Alert button
Picture for Nikolaos Pitropakis

Nikolaos Pitropakis

Alert button

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

Add code
Bookmark button
Alert button
Apr 26, 2021
Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan

Figure 1 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 2 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 3 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 4 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Viaarxiv icon

Privacy and Trust Redefined in Federated Machine Learning

Add code
Bookmark button
Alert button
Mar 30, 2021
Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan

Figure 1 for Privacy and Trust Redefined in Federated Machine Learning
Figure 2 for Privacy and Trust Redefined in Federated Machine Learning
Figure 3 for Privacy and Trust Redefined in Federated Machine Learning
Figure 4 for Privacy and Trust Redefined in Federated Machine Learning
Viaarxiv icon

A Distributed Trust Framework for Privacy-Preserving Machine Learning

Add code
Bookmark button
Alert button
Jun 03, 2020
Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J Buchanan

Figure 1 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 2 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 3 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 4 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Viaarxiv icon

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

Add code
Bookmark button
Alert button
May 13, 2020
Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan

Figure 1 for Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Figure 2 for Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Viaarxiv icon