The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Also see ResearchGate, and Google scholar.

title={Game Theoretic Honeypot Deployment in Smart Grid},
author={Diamantoulakis, Panagiotis and Dalamagkas, Christos and Radoglou-Grammatikis, Panagiotis and Sarigiannidis, Panagiotis and Karagiannidis, George},
publisher={Multidisciplinary Digital Publishing Institute}

title = "A Compilation of UAV Applications for Precision Agriculture",
journal = "Computer Networks",
pages = "107148",
year = "2020",
issn = "1389-1286",
doi = "",
url = "",
author = "Panagiotis Radoglou-Grammatikis and Panagiotis Sarigiannidis and Thomas Lagkas and Ioannis Moscholios",
keywords = "Precision Agriculture (PA), Remote Sensing (RS), Unmanned Aerial Vehicle (UAV)",
abstract = "Climate change has introduced significant challenges that can affect multiple sectors, including the agricultural one. In particular, according to the Food and Agriculture Organization of the United Nations (FAO) and the International Telecommunication Union (ITU), the world population has to find new solutions to increase the food production by 70% by 2050. The answer to this crucial challenge is the suitable adoption and utilisation of the Information and Communications Technology (ICT) services, offering capabilities that can increase the productivity of the agrochemical products, such as pesticides and fertilisers and at the same time, they should minimise the functional cost. More detailed, the advent of the Internet of Things (IoT) and specifically, the rapid evolution of the Unmanned Aerial Vehicles (UAVs) and Wireless Sensor Networks (WSNs) can lead to valuable and at the same time economic Precision Agriculture (PA) applications, such as aerial crop monitoring and smart spraying tasks. In this paper, we provide a survey regarding the potential use of UAVs in PA, focusing on 20 relevant applications. More specifically, first, we provide a detailed overview of PA, by describing its various aspects and technologies, such as soil mapping and production mapping as well as the role of the Global Positioning Systems (GPS) and Geographical Information Systems (GIS). Then, we discriminate and analyse the various types of UAVs based on their technical characteristics and payload. Finally, we investigate in detail 20 UAV applications that are devoted to either aerial crop monitoring processes or spraying tasks. For each application, we examine the methodology adopted, the proposed UAV architecture, the UAV type, as well as the UAV technical characteristics and payload."

author={I. {Radoglou-Grammatikis} and G. {Sarigiannidis}},
journal={IEEE Access},
title={Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems},
keywords={Advanced metering infrastructure;Cyberattacks;Intrusion detection system;Intrusion prevention system;SCADA;Security;Smart grid;Substation;Synchrophasor},

title = "Securing the Internet of Things: Challenges, threats and solutions",
journal = "Internet of Things",
volume = "5",
pages = "41 - 70",
year = "2019",
issn = "2542-6605",
doi = "",
url = "",
author = "Panagiotis I. Radoglou Grammatikis and Panagiotis G. Sarigiannidis and Ioannis D. Moscholios",
keywords = "Countermeasures, Cyberattacks, Internet of Things, Privacy, Protocols, Risk assessment, Security",
abstract = "The Internet of Things (IoT) is the next technological leap that will introduce significant improvements to various aspects of the human environment, such as health, commerce, and transport. However, despite the fact that it may bring beneficial economic and social changes, the security and the privacy protection of objects and users remain a crucial challenge that has to be addressed. Specifically, now the security measures have to monitor and control the actions both of users and objects. However, the interconnected and independent nature of objects, as well as their constrained capabilities regarding the computing resources make impossible the applicability of the conventional security mechanisms. Moreover, the heterogeneity of various technologies which the IoT combines increases the complexity of the security processes, since each technology is characterized by different vulnerabilities. Furthermore, the tremendous amounts of data which is generated by the multiple interactions between the users and objects or among the objects make harder their management and the functionality of the access control systems. In this context, this paper intends to provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures. More detailed, after studying and determining the security requirements in the context of the IoT, we implement a qualitative and quantitative risk analysis, investigating the security threats per layer. Subsequently, based on this process we identify the suitable countermeasures and their limitations, paying special attention to the IoT protocols. Finally, we provide research directions for future work."