Follow
Ioanna Kantzavelou
Ioanna Kantzavelou
Associate Prof., Dept. of Informatics and Computer Engineering, University of West Attica, GREECE.
Verified email at uniwa.gr
Title
Cited by
Cited by
Year
IoT: Communication Protocols and Security Threats
A Gerodimos, L Maglaras, MA Ferrag, N Ayres, I Kantzavelou
Internet of Things and Cyber-Physical Systems 3, 1-13, 2023
882023
Cyber ranges and testbeds for education, training, and research
N Chouliaras, G Kittes, I Kantzavelou, L Maglaras, G Pantziou, MA Ferrag
Applied Sciences 11 (4), 1809, 2021
812021
A game-based intrusion detection mechanism to confront internal attackers
I Kantzavelou, S Katsikas
Computers & Security 29 (8), 859-874, 2010
502010
Data security for health care
SEISMED Consortium
IOS Press, 1996
421996
Challenges and Solutions of Surveillance Systems in IoT-Enabled Smart Campus: A Survey
T Anagnostopoulos, P Kostakos, A Zaslavsky, I Kantzavelou, N Tsotsolas, ...
IEEE Access, 2021
352021
A classification of health information systems security flaws
D Gritzalis, I Kantzavelou, S Katsikas, A Patel
Information Security—the Next Decade: Proceedings of the IFIP TC11 eleventh …, 1995
231995
A novel two-factor honeytoken authentication mechanism
V Papaspirou, L Maglaras, MA Ferrag, I Kantzavelou, H Janicke, ...
30th IEEE International Conference on Computer Communications and Networks …, 2021
222021
Smart homes: security challenges and privacy concerns
F Hall, L Maglaras, T Aivaliotis, L Xagoraris, I Kantzavelou
arXiv preprint arXiv:2010.15394, 2020
222020
A virtual lab model for an introductory computer science course
I Kantzavelou
Facta universitatis-series: Electronics and Energetics 18 (2), 263-274, 2005
172005
Enhancing student learning using asynchronous e-learning platforms
K Georgouli, I Kantzavelou, P Guerreiro, C Koilias
Proceedings of the International Conference on Cognition and Explanatory …, 2006
152006
Detecting intrusive activities from insiders in a wireless sensor network using game theory
I Kantzavelou, PF Tzikopoulos, SK Katsikas
Proceedings of the 6th International Conference on PErvasive Technologies …, 2013
122013
Implementing network security guidelines in health care information systems.
A Patel, I Kantzavelou
Medinfo. MEDINFO 8, 671-674, 1995
121995
Technical guidelines
Seismed Consortium
IOS Press, 1996
111996
Digital transformation and cybersecurity of critical infrastructures
L Maglaras, I Kantzavelou, MA Ferrag
Applied Sciences 11 (18), 8357, 2021
92021
Proposal for an integrated framework for electronic control unit design in the automotive industry
A Buczacki, P Piątek
Energies 14 (13), 3816, 2021
92021
The insider threat: Reasons, effects and mitigation techniques
D Tsiostas, G Kittes, N Chouliaras, I Kantzavelou, L Maglaras, ...
Proceedings of the 24th Pan-Hellenic Conference on Informatics, 340-345, 2020
92020
Playing games with internal attackers repeatedly
I Kantzavelou, S Katsikas
2009 16th International Conference on Systems, Signals and Image Processing, 1-6, 2009
82009
Integrating an open source LMS into the traditional educational process
K Georgouli, I Kantzavelou, I Skalkidis, P Zahariou
Proceedings of 2005 WSEAS, 300-308, 2005
82005
An attack detection system for secure computer systems-Outline of the solution
I Kantzavelou, SK Katsikas
Information Security in Research and Business: Proceedings of the IFIP TC11 …, 1997
81997
Issues of attack in distributed systems - A Generic Attack Model
I Kantzavelou, A Patel
Communications and Multimedia Security, 1-16, 1995
81995
The system can't perform the operation now. Try again later.
Articles 1–20