User profiles for C. Konstantinou

Charalambos Konstantinou

- Verified email at kaust.edu.sa - Cited by 2925

Charalampos Konstantinou

- Verified email at ucy.ac.cy - Cited by 364

Survey of machine learning methods for detecting false data injection attacks in power systems

…, XR Liu, RG Dutta, Y Jin, C Konstantinou - IET Smart …, 2020 - Wiley Online Library
… A three-phase (a, b, and c) line impedance matrix between bus i and bus j can be … k-means
(also called hard c-mean) is an example of a clustering method, which divides data into k …

A review of current research trends in power-electronic innovations in cyber–physical systems

…, C Ogilvie, J Ospina, C Konstantinou… - IEEE Journal of …, 2021 - ieeexplore.ieee.org
In this article, a broad overview of the current research trends in power-electronic innovations
in cyber–physical systems (CPSs) is presented. The recent advances in semiconductor …

[HTML][HTML] Applications of microbial-induced carbonate precipitation: A state-of-the-art review

Y Wang, C Konstantinou, S Tang, H Chen - Biogeotechnics, 2023 - Elsevier
Microbial-Induced Carbonate Precipitation (MICP) is a naturally occurring process whereby
bacteria produce enzymes that accelerate the precipitation of calcium carbonate. This …

The cybersecurity landscape in industrial control systems

S McLaughlin, C Konstantinou, X Wang… - Proceedings of the …, 2016 - ieeexplore.ieee.org
… phone line to allow devices to communicate); c) fieldbus network (that links sensors and other
… A detailed discussion of developing an assessment environment appears in Section II-C. …

Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies

I Zografopoulos, J Ospina, X Liu, C Konstantinou - IEEE Access, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are interconnected architectures that employ analog and
digital components as well as communication and computational resources for their operation …

Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies

…, I Zografopoulos, C Konstantinou… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning
from the consumer domain to commercial and industrial systems. The steep growth and …

[HTML][HTML] Harmonization of human biomonitoring studies in Europe: characteristics of the HBM4EU-aligned studies participants

…, M Kolossa-Gehring, C Konstantinou… - International journal of …, 2022 - mdpi.com
Human biomonitoring has become a pivotal tool for supporting chemicals’ policies. It provides
information on real-life human exposures and is increasingly used to prioritize chemicals …

[HTML][HTML] The role of bacterial urease activity on the uniformity of carbonate precipitation profiles of bio-treated coarse sand specimens

C Konstantinou, Y Wang, G Biscontin, K Soga - Scientific reports, 2021 - nature.com
… Of the three structural genes, Ure-A, Ure-B and Ure-C, Ure-C is reported to have the greatest
molecular weight 46,47,48 . The qPCR tests targeted the quantification of the RNA copies …

Blockchain and autonomous vehicles: Recent advances and future directions

…, B Nagaiah, A Kumar, C Konstantinou - IEEE …, 2021 - ieeexplore.ieee.org
Blockchain is an underlying technology for securing many real-time applications and their
data. The automobile is one such sector in which auto-manufacturers are looking forward to …

Confirm: Detecting firmware modifications in embedded systems using hardware performance counters

X Wang, C Konstantinou… - 2015 IEEE/ACM …, 2015 - ieeexplore.ieee.org
… Assume that the attacker modifies the control flow between A and C. The count of Event x
from A to C after the modification is CA−C(Ex). If the attacker knows the “good” value of CA−B(…