Conferences & Workshops
- Vedros, Kurt A., Constantinos Kolias, Daniel Barbara, and Robert C. Ivans. “From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection.” In Proceedings of the 19th International Conference on Availability, Reliability and Security, pp. 1-10. 2024.
- Vedros, Kurt A., Georgios Michail Makrakis, Constantinos Kolias, Robert C. Ivans, and Craig Rieger. “Towards scalable em-based anomaly detection for embedded devices through synthetic fingerprinting.” 12th International Conference on Embedded Systems and Applications (EMSA 2023).
- Makrakis, Georgios Michail, Dakota Roberson, and Constantinos Kolias. “WIPP: Towards IEC 62443-3-3 network compliance via software-defined networking in digital substations.” In 2023 Resilience Week (RWS), pp. 1-7. IEEE, 2023.
- Vedros, Kurt A., Constantinos Kolias, and Robert C. Ivans. “Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis.” In MILCOM 2023-2023 IEEE Military Communications Conference (MILCOM), pp. 716-721. IEEE, 2023.
- Craig Rieger, Constantinos Kolias, Robert C. Ivans, Shannon Eggers, Trade-off Analysis of Operational Technologies to Advance Cyber Resilience through Automated and Autonomous Response to Threats”, In 2022 Resilience Week (RWS) IEEE, 2022.
- Ekaterina Miller, Georgios Michail Makrakis, Kurt A. Vedros, Constantinos Kolias, Craig Rieger and Daniel Barbara, “Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising”, In 20th International Conference on Embedded Systems, Cyber-physical Systems, and Applications (ESCS 22).
- Vedros, Kurt, Georgios Michail Makrakis, Constantinos Kolias, Min Xian, Daniel Barbara, and Craig Rieger. “On the Limits of EM Based Detection of Control Logic Injection Attacks In Noisy Environments.” In 2021 Resilience Week (RWS), pp. 1-9. IEEE, 2021.
- Chatzigiannis, Panagiotis, Foteini Baldimtsi, Constantinos Kolias, and Angelos Stavrou. “Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors.” In Proceedings of the International Conference on Internet-of-Things Design and Implementation, pp. 1-14. 2021.
- Rieger, Craig, Constantinos Kolias, Jacob Ulrich, and Timothy R. McJunkin. “A cyber resilient design for control systems.” In 2020 Resilience Week (RWS), pp. 18-25. IEEE, 2020.
- Kolias, Constantinos, R. A. Borrelli, Daniel Barbara, and Angelos Stavrou. “Malware detection in critical infrastructures using the electromagnetic emissions of plcs.” Transactions of American Nuclear Society 121, no. 1 (2019): 519-522.
- Georgios Kambourakis, Constantinos Kolias, and Angelos Stavrou. “The Mirai Botnet and the IoT ZombieArmies”. In: Proceedings of the 36th international conference for military communications (MILCOM). (Baltimore,MD). IEEE Press. Oct. 2017.
- Constantinos Kolias, Lucas Copi, Fengwei Zhang, and Angelos Stavrou. “Breaking BLE Beacons For Fun But Mostly Profit”. In: Proceedings of the 10th European Workshop on Systems Security. ACM. 2017, p. 4.
- Zisis Tsiatsikas, Alexandros Fakis, Dimitrios Papamartzivanos, Dimitris Geneiatakis, Georgios Kambourakis, and Constantinos Kolias. “Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?” In:e-Business and Telecommunications (ICETE), 2015 12th International Joint Conference on. Vol. 4.IEEE. 2015, pp. 301–308.
- Vasilis Kolias, Constantinos Kolias, Ioannis Anagnostopoulos, and Eleftherios Kayafas. “RuleMR: Classification rule discovery with MapReduce”. In:Big Data (Big Data), 2014 IEEE International Conference on. IEEE.2014, pp. 20–28.
- Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, and Jong Hyuk-Park. “Signaling-orientedDoS attacks in UMTS networks”. In: International Conference on Information Security and Assurance. Springer.2009, pp. 280–289.
