604 results on '"Ioannidis, Sotiris"'
Search Results
52. IntellIoT: Intelligent IoT Environments
53. I-BiDaaS: Industrial-Driven Big Data as a Self-service Solution
54. Evolving Twitter: an experimental analysis of graph properties of the social graph
55. Investigation into the performance of dose rate measurement instruments used in non-governmental networks
56. Discovery and Classification of Twitter Bots
57. A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks
58. Testing for common sense (violation) in airline pricing or how complexity asymmetry defeated you and the web
59. Automated Measurements of Cross-Device Tracking
60. Russo-Ukrainian War: Prediction and explanation of Twitter suspension
61. Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach
62. A survey on vulnerability assessment tools and databases for cloud-based web applications
63. A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems
64. Applications of the Internet of Materials: Programmable Wireless Environments
65. Designing the Internet-of-Materials Interaction Software
66. Preface
67. Introduction
68. Slotted ALOHA with Code Combining for IoT Networks
69. BinWrap: Hybrid Protection against Native Node.js Add-ons
70. Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting
71. List of contributors
72. Biosensors and Internet of Things in smart healthcare applications: challenges and opportunities
73. 7. Pattern-driven Security, Privacy, Dependability and Interoperability in IoT
74. Towards the Insurance of Healthcare Systems
75. You Shall Not Register! Detecting Privacy Leaks Across Registration Forms
76. No Sugar but All the Taste! Memory Encryption Without Architectural Support
77. A fine-grained social network recommender system
78. On the Impact of Coding Depth in Sliding Window Random Linear Network Coding Schemes
79. A Moving Target Defense Security Solution for IoT Applications
80. GRIM: Leveraging GPUs for Kernel Integrity Monitoring
81. Usability Evaluation of Accessible Complex Graphs
82. Zero-Energy Reconfigurable Intelligent Surfaces (zeRIS)
83. WRIT: Web Request Integrity and Attestation Against Malicious Browser Extensions
84. Secure Hardware-Software Architectures for Robust Computing Systems
85. GPU-Disasm: A GPU-Based X86 Disassembler
86. Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering
87. Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software
88. Think Before RT: An Experimental Study of Abusing Twitter Trends
89. What Tweets and YouTube comments have in common? Sentiment and graph analysis on data related to US elections 2020
90. Zero-Energy Reconfigurable Intelligent Surfaces (zeRIS)
91. On the Mobility Effect in UAV-Mounted Absorbing Metasurfaces: A Theoretical and Experimental Study
92. ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning
93. BotArtist: Twitter bot detection Machine Learning model based on Twitter suspension
94. Privacy Risks from Public Data Sources
95. AndRadar: Fast Discovery of Android Applications in Alternative Markets
96. Utilizing the average node degree to assess the temporal growth rate of Twitter
97. A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness
98. Dynamic Programmable Wireless Environment with UAV-mounted Static Metasurfaces
99. Towards the Internet of MetaMaterial Things: Software Enablers for User‐Customizable Electromagnetic Wave Propagation
100. An Open Platform for Simulating the Physical Layer of 6G Communication Systems with Multiple Intelligent Surfaces
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.