- Haque, S., El-Moussa, F., Komninos, N. and Muttukrishnan, R. (2023). A Systematic Review of Data-Driven Attack Detection Trends in IoT. Sensors, 23(16), pp. 7191–7191. doi:10.3390/s23167191.
- Behbehani, D., Komninos, N., Al-Begain, K. and Rajarajan, M. (2023). Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment. Journal of Cloud Computing, 12(1). doi:10.1186/s13677-023-00454-2.
- Berry, C. and Komninos, N. (2022). Efficient optimisation framework for convolutional neural networks with secure multiparty computation. Computers & Security, 117, pp. 102679–102679. doi:10.1016/j.cose.2022.102679.
- Fernando, D.W. and Komninos, N. (2022). FeSA: Feature Selection Architecture for Ransomware Detection Under Concept Drift. Computers & Security. doi:10.1016/j.cose.2022.102659.
- Junejo, A.K., Komninos, N., Sathiyanarayanan, M. and Chowdhry, B.S. (2021). Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems. IEEE Transactions on Emerging Topics in Computing, 9(4), pp. 2030–2041. doi:10.1109/tetc.2019.2957394.
- Junejo, A.K., Komninos, N. and McCann, J.A. (2021). A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems. IEEE Internet of Things Journal, 8(8), pp. 6840–6852. doi:10.1109/jiot.2020.3035474.
- Fernando, D.W., Komninos, N. and Chen, T. (2020). A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques. IoT, 1(2), pp. 551–604. doi:10.3390/iot1020030.
- Junejo, A.K. and Komninos, N. (2020). A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems. Wireless Communications and Mobile Computing, 2020, pp. 1–18. doi:10.1155/2020/2145829.
- Procopiou, A., Komninos, N. and Douligeris, C. (2019). ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network. Wireless Communications and Mobile Computing, 2019, pp. 1–14. doi:10.1155/2019/8469410.
- Acarali, D., Rajarajan, M., Komninos, N. and Zarpelão, B.B. (2019). Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Security and Communication Networks, 2019, pp. 1–13. doi:10.1155/2019/3745619.
- Saxena, N., Shen, H., Komninos, N., Choo, K.-.K.R. and Chaudhari, N.S. (2018). BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. IEEE Transactions on Dependable and Secure Computing pp. 1–1. doi:10.1109/tdsc.2018.2799223.
- Mourouzis, T., Wojcik, M. and Komninos, N. (2016). On The Security Evaluation of Partial Password Implementations. arXiv Cornel University.
- Acarali, D., Rajarajan, M., Komninos, N. and Herwono, I. (2016). Survey of approaches and features for the identification of HTTP-based botnet traffic. Journal of Network and Computer Applications, 76, pp. 1–15. doi:10.1016/j.jnca.2016.10.007.
- Komninos, N., Philippou, E. and Pitsillides, A. (2014). Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures. IEEE Communications Surveys & Tutorials, 16(4), pp. 1933–1954. doi:10.1109/comst.2014.2320093.
- Fengou, M.A., Mantas, G., Lymberopoulos, D., Komninos, N., Fengos, S. and Lazarou, N. (2012). A New Framework Architecture for Next Generation e-Health Services. IEEE Trans Inf Technol Biomed, (99). doi:10.1109/TITB.2012.2224876.
- Georgakakis, E., Komninos, N. and Douligeris, C. (2012). NAVI: Novel authentication with visual information. Proceedings - IEEE Symposium on Computers and Communications pp. 588–595. doi:10.1109/ISCC.2012.6249360.
- Mantas, G., Lymberopoulos, D. and Komninos, N. (2012). PKI security in large-scale healthcare networks. J Med Syst, 36(3), pp. 1107–1116. doi:10.1007/s10916-010-9573-1.
- Tselikis, C., Mitropoulos, S., Komninos, N. and Douligeris, C. (2012). Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Communications Letters, 16, pp. 619–621. doi:10.1109/LCOMM.2012.031912.112484.
- Michalas, A., Dimitriou, T., Giannetsos, T., Komninos, N. and Prasad, N.R. (2012). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wireless Personal Communications, 66, pp. 559–575. doi:10.1007/s11277-012-0734-z.
