Constantinos Kolias
Constantinos Kolias
Assistant Professor, University of Idaho
Verified email at
Cited by
Cited by
DDoS in the IoT: Mirai and Other Botnets
C Kolias, G Kambourakis, A Stavrou, J Voas
Computer 50 (7), 80-84, 2017
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
C Kolias, G Kambourakis, A Stavrou, S Gritzalis
Communications Surveys & Tutorials, 2015
The mirai botnet and the iot zombie armies
G Kambourakis, C Kolias, A Stavrou
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 267-272, 2017
Swarm intelligence in intrusion detection: A survey
C Kolias, G Kambourakis, M Maragoudakis
Computers & Security 30 (8), 625-642, 2011
Learning Internet-of-Things Security" Hands-On"
C Kolias, A Stavrou, J Voas, I Bojanova, R Kuhn
IEEE Security & Privacy 14 (1), 37-46, 2016
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset
S Vidros, C Kolias, G Kambourakis, L Akoglu
Future Internet 9 (1), 6, 2017
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset
E Chatzoglou, G Kambourakis, C Kolias
IEEE Access 9, 34188-34205, 2021
TermID: A distributed swarm intelligence-based approach for wireless intrusion detection
C Kolias, V Kolias, G Kambourakis
International Journal of Information Security 16, 401-416, 2017
Attacks and Countermeasures on 802.16: Analysis and Assessment
C Kolias, G Kambourakis, S Gritzalis
DoS attacks exploiting signaling in UMTS and IMS
G Kambourakis, C Kolias, S Gritzalis, JH Park
Computer Communications 34 (3), 226-235, 2011
Online recruitment services: another playground for fraudsters
S Vidros, C Kolias, G Kambourakis
Computer Fraud & Security 2016 (3), 8-13, 2016
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents
GM Makrakis, C Kolias, G Kambourakis, C Rieger, J Benjamin
IEEE Access 9, 165295-165325, 2021
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks
G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos, GM Makrakis, ...
Symmetry 12 (4), 579, 2020
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE
E Chatzoglou, G Kambourakis, C Kolias
Journal of Information Security and Applications 64, 103058, 2022
Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems
E Chatzoglou, G Kambourakis, C Kolias, C Smiliotopoulos
IEEE Access 10, 64761-64784, 2022
Breaking BLE Beacons For Fun But Mostly Profit
C Kolias, L Copi, F Zhang, A Stavrou
Proceedings of the 10th European Workshop on Systems Security, 4, 2017
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?
Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ...
2015 12th International Joint Conference on e-Business and …, 2015
Cybertrust in the IoT Age
J Voas, R Kuhn, C Kolias, A Stavrou, G Kambourakis
Computer 51 (7), 12-15, 2018
Securely Making" Things" Right
C Kolias, A Stavrou, J Voas
Computer 48 (9), 84-88, 2015
Signaling-oriented DoS attacks in UMTS networks
G Kambourakis, C Kolias, S Gritzalis, J Hyuk-Park
Advances in Information Security and Assurance: Third International …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20