Mary Grammatikou

Mary Grammatikou
National Technical University of Athens | NTUA · Division of Computer Science

About

75
Publications
10,161
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
328
Citations
Citations since 2016
15 Research Items
77 Citations
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
Additional affiliations
January 2005 - present
Network Management & Optimal Design Lab.
Position
  • Research Assistant
Description
  • Network Management
January 2002 - February 2014
National Technical University of Athens
Position
  • Senior Researcher
Education
October 1995 - December 2000
National Technical University of Athens
Field of study
  • Computer Science
September 1990 - June 1995
National Technical University of Athens
Field of study
  • Computer Science

Publications

Publications (75)
Conference Paper
Full-text available
When the COVID-19 pandemic forced most European countries to impose restrictions during the winter/spring of 2020, schools were forced to close and implement systems of remote teaching. Whilst the results of these events are yet to be fully comprehended, the consequences on students that require additional supports in their educational process – es...
Chapter
This chapter focuses on the design and redesign of an online engineering management course, based on a socio-constructivist approach. At first, the theoretical and contextual premises will be presented with a focus on the suggested teaching and learning methods to acquire domain-related knowledge and crucial skills and on the importance of learning...
Conference Paper
Nowadays the data that is collected from the LMS (Learning Management System) is increasing every second. This large amount of data is collected to extract the behaviour of the students, as well as to learn first-hand which topics that they find most attractive or those that are more difficult for them. However, there is still almost 75% of actual...
Conference Paper
Open education is a reality and day by day it is gaining more followers among the scientific community and all researchers. Several steps have already been taken to universalize the right to quality education, but they are not enough and this universalization must be extended to secondary education. The objective of the Open Education Resources (OE...
Article
Full-text available
This paper presents Policy-based Federation (PBF) architecture for interworked Future Internet Virtualized Infrastructures (VIs). Each VI is an individually managed autonomous domain. Users may request slices of virtual resources across the federation, managed and controlled via inter-domain policies that abide by agreed upon federated SLAs. The ke...
Article
Full-text available
This article presents the design and pilot implementation of a suite of intelligent methods, algorithms, and tools for federating heterogeneous experimental platforms (domains) toward a holistic Future Internet experimentation ecosystem. The proposed framework developed within the NOVI research and experimentation European collaborative effort, aim...
Article
Experimentation is an invaluable part of learning in all sciences. However, building and maintaining laboratories is expensive, time and space consuming. Moreover, in computer science advances in technology can quickly make the infrastructure obsolete. In this paper we advocate the use of recently deployed public testbeds as remote labs for compute...
Conference Paper
Full-text available
Cloud Platform as a Service (PaaS) provides an environment for creating and deploying applications using one of popular development platforms. This paper presents a practical solution for building a service composition platform based on the GEMBus (GEANT Multi-domain Bus) that extends the industry accepted Enterprise Service Bus (ESB) platform with...
Article
Full-text available
Peer-to-Peer systems supporting multi attribute and range queries use a number of techniques to partition the multi dimensional data space among participating peers. Load-balancing of data accross peer partitions is necessary in order to avoid the presence of network hotspots which may cause performance degradation or failures within the distribute...
Conference Paper
Full-text available
The EC FP7/FIRE STREP project NOVI - Network Innovation over Virtualized Infrastructures - explores efficient approaches to compose virtualized e-Infrastructures towards a holistic Future Internet (FI) cloud service. Resources belonging to various levels, i.e. networking, storage and processing are in principle managed by separate yet inter-working...
Chapter
Security in grid environments that are built using Service Oriented Architecture (SOA) technologies is a great challenge. On one hand, the great diversity in security technologies, mechanisms and protocols that each organization follows and on the other hand, the different goals and policies that these organizations adopt, comprise a complex securi...
Chapter
Traditionally, network Service Providers specify Service Level Agreements (SLAs) to guarantee service availability and performance to their customers. However, these SLAs are rather static and span a single provider domain. Thus, they are not applicable to a multi–domain environment. In this paper, the authors present a framework for automatic crea...
Chapter
Security in grid environments that are built using Service Oriented Architecture (SOA) technologies is a great challenge. On one hand, the great diversity in security technologies, mechanisms and protocols that each organization follows and on the other hand, the different goals and policies that these organizations adopt, comprise a complex securi...
Conference Paper
Cloud computing has become a common technology for provisioning infrastructure services on-demand. Modern Cloud platforms can provide cloud-based applications, software, deployment platforms, or general infrastructure services that may include both computational and storage resources. However existing Cloud provisioning models are based on propriet...
Chapter
Grids provide collaborative environments for integration of the distributed heterogeneous resources and services running on different operating systems (OSs), e.g., Unix, Linux, Windows, embedded systems; Platforms, e.g., J2EE, .NET; and Devices, e.g., computers, instruments, sensors, databases, networks. Such environments need platform-independent...
Conference Paper
