default search action
Theofilos Chrysikos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Theofilos Chrysikos, Sotiria Gourna, Aikaterini Skouroliakou:
RF Coverage Design for the Implementation of a Broadband Monitoring Service in the Context of 5G-Enabled Smart Cities. Inf. 14(3): 156 (2023) - [j3]Spiros Louvros, Michael Paraskevas, Theofilos Chrysikos:
QoS-Aware Resource Management in 5G and 6G Cloud-Based Architectures with Priorities. Inf. 14(3): 175 (2023)
2010 – 2019
- 2018
- [c23]George E. Raptis, Christina P. Katsini, Theofilos Chrysikos:
CHISTA: Cultural Heritage Information Storage and reTrieval Application. EuroMed (2) 2018: 163-170 - [c22]Theofilos Chrysikos, Panagiotis Georgakopoulos, Iliana Oikonomou, Stavros Kotsopoulos:
Measurement-based characterization of the 3.5 GHz channel for 5G-enabled IoT at complex industrial and office topologies. WTS 2018: 1-9 - 2017
- [j2]Theofilos Chrysikos, Konstantinos Birkos, Tasos Dagiuklas, Stavros Kotsopoulos:
Wireless Information-Theoretic Security: Theoretical analysis & experimental measurements with multiple eavesdroppers in an outdoor obstacle-dense MANET. Phys. Commun. 25: 577-587 (2017) - [c21]Shahid Mumtaz, Kazi Mohammed Saidul Huq, Jonathan Rodriguez, Saptarshi Ghosh, Emeka Emmanuel Ugwuanyi, Muddesar Iqbal, Tasos Dagiuklas, Stavros Stavrou, Loizos Kanaris, Ilias D. Politis, Asimakis Lykourgiotis, Theofilos Chrysikos, Polyxeni Nakou, Panagiotis Georgakopoulos:
Self-Organization Towards Reduced Cost and Energy Per Bit for Future Emerging Radio Technologies - SONNET. GLOBECOM Workshops 2017: 1-6 - [c20]Theofilos Chrysikos, Panagiotis Georgakopoulos, Iliana Oikonomou, Stavros Kotsopoulos, Dimitrios Zevgolis:
Channel measurement and characterization for a complex industrial and office topology at 2.4 GHz. SKIMA 2017: 1-8 - [c19]Theofilos Chrysikos, Iliana Zisi, Stavros Kotsopoulos:
Investigation of small-scale fading for pancreas-to-skin in-body propagation. WTS 2017: 1-9 - 2016
- [c18]Georgios Charalampopoulos, Tasos Dagiuklas, Theofilos Chrysikos:
V2I applications in highways: How RSU dimensioning can improve service delivery. ICT 2016: 1-6 - [c17]Nikolaos Michalopoulos, George E. Raptis, Christina P. Katsini, Theofilos Chrysikos, Michail Mamalakis, Andrew Vigotsky:
A Personalised Monitoring and Recommendation Framework for Kinetic Dysfunctions: The Trendelenburg Gait. PCI 2016: 8 - [c16]Theofilos Chrysikos, Panagiotis Galiotos, Stavros Kotsopoulos, Tasos Dagiuklas:
Techno-economic analysis for the deployment of PPDR services over 4G/4G+ networks. TEMU 2016: 1-7 - [c15]Theofilos Chrysikos, Iliana Zisi, Stavros A. Kotsopoulos:
Channel modeling and path loss characterization for in-body propagation at MICS and ISM bands. WTS 2016: 1-7 - 2015
- [c14]Theofilos Chrysikos, Christos Papadakos, Stavros Kotsopoulos:
Wireless channel measurements and modeling for an office topology at 3.5 GHz. WTS 2015: 1-6 - 2014
- [c13]Michael Charitos, Theofilos Chrysikos, Grigorios Kalivas, Stavros Kotsopoulos:
ITS Applications of a Hybrid WiMAX-WLAN Network for Highway Tunnel Scenarios. VTC Fall 2014: 1-5 - 2013
- [c12]Theofilos Chrysikos, Tasos Dagiuklas, Stavros A. Kotsopoulos:
Wireless Information-Theoretic Security in MANETs. ICC Workshops 2013: 692-696 - 2012
- [c11]Theofilos Chrysikos, Stavros Kotsopoulos, George K. Karagiannidis:
Attenuation over distance and excess path loss for a large-area indoor commercial topology at 2.4 GHz. ICT 2012: 1-6 - [c10]Theofilos Chrysikos, Stavros Kotsopoulos:
Characterization of Large-Scale Fading for the 2.4 GHz Channel in Obstacle-Dense Indoor Propagation Topologies. VTC Fall 2012: 1-5 - 2011
- [j1]Theofilos Chrysikos, Tasos Dagiuklas, Stavros Kotsopoulos:
Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [c9]Theofilos Chrysikos, Giannis Georgopoulos, Stavros Kotsopoulos:
Attenuation over distance for indoor propagation topologies at 2.4 GHz. ISCC 2011: 329-334 - [c8]Theofilos Chrysikos, Giannis Georgopoulos, Stavros Kotsopoulos:
Wireless channel characterization for a home indoor propagation topology at 2.4 GHz. WTS 2011: 1-10 - 2010
- [c7]Theofilos Chrysikos, Giannis Georgopoulos, Stavros A. Kotsopoulos:
Impact of shadowing on wireless channel characterization for a public indoor commercial topology at 2.4 GHz. ICUMT 2010: 281-286 - [c6]Theofilos Chrysikos, Giannis Georgopoulos, Stavros Kotsopoulos, Dimitrios Zevgolis:
Site-specific validation of indoor RF models for commercial propagation topologies at 2.4 GHz. ISWCS 2010: 681-685 - [c5]Theofilos Chrysikos, Tasos Dagiuklas, Stavros Kotsopoulos:
Wireless Information-Theoretic Security for moving users in autonomic networks. Wireless Days 2010: 1-5 - [p1]Konstantinos Birkos, Theofilos Chrysikos, Stavros Kotsopoulos, Ioannis A. Maniatis:
Security and Quality of Service in Wireless Networks. Handbook of Information and Communication Security 2010: 603-630
2000 – 2009
- 2009
- [c4]Theofilos Chrysikos, Giannis Georgopoulos, Stavros Kotsopoulos:
Empirical calculation of shadowing deviation for complex indoor propagation topologies at 2.4 GHz. ICUMT 2009: 1-6 - [c3]Theofilos Chrysikos, Tasos Dagiuklas, Stavros Kotsopoulos:
A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security. SEWCN 2009: 3-12 - [c2]Theofilos Chrysikos, Giannis Georgopoulos, Stavros Kotsopoulos:
Site-specific validation of ITU indoor path loss model at 2.4 GHz. WOWMOM 2009: 1-6 - [c1]Theofilos Chrysikos, Stavros Kotsopoulos:
Impact of channel-dependent variation of path loss exponent on Wireless Information-Theoretic Security. WTS 2009: 1-7
Coauthor Index
aka: Stavros Kotsopoulos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint