George Mastorakis
University of the Aegean
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by George Mastorakis.
personal, indoor and mobile radio communications | 2007
George Mastorakis; Evangelos K. Markakis; Anargyros Sideris; Evangelos Pallis; Vassilios Zacharopoulos
This paper introduces and validates an experimental infrastructure of a fusion IP/DVB networking environment for the provision of triple play services at remote areas exploiting the synergy of Broadcasting, Internet and Telecommunication sectors technologies. This synergy constitutes a challenge for creating a networking platform which exploits the particularities and complementarities of these sectors for the support of ubiquitous services and always-on connectivity enabling passive rural citizens to become active Information Society participants. This paper describes important directions for exploiting the proposed unified platform alleviating the digital divide that currently exists not only among countries but also within most regions of the same country.
Archive | 2016
Vasos Hadjioannou; George Mastorakis; Jordi Mongay Batalla; Ioannis Kopanakis; Emmanouil Perakakis; Spiros Panagiotakis
The emergence of the 5th generation wireless standard for telecommunications (5G) will enable the Internet of Things (IoT), a huge network of interconnected devices that can be utilized in almost every aspect of our daily lives, either that is in healthcare, transportation, environmental monitoring, and so on. As good as it sounds though, individuals with malicious intent will always be around to try and compromise what has been built for their own personal gain. Therefore, nothing can be accomplished unless the system and communication between devices is secured, and we are positive that the privacy and well being of users, and society in general, is ensured. This chapter will present the notion of smart spaces and smart grids along with their architecture and way of operation. It will also stress the necessity for securing the various processes and services of such technologies, in order to predict, identify, prevent and counter any potential attacks on the system as well as protecting and preserving the privacy of the users. Furthermore, the chapter will include the security requirements a system needs to fulfill, along with any security threats that might compromise the system and various measures that need to be taken to achieve a secure environment.
Wireless Personal Communications | 2010
George Mastorakis; Evangelos Pallis; George Kormentzas
Archive | 2010
Athina Bourdena; George Kormentzas; George Mastorakis; Evangelos Pallis; Joseph Mwangoka
Mobile Big Data | 2018
Georgios Skourletopoulos; George Mastorakis; Nuno M. Garcia; Rossitza Goleva; Ioannis Sachalos; Ciprian Dobre; Jordi Mongay Batalla
Archive | 2008
Evangelos K. Markakis; Anargyros Sideris; George Mastorakis; Eleftherios Georgaras; Nikolaos Polichronakis; Evangelos Pallis; Vassilios Zacharopoulos
Archive | 2017
George Alexiou; Evangelos Pallis; Evangelos Markakis Markakis; Anargyros Sideris; Athina Bourdena; George Mastorakis
Archive | 2017
Ioannis Deligiannis Deligiannis; George Alexiou; George Papadourakis Papadourakis; Evangelos Pallis; Evangelos Markakis Markakis; George Mastorakis
Archive | 2013
George Mastorakis; Nikolaos Trihas; Emmanouil Perakakis; Ioannis Kopanakis
2nd Annual International Conference on Tourism and Hospitality Research (THoR 2013) | 2013
Nikolaos Trihas; George Mastorakis; Emmanouil Perakakis; Ioannis Kopanakis