Skip to main content

Showing 1–10 of 10 results for author: Douligeris, C

Searching in archive cs. Search in all archives.
.
  1. Electric Vehicle Charging: a Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP)

    Authors: Z. Garofalaki, D. Kosmanos, S. Moschoyiannis, D. Kallergis, C. Douligeris

    Abstract: The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV) opened a new area of research and development. The number of EV charging sites has considerably increased in residential as well as in public areas. Within these EV charging sites, various entities need to communicate in a secure and efficient way. The Open Charge Point Protocol (OCPP) offers a way to coordinate… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

  2. arXiv:2112.08431  [pdf, other

    cs.CR

    Cybersecurity Revisited: Honeytokens meet Google Authenticator

    Authors: Vasilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke

    Abstract: Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor authentication process. The current implementation c… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: 6 pages, 1 figure

  3. arXiv:2012.08782  [pdf, other

    cs.CR

    A novel Two-Factor HoneyToken Authentication Mechanism

    Authors: Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris

    Abstract: The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regar… ▽ More

    Submitted 20 January, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: 7 pages, 6 figures

  4. CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices

    Authors: Dimitrios Kallergis, Zacharenia Garofalaki, Georgios Katsikogiannis, Christos Douligeris

    Abstract: The microservices architectural approach has important benefits regarding the agile applications' development and the delivery of complex solutions. However, to convey the information and share the data amongst services in a verifiable and stateless way, there is a need to enable appropriate access control methods and authorisations. In this paper, we study the use of policy-driven authorisations… ▽ More

    Submitted 30 April, 2020; v1 submitted 21 April, 2020; originally announced April 2020.

    MSC Class: 68M14 ACM Class: C.2.4; C.2.1; D.4.6; H.3.4

  5. arXiv:1706.04803  [pdf

    cs.NI cs.CR

    A Policy-Aware Model for Intelligent Transportation Systems

    Authors: Zacharenia Garofalaki, Dimitrios Kallergis, Georgios Katsikogiannis, Christos Douligeris

    Abstract: Recent advancements in the field of smart machine-to-machine (M2M) communications impose the necessity to improve the service delivery by enforcing appropriate security rules. Due to the large number of connected devices, the criticality of the M2M applications, and the network stability weaknesses, we need to consider and analyse the security aspects and establish a flexible policy-aware architec… ▽ More

    Submitted 1 July, 2017; v1 submitted 15 June, 2017; originally announced June 2017.

    Comments: 5 pages, First International Balkan Conference on Communications and Networking, Tirana, Albania, May 30-June 2, 2017

  6. arXiv:1410.5416  [pdf

    cs.SE cs.CY

    Software in e-Learning Architecture, Processes and Management

    Authors: Michael Mpasios, Dimitrios Kallergis, Konstantinos Chimos, Theodoros Karvounidis, Christos Douligeris

    Abstract: Our entire society is becoming more and more dependent on technology and specifically on software. The integration of e-learning software systems into our day by day life especially in e-learning applications generates modifications upon the society and, at the same time, the society itself changes the process of software development. This circle of continuous determination engenders a highly dyna… ▽ More

    Submitted 19 October, 2014; originally announced October 2014.

    Comments: 9 pages, 6th International Conference of Education, Research and Innovation (iCERI2013), November 18-20, Seville, Spain. ISBN: 978-84-616-3847-5

    MSC Class: 68-06 ACM Class: D.2.9; I.2.5; K.3.1; K.3.2

  7. arXiv:1410.4967  [pdf

    cs.SE cs.DC

    Pirus: A Web-based File Hosting Service with Object Oriented Logic in Cloud Computing

    Authors: Dimitrios Kallergis, Konstantinos Chimos, Vizikidis Stefanos, Theodoros Karvounidis, Christos Douligeris

    Abstract: In this paper a new Web-based File Hosting Service with Object Oriented Logic in Cloud Computing called Pirus was developed. The service will be used by the academic community of the University of Piraeus giving users the ability to remotely store and access their personal files with no security compromises. It also offers the administrators the ability to manage users and roles. The objective was… ▽ More

    Submitted 18 October, 2014; originally announced October 2014.

    Comments: 6 pages, 3rd International Conference on Internet and Cloud Computing Technology (ICICCT2013), November 6-7 2013, Singapore

    MSC Class: 68U99 ACM Class: C.2.4; D.1.5; D.2.3; D.4.3; H.3.5

    Journal ref: International Journal of Information Technology & Computer Science (IJITCS) 12 (3) (2013) 38-43

  8. arXiv:0807.2053  [pdf

    cs.CR cs.NI

    Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks

    Authors: Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris

    Abstract: In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on a class of neural networks called eSOM. The… ▽ More

    Submitted 13 July, 2008; originally announced July 2008.

    Comments: 8 pages, 9 figures, presented at MedHocNet07

  9. arXiv:0807.2049  [pdf, ps, other

    cs.CR cs.NI

    Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

    Authors: Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris

    Abstract: In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian Mixture Model (GMM), the Naive Bayes classifier and the Support Vector Machine (SVM). The performance of the classification algorithms is evaluated… ▽ More

    Submitted 13 July, 2008; originally announced July 2008.

    Comments: 12 pages, 7 figures, presented at MedHocNet 2008

  10. arXiv:0807.2043  [pdf

    cs.CR cs.CV cs.NI

    Intrusion Detection Using Cost-Sensitive Classification

    Authors: Aikaterini Mitrokotsa, Christos Dimitrakakis, Christos Douligeris

    Abstract: Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not detecting at- tacks. For this reason, we examine how cost-sensitive classification methods can be used in Intrusion Detection systems. The performance of the approach is evaluated under different experimental conditio… ▽ More

    Submitted 13 July, 2008; originally announced July 2008.

    Comments: 13 pages, 6 figures, presented at EC2ND 2007