- Constantinos Kolias, Vasilis Kolias, and Georgios Kambourakis. “A secure and efficient authentication protocol for passive RFID tags”. In: Wireless Communication Systems, 2009. ISWCS 2009. 6th International Symposium on. IEEE. 2009, pp. 36–40.
- Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, and Eleftherios Kayafas.“A pervasive Wiki application based on VoiceXML”. In: Proceedings of the 1st international conference on Pervasive Technologies Related to Assistive Environments. ACM. 2008, p. 58.
- Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, and Eleftherios Kayafas.“Enhancing user privacy in adaptive web sites with client-side user profiles”. In: Semantic Media Adaptation and Personalization, 2008. SMAP’08. Third International Workshop on. IEEE. 2008, pp. 170–176.
- Vassilis Kolias, Constantinos Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, and Eleftherios Kayafas.“A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization”. In: Semantic Media Adaptation and Personalization, 2008. SMAP’08. Third International Workshop on. IEEE. 2008,pp. 157–163.
Journals
- Vedros, Kurt A., Aleksandar Vakanski, Domenic J. Forte, and Constantinos Kolias. “From Capture–Recapture to No Recapture: Efficient SCAD Even After Software Updates.” Sensors (2026).
- Koffi, Koffi Anderson, Vyron Kampourakis, Constantinos Kolias, Jia Song, and Robert C. Ivans. “Speeding-up fuzzing through directional seeds.” International journal of information security 24, no. 2 (2025): 77.
- Smiliotopoulos, Christos, Georgios Kambourakis, Constantinos Kolias, and Stefanos Gritzalis. “Assessing the detection of lateral movement through unsupervised learning techniques.” Computers & Security 149 (2025): 104190.
- Makrakis, Georgios Michail, Dakota Roberson, Constantinos Kolias, and Dallin Cook. “Evaluation of SDN security measures in the context of IEC 62443-3-3.” International Journal of Critical Infrastructure Protection 47 (2024): 100716.
- Koffi, Koffi Anderson, Christos Smiliotopoulos, Constantinos Kolias, and Georgios Kambourakis. “To (US) Be or Not to (US) Be: Discovering Malicious USB Peripherals through Neural Network-Driven Power Analysis.” Electronics 13, no. 11 (2024): 2117.
- Kampourakis, Vyron, Georgios Michail Makrakis, and Constantinos Kolias. “From seek-and-destroy to split-and-destroy: connection partitioning as an effective tool against low-rate dos attacks.” Future Internet 16, no. 4 (2024): 137.
- Koffi, Koffi Anderson, Vyron Kampourakis, Jia Song, Constantinos Kolias, and Robert C. Ivans. “Structuredfuzzer: Fuzzing structured text-based control logic applications.” Electronics 13, no. 13 (2024): 2475.
- Smiliotopoulos, Christos, Georgios Kambourakis, and Constantinos Kolias. “Detecting lateral movement: A systematic survey.” Heliyon 10, no. 4 (2024).
- Chatzoglou, Efstratios, Georgios Kambourakis, Christos Smiliotopoulos, and Constantinos Kolias. “Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features.” Sensors 22, no. 15 (2022): 5633.
- Chatzoglou, Efstratios, Georgios Kambourakis, Constantinos Kolias, and Christos Smiliotopoulos. “Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems.” IEEE Access 10 (2022): 64761-64784.
- Chatzoglou, Efstratios, Georgios Kambourakis, and Constantinos Kolias. “Your wap is at risk: a vulnerability analysis on wireless access point web-based management interfaces.” Security and Communication Networks 2022 (2022).
- Chatzoglou, Efstratios, Georgios Kambourakis, and Constantinos Kolias. “How is your Wi-Fi connection today? DoS attacks on WPA3-SAE.” Journal of Information Security and Applications 64 (2022): 103058.
- Makrakis, Georgios Michail, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, and Jacob Benjamin. “Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents.” IEEE Access (2021).
- Chatzoglou, Efstratios, Georgios Kambourakis, and Constantinos Kolias. “WiF0: All your passphrase are belong to us.” Computer 54, no. 07 (2021): 82-88.
