Artemios G. Voyiatzis
Artemios G. Voyiatzis
Artemios Vogiatzis
Verified email at artemiosv.info - Homepage
Title
Cited by
Cited by
Year
A survey of delay-and disruption-tolerant networking applications
AG Voyiatzis
1002012
On the necessity of user-friendly CAPTCHA
CA Fidas, AG Voyiatzis, NM Avouris
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
832011
Security challenges in embedded systems
DN Serpanos, AG Voyiatzis
ACM Transactions on embedded computing systems (TECS) 12 (1s), 1-10, 2013
462013
Exciting FPGA cryptographic Trojans using combinatorial testing
P Kitsos, DE Simos, J Torres-Jimenez, AG Voyiatzis
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
432015
A Modbus/TCP fuzzer for testing internetworked industrial systems
AG Voyiatzis, K Katsigiannis, S Koubias
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015
392015
Merged Mining: Curse or Cure?
A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl
International Workshop on Cryptocurrencies and Blockchain Technology (CBT'17 …, 2017
322017
When security meets usability: A user-centric approach on a crossroads priority problem
CA Fidas, AG Voyiatzis, NM Avouris
2010 14th Panhellenic Conference on Informatics, 112-117, 2010
302010
Time is on my side: Steganography in filesystem metadata
S Neuner, AG Voyiatzis, M Schmiedecker, S Brunthaler, S Katzenbeisser, ...
Digital Investigation 18, S76-S86, 2016
262016
An empirical study on the web password strength in greece
AG Voyiatzis, CA Fidas, DN Serpanos, NM Avouris
2011 15th Panhellenic Conference on Informatics, 212-216, 2011
262011
FPGA Trojan detection using length-optimized ring oscillators
P Kitsos, AG Voyiatzis
2014 17th Euromicro Conference on Digital System Design, 675-678, 2014
242014
High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
L Ioannou, HE Michail, AG Voyiatzis
Embedded Computing (MECO), 2015 4th Mediterranean Conference on, 2015
222015
A versatile scalable smart waste-bin system based on resource-limited embedded devices
A Papalambrou, D Karadimas, J Gialelis, AG Voyiatzis
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015
202015
A Trust-based Resilient Routing Mechanism for the Internet of Things
ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann
International Conference on Availability, Reliability and Security (ARES), 2017
192017
An HMM-based anomaly detection approach for SCADA systems
K Stefanidis, AG Voyiatzis
IFIP International Conference on Information Security Theory and Practice, 85-99, 2016
192016
Towards a hardware Trojan detection methodology
P Kitsos, AG Voyiatzis
2014 3rd Mediterranean Conference on Embedded Computing (MECO), 18-23, 2014
192014
A Survey on Network Resiliency Methodologies against Weather-based Disruptions
M Tornatore, J André, P Babarczi, T Braun, E Følstad, P Heegaard, ...
8th International Workshop on Resilient Networks Design and Modeling (RNDM …, 2016
172016
Efficient Triggering of Trojan Hardware Logic
AG Voyiatzis, KG Stefanidis, P Kitsos
19th IEEE International Symposium on Design and Diagnostics of Electronic …, 2016
162016
Pipelined SHA-3 implementations on FPGA: Architecture and performance analysis
HE Michail, L Ioannou, AG Voyiatzis
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
162015
Combinatorial Methods in Security Testing
DE Simos, R Kuhn, AG Voyiatzis, R Kacker
IEEE Computer 49 (10), 80-83, 2016
152016
Design and implementation of an efficient integer count sort in CUDA GPUs
V Kolonias, AG Voyiatzis, G Goulas, E Housos
Concurrency and Computation: Practice and Experience 23 (18), 2365-2381, 2011
132011
The system can't perform the operation now. Try again later.
Articles 1–20