George Delaportas | Kingston University, London (original) (raw)
Uploads
Papers by George Delaportas
Discussion and analysis of a scenario where a demo web application that acts as a profile manager... more Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability assessment throughout all the technologies applied, in order to identify possible security weaknesses and exploits.
International workshop on …, 2004
... Sze, SM, 'Semiconductor Sensors', John Wiley &a... more ... Sze, SM, 'Semiconductor Sensors', John Wiley & Sons, New York, 1994. Ventzas, DE, Tsitsipis P, Kalovrektis K, Varzakas K, (1998) 'Microcontroller Control of anElectro-Pneumatic Manipulator', Euriscon 98, SIRES/IEEE/CSS, June, pp.98. ...
A 2.5 years research that I did as an undergraduate student at T.E.I of Lamia. This paper analyze... more A 2.5 years research that I did as an undergraduate student at T.E.I of Lamia. This paper analyzes current ANN solutions and discovers problems and limitations. Then it proposes an entirely new approach and a new type of ANN, the G.A.N.N, with a set of new mathematical models and rules.
Discussion and analysis of a scenario where a demo web application that acts as a profile manager... more Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability assessment throughout all the technologies applied, in order to identify possible security weaknesses and exploits.
Digital Subscriber Line is a data communications technology that transmits data faster over the s... more Digital Subscriber Line is a data communications technology that transmits data faster over the simple copper telephone lines. The signal encoding of xDSL technology is illustrated by a set of modulation techniques. This journal will overview the xDSL technology and will discuss subjects on the efficiency of these modulation techniques.
The aim of this paper is to analyze some common network attacks and try to figure out the reason ... more The aim of this paper is to analyze some common network attacks and try to figure out the reason and ways they were made possible with the help of a few well known vulnerability scanners, port scanners and sniffers. These tools will be introduced and briefly analyzed first. The main part of the paper will talk about risk management, assessment and analysis. It will also present common network attacks and introduce some useful tools. Finally, in the last parts we will discuss and conclude providing some logical assumptions.
This paper describes a construction of a robotic system, which is useful for recording multiple C... more This paper describes a construction of a robotic system, which is useful for recording multiple CDs or DVDs with almost any type of PC. The robotic system considered in this work is composed of three-link arm and four-joint. Its dynamic architecture can lead to a fully automated process with less or no need of human interaction. Its ability to adapt on almost every environment makes it flexible.
Discussion and analysis of a scenario where a demo web application that acts as a profile manager... more Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability assessment throughout all the technologies applied, in order to identify possible security weaknesses and exploits.
International workshop on …, 2004
... Sze, SM, 'Semiconductor Sensors', John Wiley &a... more ... Sze, SM, 'Semiconductor Sensors', John Wiley & Sons, New York, 1994. Ventzas, DE, Tsitsipis P, Kalovrektis K, Varzakas K, (1998) 'Microcontroller Control of anElectro-Pneumatic Manipulator', Euriscon 98, SIRES/IEEE/CSS, June, pp.98. ...
A 2.5 years research that I did as an undergraduate student at T.E.I of Lamia. This paper analyze... more A 2.5 years research that I did as an undergraduate student at T.E.I of Lamia. This paper analyzes current ANN solutions and discovers problems and limitations. Then it proposes an entirely new approach and a new type of ANN, the G.A.N.N, with a set of new mathematical models and rules.
Discussion and analysis of a scenario where a demo web application that acts as a profile manager... more Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability assessment throughout all the technologies applied, in order to identify possible security weaknesses and exploits.
Digital Subscriber Line is a data communications technology that transmits data faster over the s... more Digital Subscriber Line is a data communications technology that transmits data faster over the simple copper telephone lines. The signal encoding of xDSL technology is illustrated by a set of modulation techniques. This journal will overview the xDSL technology and will discuss subjects on the efficiency of these modulation techniques.
The aim of this paper is to analyze some common network attacks and try to figure out the reason ... more The aim of this paper is to analyze some common network attacks and try to figure out the reason and ways they were made possible with the help of a few well known vulnerability scanners, port scanners and sniffers. These tools will be introduced and briefly analyzed first. The main part of the paper will talk about risk management, assessment and analysis. It will also present common network attacks and introduce some useful tools. Finally, in the last parts we will discuss and conclude providing some logical assumptions.
This paper describes a construction of a robotic system, which is useful for recording multiple C... more This paper describes a construction of a robotic system, which is useful for recording multiple CDs or DVDs with almost any type of PC. The robotic system considered in this work is composed of three-link arm and four-joint. Its dynamic architecture can lead to a fully automated process with less or no need of human interaction. Its ability to adapt on almost every environment makes it flexible.