies, 57-76, 2011
1522011
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
R Shokri, P Pedarsani, G Theodorakopoulos, JP Hubaux
Proceedings of the third ACM conference on Recommender systems, 157-164, 2009
1472009
Game theoretic modeling of malicious users in collaborative networks
G Theodorakopoulos, JS Baras
Selected Areas in Communications, IEEE Journal on 26 (7), 1317-1327, 2008
1002008
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos, C Troncoso
ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016
902016
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
822014
Path problems in networks
JS Baras, G Theodorakopoulos
Synthesis Lectures on Communication Networks 3 (1), 1-77, 2010
782010
Collaborative location privacy
R Shokri, P Papadimitratos, G Theodorakopoulos, JP Hubaux
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
742011
Selfish Response to Epidemic Propagation
G Theodorakopoulos, JY Le Boudec, J Baras
IEEE Transactions on Automatic Control 58 (2), 363--376, 2013
582013
Selfish response to epidemic propagation
G Theodorakopoulos, JY Le Boudec, JS Baras
American Control Conference (ACC), 2011, 4069-4074, 2011
582011
Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks
N Ristanovic, G Theodorakopoulos, JY Le Boudec
Computer Communications (IEEE INFOCOM 2012), 31st Annual IEEE International …, 2012
562012
Malicious users in unstructured networks
G Theodorakopoulos, JS Baras
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
502007
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
JS Baras, S Radosavac, G Theodorakopoulos, D Sterne, P Budulas, ...
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
422007
EclipseIoT: A secure and adaptive hub for the Internet of Things
E Anthi, S Ahmad, O Rana, G Theodorakopoulos, P Burnap
Computers & Security 78, 477-490, 2018
272018
Detecting IoT user behavior and sensitive information in encrypted IoT-app traffic
A Subahi, G Theodorakopoulos
Sensors 19 (21), 2019
242019
The system can't perform the operation now. Try again later.
Articles 1–20