The increasing size, complexity and the dynamic character of future networks make traditional monitoring systems inadequate to be continuously updated and sense the endless changes in the topology and communication conditions. The need for reduction in the network management complexity and the administrator's operational burden imposes the design a...
Chapter
Security in grid environments that are built using Service Oriented Architecture (SOA) technologies is a great challenge. On one hand, the great diversity in security technologies, mechanisms and protocols that each organization follows and on the other hand, the different goals and policies that these organizations adopt, comprise a complex securi...
Conference Paper
Full-text available
Autonomic monitoring procedures in multi-service networks provide not only feedback to end users, but also self-handling monitoring events to network operators. In this work, we present an autonomic monitoring framework for Quality of Service (QoS) management in multi-service networks. Our framework introduces aggregation mechanisms to deal with th...
Article
Full-text available
Traditionally, network Service Providers specify Service Level Agreements (SLAs) in order to guarantee service availability and performance to their customers. However, these SLAs are rather static and span a single provider domain. Thus they are not applicable to a multi–domain environment and do not enable users with the flexibility to set–up and...
Chapter
Full-text available
In distributed environments it is necessary to provide tools that describe and guarantee the level of Quality of Service of the provided services. These guarantees can be specified in terms of Service Level Agreements (SLAs), which in turn can be used for the management and monitoring of Quality of Service attributes. The provided services supply t...
Chapter
Full-text available
Traditionally, network Service Providers specify Service Level Agreements (SLAs) in order to guarantee service availability and performance to their customers. However, these SLAs are rather static and span a single provider domain. Thus, they are not applicable to a multi-domain environment (including edge networks of distributed Grid resources) a...
Chapter
In wireless sensor networks, a sensor node, besides being able to act on the environment, is also a network entity that performs networking-related functionalities and could be integrated within the networking and grid environment. In this chapter, we adopt a probabilistic approach that presents a robust and generalized framework for performing in-...
Chapter
Full-text available
Security in computational Grids is mainly based on Grid Security Infrastructure (GSI) for authentication and Virtual Organization Membership Service for authorization. Although these mechanisms provide the required level of security, they lack in performance due to their dependence on public key cryptography. In our proposed security architecture w...
Chapter
Full-text available
Grids of computing and storage resources have been extended with a new type of resources, the instruments, in what is referred to as instrumentation grids. Sensor grids can be viewed as an instance of instrumentation grids, whereby wireless sensor networks are integrated within a distributed computing/storage resource-sharing environment. They enab...
Conference Paper
Full-text available
The ArguGRID project aims at supporting service selection and composition in distributed environments, including the Grid and Service-oriented architectures, by means of argumentative agents, an agent environment, a service-composition environment, Peer-to-Peer technology and Grid middleware. Agents are argumentative in that they use argumentation-...
Article
In this paper, based on principal component analysis (PCA), a comprehensive and efficient incident detection approach that uses probabilistic network and processing methodologies to exploit spatial and temporal correlations and dependencies in vehicular networks, and therefore derive a reliable picture of the driving context, is proposed. The propo...
Conference Paper
In this paper we study the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from an attacker or their already infected neighbors. Considering the susceptible-infected-susceptible (SIS) node infection paradigm we propose a probabilistic model, based on the theory of close...
Conference Paper
In this paper a comprehensive and efficient incident detection approach is proposed, that uses probabilistic network and processing methodologies to exploit spatial and temporal correlations and dependencies in vehicular networks. The proposed approach, based on principal component analysis, provides an integrated way of effectively processing and...
Article
In this paper we propose an efficient, scalable and secure architectural framework for the monitoring of multiple fixed and mobile sensors, designed for road traffic incident detection. The Grid provides the means to control the sensors and gather information with security and reliability. The system includes a Decision Support Service that fuses m...
Conference Paper
Full-text available
In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the development of effective attack strategies by a malicious mobile node, based on the risk function metric, which indicates the network's vulnerability. Our approach takes on the attac...
Conference Paper
Full-text available
Web services (WS) security is the set of standards that provides means for applying security to WS. In this paper we present the performance of the WS security Kerberos token profile in contrast to the X.509 token profile. The measurements are based on the Apache wss4j library for the X.509 token profile and the extensions we have made on the same...
Conference Paper
Full-text available
Grid applications require computing, storage and network resources offered from different Resource Centers (RCs). For the exchange of resources and the data transfers between two RCs an end-to-end path should be created. To provide QoS assurances to this end-to-end path, the complete path should be reserved and configured to offer that particular s...
Conference Paper
Full-text available