- Michalas, A., Komninos, N. and Prasad, N.R. (2012). Secure & Trusted Communication in Emergency Situations. 35th IEEE SARNOFF Symposium.
- Kolokouris, I., Zarokostas, N. and Komninos, N. (2011). Integrity and authenticity mechanisms for sensor networks. pp. 115–130.
- Mitrokotsa, A., Komninos, N. and Douligeris, C. (2011). Intrusion detection and response in ad hoc networks. pp. 19–51.
- Michalas, A., Komninos, N. and Prasad, N.R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011. doi:10.1109/WIRELESSVITAE.2011.5940931.
- Sabouri, A., Komninos, N. and Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 2011 18th International Conference on Telecommunications, ICT 2011 pp. 422–427. doi:10.1109/CTS.2011.5898962.
- Michalas, A., Komninos, N. and Prasad, N.R. (2011). Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks. IJDCF, 3, pp. 14–36. doi:10.4018/jdcf.2011010102.
- Komninos, N. and Mantas, G. (2011). PEA: Polymorphic Encryption Algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3(1), pp. 1–18. doi:10.1504/IJSCC.2011.039222.
- Michalas, A., Komninos, N. and Prasad, N.R. (2011). The Importance of DoS Attacks in Smart Ad
hoc Networks (SAN). Information Journal. - Michalas, A., Komninos, N., Prasad, N.R. and Oleshchuk, V.A. (2010). New client puzzle approach for DoS resistance in ad hoc networks. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010 pp. 568–573. doi:10.1109/ICITIS.2010.5689528.
- Mantas, G., Lymberopoulos, D. and Komninos, N. (2010). A new framework for ubiquitous context-aware healthcare applications. Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB. doi:10.1109/ITAB.2010.5687758.
- Mitrokotsa, A., Komninos, N. and Douligeris, C. (2010). Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks. I. J. Network Security, 10, pp. 93–106.
- Mantas, G., Lymberopoulos, D. and Komninos, N. (2009). Integrity mechanism for eHealth tele-monitoring system in smart home environment. Annu Int Conf IEEE Eng Med Biol Soc, 2009, pp. 3509–3512. doi:10.1109/IEMBS.2009.5334524.
- Komninos, N. and Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7, pp. 171–182.
- Mantas, G., Lymberopoulos, D. and Komninos, N. (2009). Integrity mechanism for eHealth tele-monitoring system in smart home environment. Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference, 2009, pp. 3509–3512.
- Komninos, N. and Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications, (545 CP), pp. 25–28. doi:10.1049/cp:20080928.
- Mitrokotsa, A., Komninos, N. and Douligeris, C. (2008). Towards an Effective Intrusion Response Engine Combined with Intrusion
Detection in Ad Hoc Networks. . - Mitrokotsa, A., Komninos, N. and Douligeris, C. (2007). Intrusion detection with neural networks and watermarking techniques for MANET. 2007 IEEE International Conference on Pervasive Services, ICPS pp. 118–127. doi:10.1109/PERSER.2007.4283901.
- Komninos, N., Vergados, D. and Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5, pp. 289–298.
- Komninos, N., Vergados, D.D. and Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26, pp. 373–380.
- Komninos, N., Vergados, D.D. and Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. Int. J. Communication Systems, 20, pp. 1391–1406.
- Komninos, N. and Dimitriou, T. (2007). Protecting Biometric Templates with Image
Watermarking Techniques. Advances in Biometrics: Lecture Notes in Computer Science, 4642, pp. 114–123. - Komninos, N., Zarokostas, N. and Komninos, N. (2007). Integrity and Authenticity Mechanisms
in Sensor Networks. International Journal on Computer Research, 15(1), pp. 57–72. - Mitrokotsa, A., Komninos, N. and Douligeris, C. (2007). Intrusion Detection & Response in Ad Hoc
Networks. Advances in Ad Hoc Network Security, International Journal on Computer Research, 15(1), pp. 23–55. - Komninos, N., Vergados, D. and Douligeris, C. (2007). A two‐step Authentication Framework for Mobile Ad Hoc Networks. China Communications Journal, 4(1), pp. 28–39.