- Chatzoglou, Efstratios, Georgios Kambourakis, and Constantinos Kolias. “Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset.” IEEE Access 9 (2021): 34188-34205.
- Kambourakis, Georgios, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, and Ioannis Kounelis. “A state-of-the-art review on the security of mainstream IoT wireless PAN protocol stacks.” Symmetry 12, no. 4 (2020): 579.
- Voas, Jeffrey, Rick Kuhn, Constantinos Kolias, Angelos Stavrou, and Georgios Kambourakis. “Cybertrust in the iot age.” Computer 51, no. 7 (2018): 12-15.
- Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. “DDoS in the IoT: Mirai and Other Botnets”. In:Computer50.7 (2017), pp. 80–84.
- Sokratis Vidros, Constantinos Kolias, Georgios Kambourakis, and Leman Akoglu. “Automatic Detection ofOnline Recruitment Frauds: Characteristics, Methods, and a Public Dataset”. In:Future Internet9.1 (2017),p. 6.
- Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Stefanos Gritzalis. “Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset”. In:IEEE Communications Surveys& Tutorials18.1 (2016), pp. 184–208.
- Constantinos Kolias, Vasilis Kolias, and Georgios Kambourakis. “TermID: a distributed swarm intelligence-based approach for wireless intrusion detection”. In:International Journal of Information Security(2016), pp. 1–16.
- Constantinos Kolias, Angelos Stavrou, Jeffrey Voas, Irena Bojanova, and Richard Kuhn. “Learning Internet-of-Things Security” Hands-On””. In:IEEE Security & Privacy14.1 (2016), pp. 37–46.
- Angelos Stavrou, Daniel Fleck, and Constantinos Kolias. “On the Move: Evading Distributed Denial-of-Service Attacks”. In:Computer49.3 (2016), pp. 104–107.
- Sokratis Vidros, Constantinos Kolias, and Georgios Kambourakis. “Online recruitment services: another playground for fraudsters”. In:Computer Fraud & Security2016.3 (2016), pp. 8–13.
- Constantinos Kolias, Angelos Stavrou, and Jeffrey Voas. “Securely Making” Things” Right”. In:Computer48.9 (2015), pp. 84–88.
- Constantinos Kolias, Georgios Kambourakis, and Stefanos Gritzalis. “Attacks and countermeasures on 802.16:Analysis and assessment”. In:IEEE Communications Surveys & Tutorials15.1 (2013), pp. 487–514.
- Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, and Jong Hyuk Park. “DoS attacks exploit-ing signaling in UMTS and IMS”. In:Computer Communications34.3 (2011), pp. 226–235.
- Constantinos Kolias, Georgios Kambourakis, and M Maragoudakis. “Swarm intelligence in intrusion detection: A survey”. In:computers & security30.8 (2011), pp. 625–642.
- Vassilis Kolias, Constantinos Kolias, Ioannis E Anagnostopoulos, Georgios Kambourakis, and Eleftherios Kayafas. “TELS: A Voice-Response Internet-Based Learning System”. In:Journal of Internet Technology12.2(2011), pp. 217–235.
- Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, and Eleftherios Kayafas.“Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web”.In:Personal and Ubiquitous Computing14.6 (2010), pp. 527–539.
- Demosthenes Vouyioukas, George Kambourakis, Ilias Maglogiannis, Angelos Rouskas, Constantinos Kolias, and Stefanos Gritzalis. “Enabling the provision of secure web based m-health services utilizing XML based security models”. In:Security and Communication Networks1.5 (2008), pp. 375–388.
Books & Book Chapters
- Georgios Kambourakis, Assaf Shabtai, Constantinos Kolias, and Dimitrios Damopoulos.Intrusion Detection and Prevention for Mobile Ecosystems. Series in Security, Privacy and Trust. CRC Press, 2017.ISBN: 9781138033573.
- Constantinos Kolias, Vassilis Kolias, Georgios Kambourakis, and Eleftherios Kayafas. “A Client-Side PrivacyFramework for Web Personalization”. In:Semantic Hyper/Multimedia Adaptation. Springer, 2013, pp. 297–316.