Constantine N. Manikopoulos

Learn More
The industry is producing new wireless mobile devices, such as smart phones, at an ever increasing pace. In terms of processors and memory, these devices are as powerful as the PCs were one decade ago. Therefore, they are perfectly suitable to become the first real-life platforms for ubiquitous computing. For instance, they can be programmed to run(More)
Review of the literature suggests seven fundamental privacy challenges in the domain of ubiquitous social computing. To date, most research in this area has focused on the features associated with the revelation of personal location data. However, a more holistic view of privacy concerns that acknowledges these seven risks is required if we are to deploy(More)
In this paper, we introduce a hierarchical anomaly network intrusion detection system, which is capable of detecting network–based attacks using statistical preprocessing models and neural network classification. The sample network used has a three-tier hierarchy, where the lower tier detectors report to the higher tiers. The statistical preprocessor(More)
This paper introduces a new transmission protocol that uses a joint lossless-source and channel coding scheme (JARQ). This protocol utilizes the self-synchronization property of lossless compression to generate indications of errors in the received data. This approach assures the reconstruction of images that were compressed in a lossless fashion and(More)
In this paper, we report on experiments in which we used neural networks for statistical anomaly intrusion detection systems. The five types of neural networks that we studied were: Perceptron; Backpropagation; PerceptronBackpropagation-Hybrid; Fuzzy ARTMAP; and Radial-Based Function. We collected four separate data sets from different simulation scenarios,(More)
In this paper we introduce GAFT (Generalized Anomaly and Fault Threshold), featuring a novel system architecture that is capable of setting, monitoring and detecting generalized thresholds and soft faults (network/service anomaly or performance degradations), proactively and adaptively for multiple service classes operating concurrently over the same(More)