- Komninos, N., Vergados, D. and Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25, pp. 121–130.
- Komninos, N., Honary, B. and Darnell, M. (2002). Security enhancements for A 5/1 without loosing hardware efficiency in future mobile systems. IEE Conference Publication, (489), pp. 324–328.
- Komninos, N. and Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. IEE Conference Publication, (489), pp. 455–458. doi:10.1049/cp:20020438.
- Komninos, N., Honary, B. and Darnell, M. (2001). An Efficient Stream Cipher Alpha1 for Mobile
and Wireless Devices. Cryptography and Coding, 2260, pp. 294–306. - Komninos, N. and Honary, B. (2001). Modified wap for secure voice and video communication. IEE Conference Publication, (477), pp. 33–37. doi:10.1049/cp:20010007.
Contact details
Address
Northampton Square
London EC1V 0HB
United Kingdom
About
Overview
Dr Nikos Komninos received his PhD in 2003 from Lancaster University (UK) in Communication Systems with Information Security focus. He is currently a Senior Lecturer (US System: Associate Professor) in Cyber Security in the Department of Computer Science at City University London. Prior to his current post, he held teaching and research positions at the University of Cyprus, Carnegie Mellon University in Athens (Athens Information Technology), the University of Piraeus, the University of Aegean, and the University of Lancaster.
Between 2003 and 2007, he was an honorary research fellow of the Department of Communication Systems at the University of Lancaster. He was also a visiting faculty member at the University of Cyprus and a faculty member at Carnegie Mellon University in Athens, between 2005 and 2013. Part of his research has been patented and used in mobile phones by Telecommunication companies; in crypto-devices by Defense companies; and in healthcare applications by National Health Systems.
Since 2000, he has participated, as a researcher or principal investigator, in many European and National R&D projects in information security, systems and network security. He has authored and co-authored more than 80 journal publications, book chapters and conference proceedings publications in his areas of interest. He has been invited to give talks at conferences and Governmental Departments and train employees in Greek and UK businesses.
Visiting appointments
- External Examiner, Kings College London, Sep 2019 – present
- External Examiner, Royal Holloway, UoL, Sep 2015 – Jun 2020
Research
- Exploring mathematical techniques for securing digital information, systems and distributed computations against adversarial attacks.
- Intrusion detection and prevention with machine learning algorithms
- Device authentication and key agreement with learning algorithms
- Privacy preserving schemes
Publications
Publications by category
Book
- Komninos, N. (2010). Sensor Applications, Experimentation, and Logistics. Springer. ISBN 978-3-642-11869-2.
Chapters (14)
- Procopiou, A. and Komninos, N. (2019). Bio/nature-inspired algorithms in A.I. for malicious activity detection. Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications (pp. 211–250). Institution of Engineering and Technology. ISBN 978-1-78561-638-9.
- Mantas, G., Komninos, N., Rodriguez, J., Logota, E. and Marques, H. (2015). Security for 5G Communications. (pp. 207–220). Wiley. ISBN 978-1-118-86752-5.
- Michalas, A., Komninos, N. and Prasad, N.R. (2011). Cryptographic Puzzles and Game Theory against DoS and DDos Attacks in Networks. In Clary, T.S. (Ed.), Horizons in Computer Science Research Nova Science Publishers Inc.. ISBN 978-1-61324-262-9.
- Komninos, N. and Christakis, G. (2010). An Intrusion Detection Model using Bayesian Game in
Ad Hoc Networks. In Vegros, D. and Saenz, J. (Eds.), Peer-To-Peer Networks and Internet Policies Nova Science Publishers Inc.. ISBN 978-1-60876-287-3. - Mantas, G., Lymperopoulos, D. and Komninos, N. (2010). Security in Smart Home Environment. In Lazakidou, A., Siassiakos, K. and Ioannou, K. (Eds.), Wireless Technologies for Ambient Assisted Living and Healthcare Medical Info Science Reference. ISBN 978-1-61520-805-0.
- Komninos, N., Vergados, D.D. and Douligeris, C. (2010). Security for Ad Hoc Networks. In Stavroulakis, P.P. and Stamp, M. (Eds.), Handbook of Information and Communication Security (pp. 421–432). Springer. ISBN 978-3-642-04116-7.
- Komninos, N. (2009). Morpheus: A word oriented Stream Cipher. In Hopkins, R.D. and Tokere, W.P. (Eds.), Computer Security: Intrusion, Detection and Prevention Nova Science Publishers. ISBN 978-1-60692-781-6.
- Komninos, N. and Mantas, G. (2009). Intelligent Authentication and Key Agreement
Mechanism for WLAN in e‐Hospital Applications. In Feng, J. (Ed.), Wireless Networks: Research Technology and Applications Nova Science Publishers. ISBN 978-1-60692-461-7. - Komninos, N. (2009). Morpheus: A word oriented Stream Cipher. In Chen, R.E. (Ed.), Cryptography Research Perspect Nova Science Publishers. ISBN 978-1-60456-492-1.
- Komninos, N. and Kapetanopoulos, V. (2008). Dynamic Group Key Management in Ad Hoc
Networks. In Turner, J.N. and Boyer, C.S. (Eds.), Ad Hoc Networks: New Research Nova Science Publishers. ISBN 978-1-60456-895-0. - Komninos, N. (2007). A Transport Layer Security Protocol for Hybrid Networks. In Lee, T.S. (Ed.), Wireless Communications Research Trends (pp. 267–285). Nova Science Publishers. ISBN 978-1-60021-674-9.
- Komninos, N. (2007). PKI Systems. In Douligeris, C. and Serpanos, D.N. (Eds.), Network Security: Current Status and
Future Directions Wiley-IEEE Press. ISBN 978-0-471-70355-6. - Komninos, N. (2007). PKI Systems. Network Security: Current Status and Future Directions (pp. 409–418). ISBN 978-0-471-70355-6.
- Mantas, G., Lymberopoulos, D. and Komninos, N. Security in Smart Home Environment. Wireless Technologies for Ambient Assisted Living and Healthcare IGI Global. ISBN 978-1-61520-806-7.
Conference papers and proceedings (45)
- Haque, S., El-Moussa, F., Komninos, N. and Muttukrishnan, R. (2023). Identification of Important Features at Different IoT layers for Dynamic Attack Detection. 2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) 6-8 May. doi:10.1109/bigdatasecurity-hpsc-ids58521.2023.00025
- Behbehani, D., Rajarajan, M., Komninos, N. and Al-Begain, K. (2022). Detecting Open Banking API Security Threats Using Bayesian Attack Graphs. 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN) 4-6 December. doi:10.1109/cicn56167.2022.10008365
- Whitehouse, C., Weyde, T., Madhyastha, P. and Komninos, N. (2022). Evaluation of Fake News Detection with Knowledge-Enhanced Language Models. Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, ICWSM 2022 6-9 June, Atlanta, Georgia, USA.
- Acarali, D., Rajarajan, M. and Komninos, N. (2018). Evaluating the Provision of Botnet Defences using Translational Research Concepts. 15th International Joint Conference on e-Business and Telecommunications 26-28 July, Porto, Portugal.
