Circular Image

G. Iosifidis

36 records found

This thesis presents the design, implementation, and validation of a piezoelectric energy harvester (PEH) emulator to enable repeatable evaluation of energy extraction circuits for vibration-based systems. PEHs convert mechanical vibrations into electricity using materials that g ...
Stateful Functions-as-a-Service (SFaaS) platforms, such as Styx, are emerging as powerful abstractions for building distributed, serverless cloud applications. By combining the abilities of FaaS with strong transactional guarantees, they enable complex, stateful workflows without ...
Developers often use dependency managers to make updating dependencies easier. These dependency managers allow permissive declaration strategies to be used which automatically keep dependencies up-to-date. To prevent these automatic updates from breaking projects, developers can ...

An Empirical Study of Version Conflicts in Maven-Based Java Projects

Analyzing Developer Effort, Semantic Versioning Adherence and Resolution Strategies as Observed in Real-World Version Conflicts

Java projects often depend on third-party libraries to support development, but intensive reuse can lead to version conflicts, a common manifestation of dependency hell. This paper presents an empirical study of 124 GitHub pull requests from 85 Maven-based Java projects that addr ...
As Open-Source projects grow in size and incorporate more and more external dependencies, developers increasingly rely on dependency managers such as Maven to manage version conflicts and automate dependency resolution. However, developers are often unaware of vulnerabilities in ...

Dependency Families in the Maven Ecosystem

An Analysis of Software Dependency Graphs

The Maven ecosystem relies heavily on dependencies to provide functionality, but the relationships between these dependencies are not well understood. This paper introduces the concept of dependency families, where a group of dependencies are owned by the same entity and designed ...
In practical situations, computer vision technique is applied to solve various tasks, including image classification, object detection, image segmentation, and so on. The commonly used supervised learning training paradigm for the network models used to solve these tasks requires ...

WALL-EYE: Taking a look at CubeSat security

Security analysis of CubeSats on a physical testbed

With the rise of new space, space missions are becoming increasingly more accessible. This is caused by the increased use of commercial-off-the-shelf components as well as the possibility of having multiple parties operating on a single satellite platform. This development combin ...

Classifying and identifying slow scanners based on their behavior and attributes

How can clustering techniques be applied to classify and identify slow scanners based on their behavior and attributes

In this research, we propose a new method for detecting slow, distributed port scanners by utilizing clustering techniques based on the behavioral characteristics of scan sources. Traditional methods often rely on identifying sources within the same subnet and using frequency-bas ...

Investigating the Amplification Potential of Common UDP-Based Protocols in DDoS Attacks

A measurement study conducted across the networking infrastructure in Belgium and Luxembourg

Distributed Reflection Denial-of-Service (DRDoS) attacks remain among the most damaging cyber threats, leveraging vulnerable UDP-based protocols to amplify traffic and overwhelm targets. Our measurement study investigates the amplification potential of three commonly exploited pr ...

Amplification Detection: Determining DDoS Abuse Potential of Your Network

A Quantitative Study of the Amplification Potential of Three Popular Protocols

Amplification Distributed Denial of Service attacks require networks that do not drop packets with spoofed IP addresses and servers open to the Internet running UDP protocols with amplification potential. These attacks have the potential to overwhelm large network links and disru ...

Estimating the Amplification Factors in the Network Infrastructure of France

Defining factors that affect amplification DoS attacks

Amplification Denial of Service (DoS) attacks have been a persistent challenge in network security, with the consequences ranging from causing minor disruptions to substantial financial losses and irreparable damage to reputation.

In today's network environment, many inf ...

Estimating the Amplification Factor of Three Common Protocols in DRDoS Attacks

A Quantitative Analysis on the Weaponisation of Hosts Located in Greece

Distributed reflection denial-of-service (DRDoS) attacks are a type of cyberattack where a malicious actor sends requests to public and open servers on behalf of the victim by spoofing their IP address. The traffic generated by the corresponding responses is directed towards the ...
This paper explores Distributed Reflective Denial-of-Service (DRDoS) attacks, a variant of Distributed Denial-of-Service (DDoS) attacks that leverage publicly accessible UDP servers to amplify traffic towards a target. These attacks, accounting for over half of all DDoS cases in ...

Forecasting in Online Caching

Exploration of the effects of forecaster methods on an online learning caching policy

This paper explores the effect of forecasting methods on the Optimistic Follow The Regularized Leader (OFTRL) caching policy. It has been theoretically proven that the performance of OFTRL improves with accurate forecasters. However, the forecasters were portrayed as black boxes. ...

An Exploration of Participation in Student Software Teams

How Programming Experience Affects Participation in Student Software Teams and Leveraging Repository Insights for Monitoring Participation

Group work is an integral part of Computing Education, but introduces problems when students either fail to participate enough or dominate, not allowing their team members to contribute. This research focuses on identifying the participation level of the students, allowing the te ...
Due to the increasing popularity of various types of sensors in traffic management, it has become significantly easier to collect data on traffic flow. However, the integrity of these data sets is often compromised due to missing values resulting from sensor failures, communicati ...

Long term predictions for traffic forecasting

How does the accuracy degrade with time?

Traffic prediction plays a big role in efficient transport planning capabilities and can reduce traffic congestion. In this study the application of Long Short-Term Memory (LSTM) models for predicting traffic volumes across varying prediction horizons is investigated. The data us ...