Your Profile
Karavolos Michail

Education

Research Interests

Teaching Activities

Journals


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
L. Tsipi, M. Karavolos, G. Papaioannou, M. Volakaki, D. Vouyioukas, Machine learning-based methods for MCS prediction in 5G networks, Telecommunication Systems, 2024, Springer, (to_appear), https://doi.org/10.1007/s11235-024-01158..., indexed in SCI-E, IF = 2.5
[2]
L. Tsipi, M. Karavolos, D. Vouyioukas, P. Bithas, Machine Learning-Based Methods for Enhancement of UAV-NOMA and D2D Cooperative Networks, Sensors, Vol. 23, No. 6, 2023, MDPI, (to_appear), https://doi.org/10.3390/s23063014, indexed in SCI-E, IF = 3.847
[3]
M. Karavolos, D. Kokkinis, N. Moraitis, A. Tsipouras, D. Vouyioukas, Design of a large-scale efficient and low-cost high-frequency spectrum monitoring network: The case of Greece, Antennas and Propagation Magazine, 2023, IEEE, (to_appear), https://doi.org/10.1109/MAP.2023.3330395, indexed in SCI-E, IF = 3.179
[4]
L. Tsipi, M. Karavolos, D. Vouyioukas, An Unsupervised Machine Learning Approach for UAV-Aided Offloading of 5G Cellular Networks, Telecom, Vol. 3, pp. 86-102, 2022, MDPI, (to_appear), https://doi.org/10.3390/telecom3010005, IF = 2.1
[5]
M. Karavolos, N. Nomikos, D. Vouyioukas, P. Mathiopoulos, HST-NNC: A Novel Hybrid Satellite-Terrestrial Communication with NOMA and Network Coding Systems, Open Journal of the Communications Society, Vol. 2, pp. 887-898, 2021, IEEE, (to_appear), https://doi.org/10.1109/OJCOMS.2021.3072..., indexed in SCI-E, IF = 7.9
[6]
M. Karavolos, N. Nomikos, D. Vouyioukas, Enhanced Integrated Satellite–Terrestrial NOMA with Cooperative Device-to-Device Communication, Telecom, 2020, MDPI, (to_appear), https://doi.org/10.3390/telecom1020010, indexed in SCI-E, IF = 2.1
[7]
V. Tatsis, M. Karavolos, D. N. Skoutas, N. Nomikos, D. Vouyioukas, C. Skianis, Energy-Aware Clustering of CoMP-DPS Transmission Points, Computer Communications, Vol. 135, pp. 28-39, 2019, Elsevier, https://doi.org/10.1016/j.comcom.2018.11..., indexed in SCI-E, IF = 2.766

Conferences


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
M. Karavolos, N. Moraitis, L. Tsipi, D. Vouyioukas, Enhancing Performance in Hybrid Satellite-Terrestrial Networks: A Novel Joint NOMA-NC Approach, GLOBECOM 2024, Global Communications Conference, (ed), (eds), (to_appear), Dec, 2024, Cape Town, South Africa, IEEE,
[2]
M. Karavolos, L. Tsipi, D. Vouyioukas, P. Bithas, P. Mathiopoulos, Satellite Aerial Terrestrial Hybrid NOMA Scheme in 6G Networks: An Unsupervised Learning Approach, 6GNet 2022, 1st International Conference on 6G Networking, Networking and Communications, (ed), (eds), (to_appear), Jul, 2022, Paris, France, https://doi.org/10.1109/6GNet54646.2022....
M. Anagnostopoulos, G. Kambourakis, P. Drakatos, M. Karavolos, S. Kotsilitis, D. K. Y. Yau, Botnet command and control architectures revisited: Tor Hidden services and Fluxing, The 18th International Conference on Web Information Systems Engineering (WISE 2017), pp. 517-527, Oct, 2017, Moscow, Russia, Springer LNCS Vol. 10570, http://www.wise-conferences.org/
 

Abstract
Botnet armies constitute a major and continuous threat to the Internet. Their number, diversity, and power grows with each passing day, and the last years we are witnessing their rapid expansion to mobile and even IoT devices. The work at hand focuses on botnets which comprise mobile devices (e.g. smartphones), and aims to raise the alarm on a couple of advanced Command and Control (C&C) architectures that capitalize on Tor's hidden services (HS) and DNS protocol. Via the use of such architectures, the goal of the perpetrator is dual; first to further obfuscate their identity and minimize the botnet's forensic signal, and second to augment the resilience of their army. The novelty of the introduced architectures is that it does not rely on static C&C servers, but on rotating ones, which can be reached by other botnet members through their (varied) onion address. Also, we propose a scheme called "Tor fluxing", which opposite to legacy IP or DNS fluxing, does not rely on A type of DNS resource records but on TXT ones. We demonstrate the soundness and effectiveness of the introduced C&C constructions via a proof-of-concept implementation, and suggest possible remedies.

[4]
M. Karavolos, V. Tatsis, D. N. Skoutas, N. Nomikos, D. Vouyioukas, C. Skianis, A Dynamic Hybrid Clustering Scheme for LTE-A Networks Employing CoMP-DPS, CAMAD 2017, 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Jun, 2017, Lund, Sweden, IEEE, http://doi.org/10.1109/CAMAD.2017.803161...
[5]
M. Karavolos, V. Tatsis, P. Drakatos, G. Chondrompilas, N. Nomikos, D. N. Skoutas, D. Vouyioukas, C. Skianis, A Load and Channel Aware Dynamic Point Selection Algorithm for LTE-A CoMP Networks, TEMU 2016, International Conference on Telecommunications and Multimedia, Dec, 2016, Heraklion, Crete, Greece, IEEE, http://doi.org/10.1109/TEMU.2016.7551928

Books


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Chapters in Books


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Conferences Proceedings Editor


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.