- Acarali, D., Rajarajan, M. and Komninos, N. (2018). Evaluating the Provision of Botnet Defences using Translational Research Concepts. International Conference on Security and Cryptography 26-28 July. doi:10.5220/0006884405140519
- Acarali, D., Rajarajan, M. and Komninos, N. (2018). Modelling Botnet Propagation in Networks with Layered Defences. 2018 International Symposium on Networks, Computers and Communications (ISNCC) 19-21 June. doi:10.1109/isncc.2018.8530934
- Acarali, D., Rajarajan, M., Komninos, N. and Herwono, I. (2017). Event graphs for the observation of botnet traffic. 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) 3-5 October. doi:10.1109/iemcon.2017.8117179
- Tselikis, C., Douligeris, C., Mitropoulos, S., Komninos, N. and Tselikis, G. (2017). Adaptation of a Conference Key Distribution System for the wireless ad hoc network. ICC 2017 - 2017 IEEE International Conference on Communications 21-25 May. doi:10.1109/icc.2017.7996339
- Kamilaris, A., Pitsillides, A., Kondepudi, S. and Komninos, N. (2016). Privacy concerns in sharing personal consumption data through online applications. 2016 International Wireless Communications and Mobile Computing Conference (IWCMC) 5-9 September. doi:10.1109/iwcmc.2016.7577124
- Komninos, N. and Junejo, A.K. (2015). Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC) 7-10 December. doi:10.1109/ucc.2015.104
- Procopiou, A. and Komninos, N. (2015). Current and future threats framework in smart grid domain. 2015 IEEE International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER) 8-12 June. doi:10.1109/cyber.2015.7288228
- Michalas, A. and Komninos, N. (2014). The lord of the sense: A privacy preserving reputation system for participatory sensing applications. 2014 IEEE Symposium on Computers and Communication (ISCC) 23-26 June. doi:10.1109/iscc.2014.6912480
- Mourouzis, T., Courtois, N. and Komninos, N. (2014). Advanced Truncated Differential Cryptanalysis of GOST Block Cipher. 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces 2 April, Vari Campus of the Hellenic Military Academy, Athens, Greece.
- Komninos, N., Mourouzis, T. and Christofi, M. (2014). Towards a Combined Rotational-Differential Cryptanalytic Framework. 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces 1-2 April, Hellenic Military Academy, Athens, Greece.
- Komninos, N., Tselikis, C. and Douligeris, C. (2013). SAnoVs: Secure Anonymous Voting Scheme for
Clustered Ad Hoc Networks. 18th IEEE Symposium on Computers and Communication (ISCC’13) 7-10 July, Croatia. - Georgakakis, E., Komninos, N. and Douligeris, C. (2012). NAVI: Novel authentication with visual information. doi:10.1109/ISCC.2012.6249360
- Fengou, M.A., Mantas, G., Lymberopoulos, D. and Komninos, N. (2011). Healthcare Profile Management System in Smart Cards. International Conference on Advances in Computing, Control, and Telecommunication Technologies and Advances of Information & Communication Technology in Health Care (ICTHC 2011) 25-26 December, Jakarta, Indonesia.
- Sabouri, A., Komninos, N. and Douligeris, C. (2011). User Dependent Cryptography for Security in Future Mobile Telecommunication Systems. 18th IEEE International Conference on Telecommunications (ICT) 8-11 May, Ayia Nappa, Cyprus.
- Michalas, A., Komninos, N. and Prasad, N.R. (2011). Multiplayer Game for DDoS Attacks Resilience
in Ad Hoc Networks. 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (Wireless Vitae 2011) 28 Feb 2011 – 3 Mar 2011, Chennai, India. - Fengou, M.-.A., Mantas, G., Lymberopoulos, D.K. and Komninos, N. (2011). Ubiquitous Healthcare Profile Management Applying Smart Card Technology.
- Michalas, A., Oleshchuk, V.A., Komninos, N. and Prasad, N.R. (2011). Privacy-preserving scheme for mobile ad hoc networks. doi:10.1109/ISCC.2011.5983930
- Michalas, A., Komninos, N., Prasad, N.R. and Oleshchuk, V.A. (2010). New Client Puzzle Approach for DoS Resistance in Ad Hoc Networks. IEEE International Conference on Information Theory and Information Security (ICITIS’2010) 17-19 December, Beijing, China.
- Mantas, G., Lymperopoulos, D. and Komninos, N. (2010). A New Framework for Ubiquitous Context‐Aware Healthcare Applications. 10th IEEE International Conference on Information Technology and Applications in Biomedicine November, Corfu, Greece.
- (2010). Sensor Applications, Experimentation, and Logistics - First International Conference, SENSAPPEAL 2009, Athens, Greece, September 25, 2009, Revised Selected Papers.
- Mantas, G., Lymperopoulos, D. and Komninos, N. (2009). Integrity Mechanism for eHealth Tele‐monitoring System in Smart Home Environment. 31st International Conference of the IEEE Engineering in Medicine and Biology Society 2-6 September, Minnesota, USA.
