Follow
Artemios G. Voyiatzis
Artemios G. Voyiatzis
Artemios Vogiatzis
Verified email at artemiosv.info - Homepage
Title
Cited by
Cited by
Year
On the necessity of user-friendly CAPTCHA
CA Fidas, AG Voyiatzis, NM Avouris
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
1202011
A survey of delay-and disruption-tolerant networking applications
AG Voyiatzis
Journal of Internet engineering 5 (1), 331-344, 2012
1162012
A Modbus/TCP fuzzer for testing internetworked industrial systems
AG Voyiatzis, K Katsigiannis, S Koubias
2015 IEEE 20th conference on emerging technologies & factory automation …, 2015
862015
A Trust-based Resilient Routing Mechanism for the Internet of Things
ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann
International Conference on Availability, Reliability and Security (ARES), 2017
702017
Security challenges in embedded systems
DN Serpanos, AG Voyiatzis
ACM Transactions on embedded computing systems (TECS) 12 (1s), 1-10, 2013
692013
Exciting FPGA cryptographic Trojans using combinatorial testing
P Kitsos, DE Simos, J Torres-Jimenez, AG Voyiatzis
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
662015
Merged Mining: Curse or Cure?
A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl
International Workshop on Cryptocurrencies and Blockchain Technology (CBT'17 …, 2017
592017
Time is on my side: Steganography in filesystem metadata
S Neuner, AG Voyiatzis, M Schmiedecker, S Brunthaler, S Katzenbeisser, ...
Digital Investigation 18, S76-S86, 2016
572016
An HMM-based anomaly detection approach for SCADA systems
K Stefanidis, AG Voyiatzis
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
542016
High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
L Ioannou, HE Michail, AG Voyiatzis
Embedded Computing (MECO), 2015 4th Mediterranean Conference on, 2015
422015
Combinatorial Methods in Security Testing
DE Simos, R Kuhn, AG Voyiatzis, R Kacker
IEEE Computer 49 (10), 80-83, 2016
342016
A versatile scalable smart waste-bin system based on resource-limited embedded devices
A Papalambrou, D Karadimas, J Gialelis, AG Voyiatzis
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015
342015
FPGA Trojan detection using length-optimized ring oscillators
P Kitsos, AG Voyiatzis
2014 17th Euromicro Conference on Digital System Design, 675-678, 2014
342014
Pipelined SHA-3 implementations on FPGA: Architecture and performance analysis
HE Michail, L Ioannou, AG Voyiatzis
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
332015
Usblock: Blocking usb-based keypress injection attacks
S Neuner, AG Voyiatzis, S Fotopoulos, C Mulliner, ER Weippl
Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 …, 2018
322018
A Survey on Network Resiliency Methodologies against Weather-based Disruptions
M Tornatore, J André, P Babarczi, T Braun, E Følstad, P Heegaard, ...
8th International Workshop on Resilient Networks Design and Modeling (RNDM …, 2016
322016
When security meets usability: A user-centric approach on a crossroads priority problem
CA Fidas, AG Voyiatzis, NM Avouris
2010 14th Panhellenic Conference on Informatics, 112-117, 2010
312010
An empirical study on the web password strength in Greece
AG Voyiatzis, CA Fidas, DN Serpanos, NM Avouris
2011 15th Panhellenic Conference on Informatics, 212-216, 2011
302011
Efficient Triggering of Trojan Hardware Logic
AG Voyiatzis, KG Stefanidis, P Kitsos
19th IEEE International Symposium on Design and Diagnostics of Electronic …, 2016
282016
Towards a hardware Trojan detection methodology
P Kitsos, AG Voyiatzis
2014 3rd Mediterranean Conference on Embedded Computing (MECO), 18-23, 2014
252014
The system can't perform the operation now. Try again later.
Articles 1–20