Carleton University - Canada’s Capital University Carleton University - Canada’s Capital University Sitemap
Contact SCS
Campus Map
Computer Science Search:
Powered by Google
News & Seminars Future Students Current Students SCS Research People Tech Support
Dr Evangelos Kranakis
Chancellor's Professor
CU Dr Evangelos Kranakis
Chancellor's Professor
5380 HP
1125 Colonel By Drive
Ottawa, Ontario
K1S 5B6
Office:5380 HP
Phone:1-(613)-520-2600 x8090
Email:kranakisatsignscs.carleton.ca
Web Site:http://www.scs.carleton.ca/~kranakis/

Education and Research
Rank:Chancellor's Professor
Degrees:Ph.D. Minnesota (1980), B.Sc. Athens (1973)
Research Interests:Computational Molecular Biology, Data & Communication Networks, Distributed & Mobile Agent Computing, Wireless Ad Hoc & Sensor Networks, and Computer and Network Security
Technical Reports
  1. TR-10-03, Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis,
    A Proactive Threshold Secret Sharing Scheme Handling Gen2 Privacy Threats
  2. TR-10-04, J. Garcia-Alfaro, M. Barbeau, and E. Kranakis,
    Positioning of Wireless Sensor Nodes in the Presence of Liars
  3. TR-07-23, Andreas Wiese and Evangelos Kranakis,
    Local PTAS for Independent Set and Vertex Cover in Location Aware Unit Disk Graphs
  4. TR-07-18, Andreas Wiese and Evangelos Kranakis,
    Local Construction and Coloring of Spanners of Location Aware Unit Disk Graphs
  5. TR-07-21, Andreas Wiese and Evangelos Kranakis,
    Impact of Locality on Location Aware Unit Disk Graphs
  6. TR-07-17, Andreas Wiese and Evangelos Kranakis,
    Local PTAS for Dominating and Connected Dominating Set in Location Aware Unit Disk Graph
  7. TR-07-12, Evangelos Kranakis, Michel Paquette, Andrzej Pelc,
    Communication in Networks with Random Dependent Faults
  8. TR-07-07, Prosenjit Bose, Hua Guo, Evangelos Kranakis, Anil Maheshwari, Pat Morin, Jason Morrison, Michiel Smid, Yihui Tang,
    On the False-Positive Rate of Bloom Filters
  9. TR-07-04, David Whyte, P.C. van Oorschot, Evangelos Kranakis,
    Tracking Darkports for Network Defense
  10. TR-07-01, Mathieu Couture, Michel Barbeau, Prosenjit Bose, Paz Carmi, Evangelos Kranakis,
    Location Oblivious Distributed Unit Disk Graph Coloring
  11. TR-06-11, Mathieu Couture, Michel Barbeau, Prosenjit Bose, Evangelos Kranakis,
    Incremental Construction of k-Dominating Sets in Wireless Sensor Networks
  12. TR-06-06, David Whyte, P.C. Van Oorschot, Evangelos Kranakis,
    Exposure Maps: Removing Reliance on Attribution During Scan Detection
  13. TR-05-08, Evangelos Kranakis, P.C. Van Oorschot, Tao Wan,
    On Inter-domain Routing Security and Pretty Secure BGP (psBGP)
  14. TR-05-07, Tao Wan, P.C. Van Oorschot, Evangelos Kranakis,
    A Selective Introduction to Border Gateway Protocol (BGP) Security Issues
  15. TR-05-06, David Whyte, P.C. Van Oorschot, Evangelos Kranakis,
    Addressing Malicious SMTP-based Mass-Mailing Activity Within an Enterprise Network
  16. TR-05-05, Constantinos Georgiou, Evangelos Kranakis, Ricardo Marcelin-Jimenez, Sergio Rajsbaum, Jorge Urrutia,
    Distributed Dynamic Storage in Wireless Networks
  17. TR-05-02, David Whyte, P.C. Van Oorschot, Evangelos Kranakis,
    ARP-based Detection of Scanning Worms Within an Enterprise Network
  18. TR-05-01, Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis,
    Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users

Supervised Honours Projects
  1. Accountable Sequence Numbers by Jean-Benoit Aubin
  2. Cluster Based Routing In Socially Selfish Delay Networks by YANGYANG CAI
  3. Uncoordinated FHSS Anti-Jamming Communication by Dongchao Chen
  4. Location Leaks on GSM Air Interface by Xi Chen
  5. Solving Classical Problems in Computational Molecular Biology Using Distributed Computing and Web Technologies by Rakhim Davletkaliyev
  6. orithmic Approach to Geographic Routing in Sensor Networks by Elmunir Elgajiji
  7. Using Algorithms to Solve Key Distribution Problem by Zhuo Jin
  8. Mobile Sink Routing Problem by Saken Khudaibergenov
  9. Bioinformatics: Algorithms and Methods in Protein Structure Prediction by Wiktor Kula
  10. Using Spatial Cloaking Algorithm to Protect Location Privacy by Jing Li
  11. Triangle Localization Algorithm Based on Received Signal Strength Indication by Yunpeng Liu
  12. Bitcoin: A Sustainable Example of Cryptographic, Decentralized Currency? by Emmanuelle McCullough-Murray
  13. Protecting Location Privacy in Wireless Sensor Networks by Qiuliang Tang