- Tselikis, C., Mitropoulos, S., Douligeris, C., Ladis, E., Georgouleas, K., Vangelatos, C. … Komninos, N. (2009). Empirical Study of Re‐Clustering in Ad Hoc Networks. 16th International Conference on Systems Signals & Image Processing (IWSSIP’2009) 18-19 June, Chalkida, Greece.
- Michalas, A., Dimitriou, T., Gianetsos, T., Komninos, N. and Prasad, N.R. (2009). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011) 17-19 May, Aalborg, Demark.
- Tselikis, C., Mitropoulos, S., Douligeris, C., Ladis, E., Georgouleas, K., Vangelatos, C. … Komninos, N. (2009). Empirical study of clustering algorithms for wireless ad hoc networks. doi:10.1109/IWSSIP.2009.5367771
- Komninos, N. and Mantas, G. (2008). Efficient Group Key Agreement & Recovery in Ad Hoc
Network. 2nd IET International Conference on Wireless, Mobile & Multimedia Networks (ICWMMN 2008) 12-15 October, Beijing China. - Tselikis, C., Mitropoulos, S., Douligeris, C. and Komninos, N. (2008). A Robust and Consistent Reclustering Algorithm in Mobile Ad Hoc Networks. IEEE International Wireless Communication and Mobile Computing Conference (IWCMC 2008) 6-8 August, Chania Crete Island, Greece.
- Tselikis, C., Douligeris, C., Mitropoulos, S. and Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. doi:10.1109/IWCMC.2008.142
- Komninos, N., Soroush, H. and Salajegheh, M. (2007). LEE: Light‐Weight Energy‐Efficient Encryption Algorithm for Sensor Networks. IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07) 16-20 July, Ambleside, UK.
- Komninos, N. (2007). Morpheus: Stream Cipher for Software & Hardware Applications. IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07) 16-20 July, Ambleside, UK.
- Mitrokosta, A., Komninos, N. and Douligeris, C. (2007). Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. IEEE International Conference on Pervasive Services (ICPS’07) 15-20 July, Istanbul, Turkey.
- Komninos, N., Mitrokosta, A. and Douligeris, C. (2007). Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks. 6th IFIP Annual Mediterranean Ad Hoc Networking Workshop (MED‐HOC‐NET’07) 13-15 June, Corfu, Greece.
- Komninos, N. and Dimitriou, T. (2007). Protecting Biometric Templates with Image Watermarking Techniques.
- Komninos, N., Vergados, D. and Douligeris, C. (2006). Two‐Step Authentication in Mobile Ad Hoc Networks. Global Mobile Congress 11-16 October, Beijing, China.
- Komninos, N. and Dimitriou, T. (2006). Adaptive Authentication and Key Agreement Mechanism for Future Cellular Systems. 15th IST Mobile & Wireless Communications Summit 4-8 June, Mykonos, Greece.
- Komninos, N., Vergados, D. and Douligeris, C. (2006). Two-step authentication in mobile ad-hoc networks.
- Komninos, N. and Honary, B. (2002). Security Enhancement for A5/1 Without Losing Hardware Efficiency in Future Mobile Systems. 3rd IEE International Conference on 3G Mobile Communication Technologies London.
- Komninos, N. and Honary, B. (2001). Modified WAP for Secure Voice and Video Communication. 2nd IEE International Conference on 3G Mobile Communication Technologies London.
- Komninos, N., Honary, B. and Darnell, M. (2001). An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices.
- Komninos, N., Samarakoon, M.I. and Honary, B. (2000). Authentication and Key Distribution for Wired and Wireless Systems. 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting Liverpool John Moores University, Liverpool, UK.
- Komninos, N. and Honary, B. Novel Methods for Enabling Public Key Schemes in Future Mobile Systems. 3rd IEE International Conference on 3G Mobile Communication Technologies London, UK.
- Komninos, N., Honary, B. and Darnell, M. Secure Communication Protocol for Mobile Multimedia Applications. 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC’2000) Bangkok, Thailand.
Journal articles (48)
Patent
- Komninos, N. and Honary, B. Cipher Apparatus. Patent no. GB2380916