Computing Grids that are traditionally used for batch computations are ex-tending their application on different areas. In GRIDCC [4], we extend the Grid paradigm to support distributed instrumentation that belongs to differ-ent organizations. The instrumentation exposes its functionality as Web Services. Quality of Service (QoS) plays an important...
Article
Full-text available
In this paper, we propose a closed queueing network model, based on a probabilistic node infection framework, that captures in an aggregated manner the behavior of an ad hoc network attacked by a group of malicious nodes. The proposed framework and model are shown to be more appropriate in dealing with the inherent stochastic nature of malware spre...
Article
Full-text available
Global dissemination of information and tools for computer networks, has allowed for major system attacks affecting critical network points and resulting in significant network performance degradation. In this paper, we present a probabilistic modelling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc networ...
Conference Paper
Full-text available
In this paper, the emphasis is placed on the evaluation of the impact ofvarious packet sampling techniques that have been proposed in the PSAMP IETF draft, on two widely used anomaly detection approaches. More specifically, we evaluate the behavior of a sequential nonparametric change-point detection method and an algorithm based on Principal Compo...
Article
Full-text available
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this work is placed on the data integrity and accuracy problem caused by compromised or malfunctioning nodes. One of the key features of the proposed approach is that it provi...
Conference Paper
Full-text available
Authentication, authorization and encryption in large scale distributed Grids are usually based on a Public Key Infrastructure (PKI) with asymmetric encryption and X.509 – Proxy certificates for user single sign-on to resources. This approach, however, introduces processing overhead, that may be undesirable in near real time Grid applications (e.g....
Conference Paper
The spread of active attacks has become a frequent cause of vast systems breakdown in modern communication networks. In this paper, we first present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network. The introduced formulation is used to identify and evaluate different attack...
Article
Full-text available
Although most users are content with 'best efforts' network service there is an urgent need for a high performance network. Due to cost implications this is best achieved using a premium IP service. An ideal provisioning system has many complex requirements and doesn't take into account current practices and concerns. The GÉANT2 Advance Multi-domai...
Conference Paper
Full-text available
In this paper an anomaly detection system based on Grid middleware that supports the efficient, scalable and secure monitoring of multiple instruments and sensors, is proposed and investigated. The Grid provides the means to control the sensors and gather information with security and reliability. The system includes a Decision Support Service that...
Conference Paper
Full-text available
Intrusion Detection Systems (IDS) have been developed to solve the problem of detecting the attacks on several network systems. In small-scale networks a single IDS is sufficient to detect attacks but this is inadequate in large-scale networks, where the number of packets across the network is enormous. In this paper, we present an Architectural Fr...
Conference Paper
Full-text available
Intrusion Detection is the problem of identifying unauthorized use, misuse, and abuse of computer systems by both system insiders and external intruders. Intrusion Detection Systems provide in depth packet analysis and application awareness and can be deployed for discovering network attacks. In this scenario a system that gives intelligence about...
Conference Paper
Full-text available
We present a distributed architectural framework for Primary Health Care (PHC) Cent res. Distribution is handled through the introduction of the Roaming Electronic Health Care Record (R-EHCR) and the use of local caching and incremental update of a global index. The proposed architecture is designed to accommodate a specific PHC workflow model. Fin...
Article
Full-text available
We present a distributed architectural framework for Primary Health Care (PHC) Centres. Distribution is handled through the introduction of the Roaming Electronic Health Care Record (R-EHCR) and the use of local caching and incremental update of a global index. The proposed architecture is designed to accommodate a specific PHC workflow model. Fina...
Article
Polyunsaturated fatty acids (PUFAs) constitute an ingredient of the daily diet and therefore they might be in close contact with the polymicrobial gastrointestinal flora. In order to study the interaction of bacteria and PUFAs, eight Escherichia coli strains were cultured in the presence of docosahexaenoic acid (DHA) at a concentration of 100 micro...
Article
Tigemonam, an oral monobactam that exhibits beta-lactamase stability similar to that of aztreonam, was tested in vitro against 240 species of Enterobacteriaceae (50 Escherichia coli, 48 Klebsiella pneumoniae, 52 Enterobacter cloacae, 32 Proteus mirabilis, 22 Proteus indole-positive [Providencia sp.], 24 Serratia sp., and 12 Citrobacter sp. All stra...
Article
Authentication, authorization and encryption in large scale distributed Grids are usually based on a Public Key Infrastructure (PKI) with asymmetric encryption and X.509 - Proxy certificates for user single sign-on to resources. This approach, however, introduces processing overhead, that may be undesirable in near real time Grid applications (e.g....
Article
Full-text available
Within the ARGUGRID framework, agents representing Grid service providers/requestors and Grid services themselves, are distributed among par ticipating entities. Agents and services can dynamically join and leave the system, introducing a dynamic environment which will benefit from a Peer to Peer (P2P) framework for discovering agents and Grid serv...
Article
Denial of Service (DoS) attacks do not attempt to break into computer systems but aim to the disruption of the normal system operation through overloading network and / or system resources (1). Their complexity and magnitude is rapidly increasing and their distributed version (DDoS attacks) is becoming a nuisance to modern IT infrastructure and a v...

Network

Cited By