Artemios G. Voyiatzis
Artemios G. Voyiatzis
Artemios Vogiatzis
Verified email at - Homepage
Cited by
Cited by
A survey of delay-and disruption-tolerant networking applications
AG Voyiatzis
On the necessity of user-friendly CAPTCHA
CA Fidas, AG Voyiatzis, NM Avouris
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
Merged Mining: Curse or Cure?
A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl
International Workshop on Cryptocurrencies and Blockchain Technology (CBT'17 …, 2017
Security challenges in embedded systems
DN Serpanos, AG Voyiatzis
ACM Transactions on embedded computing systems (TECS) 12 (1s), 1-10, 2013
Exciting FPGA cryptographic Trojans using combinatorial testing
P Kitsos, DE Simos, J Torres-Jimenez, AG Voyiatzis
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
A Modbus/TCP fuzzer for testing internetworked industrial systems
AG Voyiatzis, K Katsigiannis, S Koubias
2015 IEEE 20th conference on emerging technologies & factory automation …, 2015
Time is on my side: Steganography in filesystem metadata
S Neuner, AG Voyiatzis, M Schmiedecker, S Brunthaler, S Katzenbeisser, ...
Digital Investigation 18, S76-S86, 2016
A Trust-based Resilient Routing Mechanism for the Internet of Things
ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann
International Conference on Availability, Reliability and Security (ARES), 2017
FPGA Trojan detection using length-optimized ring oscillators
P Kitsos, AG Voyiatzis
2014 17th Euromicro Conference on Digital System Design, 675-678, 2014
When security meets usability: A user-centric approach on a crossroads priority problem
CA Fidas, AG Voyiatzis, NM Avouris
2010 14th Panhellenic Conference on Informatics, 112-117, 2010
High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
L Ioannou, HE Michail, AG Voyiatzis
Embedded Computing (MECO), 2015 4th Mediterranean Conference on, 2015
An empirical study on the web password strength in greece
AG Voyiatzis, CA Fidas, DN Serpanos, NM Avouris
2011 15th Panhellenic Conference on Informatics, 212-216, 2011
An HMM-based anomaly detection approach for SCADA systems
K Stefanidis, AG Voyiatzis
IFIP International Conference on Information Security Theory and Practice, 85-99, 2016
Towards a hardware Trojan detection methodology
P Kitsos, AG Voyiatzis
2014 3rd Mediterranean Conference on Embedded Computing (MECO), 18-23, 2014
A versatile scalable smart waste-bin system based on resource-limited embedded devices
A Papalambrou, D Karadimas, J Gialelis, AG Voyiatzis
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015
Combinatorial Methods in Security Testing
DE Simos, R Kuhn, AG Voyiatzis, R Kacker
IEEE Computer 49 (10), 80-83, 2016
Efficient Triggering of Trojan Hardware Logic
AG Voyiatzis, KG Stefanidis, P Kitsos
19th IEEE International Symposium on Design and Diagnostics of Electronic …, 2016
A Survey on Network Resiliency Methodologies against Weather-based Disruptions
M Tornatore, J André, P Babarczi, T Braun, E Følstad, P Heegaard, ...
8th International Workshop on Resilient Networks Design and Modeling (RNDM …, 2016
Pipelined SHA-3 implementations on FPGA: Architecture and performance analysis
HE Michail, L Ioannou, AG Voyiatzis
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
Usblock: Blocking usb-based keypress injection attacks
S Neuner, AG Voyiatzis, S Fotopoulos, C Mulliner, ER Weippl
IFIP Annual Conference on Data and Applications Security and Privacy, 278-295, 2018
The system can't perform the operation now. Try again later.
Articles 1–20