Follow
Artemios G. Voyiatzis
Artemios G. Voyiatzis
Artemios Vogiatzis
Verified email at artemiosv.info - Homepage
Title
Cited by
Cited by
Year
On the necessity of user-friendly CAPTCHA
CA Fidas, AG Voyiatzis, NM Avouris
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
1192011
A survey of delay-and disruption-tolerant networking applications
AG Voyiatzis
Journal of Internet engineering 5 (1), 331-344, 2012
1162012
A Modbus/TCP fuzzer for testing internetworked industrial systems
AG Voyiatzis, K Katsigiannis, S Koubias
2015 IEEE 20th conference on emerging technologies & factory automation …, 2015
832015
Security challenges in embedded systems
DN Serpanos, AG Voyiatzis
ACM Transactions on embedded computing systems (TECS) 12 (1s), 1-10, 2013
692013
A Trust-based Resilient Routing Mechanism for the Internet of Things
ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann
International Conference on Availability, Reliability and Security (ARES), 2017
672017
Exciting FPGA cryptographic Trojans using combinatorial testing
P Kitsos, DE Simos, J Torres-Jimenez, AG Voyiatzis
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
652015
Merged Mining: Curse or Cure?
A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl
International Workshop on Cryptocurrencies and Blockchain Technology (CBT'17 …, 2017
572017
Time is on my side: Steganography in filesystem metadata
S Neuner, AG Voyiatzis, M Schmiedecker, S Brunthaler, S Katzenbeisser, ...
Digital Investigation 18, S76-S86, 2016
562016
An HMM-based anomaly detection approach for SCADA systems
K Stefanidis, AG Voyiatzis
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
532016
High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
L Ioannou, HE Michail, AG Voyiatzis
Embedded Computing (MECO), 2015 4th Mediterranean Conference on, 2015
412015
FPGA Trojan detection using length-optimized ring oscillators
P Kitsos, AG Voyiatzis
2014 17th Euromicro Conference on Digital System Design, 675-678, 2014
342014
Combinatorial Methods in Security Testing
DE Simos, R Kuhn, AG Voyiatzis, R Kacker
IEEE Computer 49 (10), 80-83, 2016
332016
A versatile scalable smart waste-bin system based on resource-limited embedded devices
A Papalambrou, D Karadimas, J Gialelis, AG Voyiatzis
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015
322015
Pipelined SHA-3 implementations on FPGA: Architecture and performance analysis
HE Michail, L Ioannou, AG Voyiatzis
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
322015
When security meets usability: A user-centric approach on a crossroads priority problem
CA Fidas, AG Voyiatzis, NM Avouris
2010 14th Panhellenic Conference on Informatics, 112-117, 2010
312010
A Survey on Network Resiliency Methodologies against Weather-based Disruptions
M Tornatore, J André, P Babarczi, T Braun, E Følstad, P Heegaard, ...
8th International Workshop on Resilient Networks Design and Modeling (RNDM …, 2016
302016
An empirical study on the web password strength in Greece
AG Voyiatzis, CA Fidas, DN Serpanos, NM Avouris
2011 15th Panhellenic Conference on Informatics, 212-216, 2011
302011
Usblock: Blocking usb-based keypress injection attacks
S Neuner, AG Voyiatzis, S Fotopoulos, C Mulliner, ER Weippl
Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 …, 2018
282018
Efficient Triggering of Trojan Hardware Logic
AG Voyiatzis, KG Stefanidis, P Kitsos
19th IEEE International Symposium on Design and Diagnostics of Electronic …, 2016
272016
Towards a hardware Trojan detection methodology
P Kitsos, AG Voyiatzis
2014 3rd Mediterranean Conference on Embedded Computing (MECO), 18-23, 2014
252014
The system can't perform the operation now. Try again later.
Articles 1–20