Follow
Ioanna Kantzavelou
Ioanna Kantzavelou
Associate Prof., Dept. of Informatics and Computer Engineering, University of West Attica, GREECE.
Verified email at uniwa.gr
Title
Cited by
Cited by
Year
IoT: Communication Protocols and Security Threats
A Gerodimos, L Maglaras, MA Ferrag, N Ayres, I Kantzavelou
Internet of Things and Cyber-Physical Systems 3, 1-13, 2023
1182023
Cyber ranges and testbeds for education, training, and research
N Chouliaras, G Kittes, I Kantzavelou, L Maglaras, G Pantziou, MA Ferrag
Applied Sciences 11 (4), 1809, 2021
892021
A game-based intrusion detection mechanism to confront internal attackers
I Kantzavelou, S Katsikas
Computers & Security 29 (8), 859-874, 2010
532010
Data security for health care
SEISMED Consortium
IOS Press, 1996
421996
Challenges and Solutions of Surveillance Systems in IoT-Enabled Smart Campus: A Survey
T Anagnostopoulos, P Kostakos, A Zaslavsky, I Kantzavelou, N Tsotsolas, ...
IEEE Access, 2021
412021
A novel two-factor honeytoken authentication mechanism
V Papaspirou, L Maglaras, MA Ferrag, I Kantzavelou, H Janicke, ...
30th IEEE International Conference on Computer Communications and Networks …, 2021
262021
Smart homes: security challenges and privacy concerns
F Hall, L Maglaras, T Aivaliotis, L Xagoraris, I Kantzavelou
arXiv preprint arXiv:2010.15394, 2020
232020
A classification of health information systems security flaws
D Gritzalis, I Kantzavelou, S Katsikas, A Patel
Information Security—the Next Decade: Proceedings of the IFIP TC11 eleventh …, 1995
231995
A virtual lab model for an introductory computer science course
I Kantzavelou
Facta universitatis-series: Electronics and Energetics 18 (2), 263-274, 2005
172005
Enhancing student learning using asynchronous e-learning platforms
K Georgouli, I Kantzavelou, P Guerreiro, C Koilias
Proceedings of the International Conference on Cognition and Explanatory …, 2006
152006
The insider threat: Reasons, effects and mitigation techniques
D Tsiostas, G Kittes, N Chouliaras, I Kantzavelou, L Maglaras, ...
Proceedings of the 24th Pan-Hellenic Conference on Informatics, 340-345, 2020
142020
Digital transformation and cybersecurity of critical infrastructures
L Maglaras, I Kantzavelou, MA Ferrag
Applied Sciences 11 (18), 8357, 2021
122021
Detecting intrusive activities from insiders in a wireless sensor network using game theory
I Kantzavelou, PF Tzikopoulos, SK Katsikas
Proceedings of the 6th International Conference on PErvasive Technologies …, 2013
122013
Implementing network security guidelines in health care information systems.
A Patel, I Kantzavelou
Medinfo. MEDINFO 8, 671-674, 1995
121995
Technical guidelines
Seismed Consortium
IOS Press, 1996
111996
Proposal for an integrated framework for electronic control unit design in the automotive industry
A Buczacki, P Piątek
Energies 14 (13), 3816, 2021
102021
Blockchain Technology: A case study in supply chain management
T Abdelgalil, V Manolas, L Maglaras, I Kantzavelou, MA Ferrag
3rd IEEE International Conference on Trust, Privacy and Security in …, 2021
92021
Cybersecurity issues in emerging technologies
L Maglaras, I Kantzavelou
CRC press, 2021
92021
Playing games with internal attackers repeatedly
I Kantzavelou, S Katsikas
2009 16th International Conference on Systems, Signals and Image Processing, 1-6, 2009
92009
Hybrid Threats, Cyberterrorism and Cyberwarfare
MA Ferrag, I Kantzavelou, L Maglaras, H Janicke
CRC Press, 2023
82023
The system can't perform the operation now. Try again later.
Articles 1–20