Follow
Patroklos Argyroudis
Patroklos Argyroudis
CENSUS S.A.
Verified email at census-labs.com - Homepage
Title
Cited by
Cited by
Year
Secure routing for mobile ad hoc networks.
PG Argyroudis, D O'mahony
IEEE Commun. Surv. Tutorials 7 (1-4), 2-21, 2005
2122005
Real-time intrusion detection for ad hoc networks
L Stamouli, PG Argyroudis, H Tewari
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
1282005
Performance analysis of cryptographic protocols on handheld devices
PG Argyroudis, R Verma, H Tewari, D O'Mahony
Third IEEE International Symposium on Network Computing and Applications …, 2004
1282004
Exploiting the jemalloc memory allocator: Owning Firefox’s heap
P Argyroudis, C Karamitas
Blackhat USA, 2012
242012
Securing communications in the smart home
PG Argyroudis, D O’Mahony
International Conference on Embedded and Ubiquitous Computing, 891-902, 2004
222004
Grouping abstraction and authority control in policy-based spectrum management
K Feeney, D Lewis, P Argyroudis, K Nolan, D O'Sullivan
2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2007
152007
Managing policies for dynamic spectrum access
D Lewis, K Feeney, K Foley, L Doyle, T Forde, P Argyroudis, J Keeney, ...
Autonomic Networking: First International IFIP TC6 Conference, AN 2006 …, 2006
152006
A policy-driven trading framework for market-based spectrum assignment
P Argyroudis, T Forde, L Doyle, D O'Mahony
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
122007
Matching electricity supply and demand using smart meters and home automation
R Verma, P Argyroudis, D O'Mahony
2009 IEEE PES/IAS Conference on Sustainable Alternative Energy (SAE), 1-7, 2009
102009
Collaborative service evaluation with the TwoHop trust framework
D Glynos, P Argyroudis, C Douligeris
Security and Communication Networks 5 (6), 594-613, 2012
92012
Protecting the core: Kernel exploitation mitigations
P Argyroudis, D Glynos
Black Hat Europe’11, 2011
92011
ÆTHER: An authorization management architecture for ubiquitous computing
PG Argyroudis, D O’Mahony
European Public Key Infrastructure Workshop, 246-259, 2004
82004
Twohop: metric-based trust evaluation for peer-to-peer collaboration environments
D Glynos, P Argyroudis, C Douligeris, D O'Mahony
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
62008
Comparing the costs of public key authentication infrastructures
P Argyroudis, R McAdoo, D O’Mahony
Proc. 1st Workshop on the Economics of Securing the Information …, 2006
62006
University Of Dublin
PG Argyroudis, D O’mahony
Trinity College,“Secure Routing for Mobile Ad hoc Networks, 0
6
Analysing the security threats against network convergence architectures
P Argyroudis, R McAdoo, S Toner, L Doyle, D O'Mahony
Third International Symposium on Information Assurance and Security, 241-246, 2007
52007
Authorization Management for Pervasive Computing
P Argyroudis
Trinity College, 2006
52006
Towards flexible authorization management
PG Argyroudis, D O'Mahony
10th IEEE Symposium on Computers and Communications (ISCC'05), 421-426, 2005
52005
PR3 email honeypot
J Seigneur, A Lambert, P Argyroudis, C Jensen
Department of Computer Science, University of Dublin, Tech. Rep. TCD-CS-2003-39, 2003
52003
Current state of secure routing for mobile ad hoc networks
P Argyroudis
Trinity College Dublin Security Interest Group, 2002
32002
The system can't perform the operation now. Try again later.
Articles 1–20