Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, “Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications”, International Journal of Information Security, Springer, Volume 18, Issue 1, pp 49–72, February 2019. | 2019 |
Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis, "A survey of voice and communication protection solutions against wiretapping," Computers & Electrical Engineering, Vol. 77, pp:163-178, July, 2019. | 2019 |
Christoforos Ntantogian, George Poulios, George Karopoulos, Christos Xenakis, “Transforming Malicious Code to ROP Gadgets for Antivirus Evasion”, IET Information Security, March 2019. | 2019 |
Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, “Evaluation of password hashing schemes in open source web platforms”, Computers & Security, Elsevier, July 2019. | 2019 |
Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis, “A survey of voice and communication protection solutions against wiretapping,” Computers & Electrical Engineering, Vol. 77, pp:163-178, July 2019. | 2019 |
Vaios Bolgouras, Christoforos Ntantogian, Emmanouil Panaousis, Christos Xenakis, “ Distributed Key Management in Microgrids.” IEEE Transactions on Industrial Informatics, 2019. | 2019 |
Kostantinos Papadamou, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea, Alberto Caponi, Annamaria Recupero, Claudio Pisa, Giuseppe Bianchi, Steven Gevers, Christos Xenakis, Michael Sirivianos, " Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication." Transactions on Information Forensics & Security, 2019 (accepted). | 2019 |
Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis, "MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem," Computers & Security, Elsevier Science, Vol. 73, Issue 1, pp:307-325, March, 2018. | 2018 |
Lyvas C., Lambrinoudakis C., Geneiatakis D., “Dypermin: Dynamic Permission Mining Framework for Android Platform”, Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2018. | 2018 |
Kostantinos Papadamou, Savvas Zannettou, Giuseppe Bianchi, Alberto Caponi, Annamaria Recupero, Steven Gevers, George Gugulea, Sorin Teican, Bogdan Chifor, Christos Xenakis, Michael Sirivianos, “Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication, arXiv preprint arXiv:1811.08360 | 2018 |
Christoforos Panos, Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, "Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks," Computer Networks, Elsevier Science, Vol. 113, Issue 1, pp: 94-110, February 2017. | 2017 |
Georgiou D., Lambrinoudakis C., “Security Policy Rules and Required Procedures for Two Crucial Threats of Cloud Computing”, International Journal of Electronic Governance, Special Issue on Citizen Rights in the World of the New Computing Paradigms, Inderscience Publishers, 2017 (under review). | 2017 |
Christos Xenakis, Christoforos Ntantogian, Orestis Panos, "(U)SimMonitor: a mobile application for security evaluation of cellular networks," Computers & Security, Elsevier Science, Vol. 60, Issue 1, pp: 62-70, July 2016. | 2016 |
Furnell S., Katsikas S., Lambrinoudakis C. (Guest Eds.), “Trust, Privacy and Security in Digital Business”, Special Issue of Information (ISSN 2078-2489), Open Access Information Science Journal, MDPI, 2016. | 2016 |
Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, "Gaithashing: a two-factor authentication scheme based on gait features," Computers & Security, Elsevier Science, Vol. 52, Issue 1, pp: 17-32, July. 2015. | 2015 |
Drogkaris P., Gritzalis S., Kalloniatis C., Lambrinoudakis C., “Hierarchical Multitier Approach for Privacy Policies in e-Government Environments”, Future Internet (indexed in ESCI), Vol. 7, pp. 500-515; DOI:10.3390/fi7040500, MDPI, 2015. | 2015 |
Pitropakis N., Pikrakis A., Lambrinoudakis C., "Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments”, International Journal of Information Security (indexed in ISI/SCI-E), Volume 14, Issue 4, pp 299–305, Elsevier, 2015. | 2015 |
Christos Xenakis, Christoforos Ntantogian, "An advanced persistent threat in 3G networks: Attacking the home network from roaming networks," Computers & Security, Elsevier Science, Vol. 40, Issue 1, pp:84-94, February 2014. | 2014 |
Christoforos Panos, Christos Xenakis, Platon Kotzias, Ioannis Stavrakakis, "A specification-based intrusion detection engine for infrastructure-less networks," Computer Communications, Elsevier Science, Vol. 54, pp: 67-83, Dec. 2014. | 2014 |
Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis, "Evaluating the privacy of Android mobile applications under forensic analysis," Computers & Security, Elsevier Science, Vol. 42, pp:66-76, May 2014. | 2014 |
Pitropakis N., Anastasopoulou D., Pikrakis A., Lambrinoudakis C., "If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments”, Journal of Cloud Computing: Advances, Systems and Applications, Vol.3:20, DOI: 10.1186/s13677-014-0020-6, Springer, 2014. | 2014 |
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Obscuring Users' Identity in VoIP/IMS Environments”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 43, pp. 145-158, Elsevier, 2014. | 2014 |
Foivos Demertzis, Christos Xenakis, "SOMA-E: Self-Organised Mesh Authentication Extended," Mathematical and Computer Modeling, Elsevier Science, Vol. 57, Issue 7-8, pp: 1606 – 1616, April 2013. | 2013 |
Shon T., Park J.H., Lambrinoudakis C., Seigneur J. (Guest Eds.), "Advanced Information Security", Special Issue of the Computers & Mathematics with Applications Journal, Vol.65, Iss.9, pp.1233, Elsevier, May 2013. | 2013 |
Camenisch J., Lambrinoudakis C. (Guest Eds.), “Public Key Services and Infrastructures”, Special Issue of the Mathematical and Computer Modelling journal, Vol.57, No. 7-8, Elsevier, 2013. | 2013 |
Vrakas N., Lambrinoudakis C., “An Intrusion Detection and Prevention System for IMS and VoIP Services”, International Journal of Information Security (indexed in ISI/SCI-E), Vol. 12, No.3, pp. 201-217, Springer, 2013. | 2013 |
Drogkaris P., Gritzalis S., Lambrinoudakis C., “Employing privacy policies and preferences in modern e-government environments”, International Journal of Electronic Governance, Vol. 6, No. 2, pp. 101-116, Inderscience Publishers, 2013. | 2013 |
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments”, IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), Vol. 15, No.2, pp. 803-819, IEEE Press, 2013. | 2013 |
Lambrinoudakis C., “Evaluating and Enriching Information and Communication Technologies Compliance Frameworks with Regard to Privacy”, Information Management & Computer Security, Vol.21, No.3, pp. 177-190, Emerald, 2013. | 2013 |
Christoforos Ntantogian, Christos Xenakis, "Questioning the Feasibility of UMTS-GSM Interworking Attacks," Wireless Personal Communications, Springer, Vol. 65, No. 1, pp:157-163, July 2012. | 2012 |
Jaatun M.G., Lambrinoudakis C., Rong C. (Guest Eds.), “Security in Cloud Computing”, Special Issue of the Journal of Cloud Computing: Advances, Systems and Applications, Vol.1, Issue 1, Springer, 2012. | 2012 |
Shon T., Lambrinoudakis C., Zhou X. (Guest Eds.), “Next Generation Communication and Network Security”, Special Issue of the Security and Communication Networks Journal, Vol.5, No. 10, Wiley, 2012. | 2012 |
Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis " A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks ," Computers & Security, Elsevier Science, Vol. 30, Issue 1, pp: 63-80, Jan. 2011. | 2011 |
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis " Reducing False Synchronizations in 3G-WLAN Interworking Networks ," IEEE Transactions on Wireless Communications, Vol. 10, No. 11, pp: 3765–3773, Nov. 2011. | 2011 |
Vrakas N., Lambrinoudakis C., “A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services”, International Journal of Information Technologies and the Systems Approach, Special Issue on Privacy and Security Issues in IT, Vol.4, Issue 2, pp. 32-47, IGI Global, 2011. | 2011 |
Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing (indexed in ISI/SCI-E), Special Issue on Network Security and Digital Forensics in Next Generation Communications, Vol.11, Issue 2, pp. 289-302, Wiley, 2011. | 2011 |
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis "A Generic Mechanism for Efficient Authentication in B3G Networks ," Computers & Security, Elsevier Science, Vol. 29, Issue 4, pp: 460-475, June 2010. | 2010 |
Tsohou Α., Kokolakis S., Lambrinoudakis C., Gritzalis S., “A Security Standards' framework to facilitate best practices’ Awareness and Conformity”, Information Management & Computer Security, Vol. 18, No.5, pp. 350-365, Emerald, 2010. | 2010 |
Lambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiuklas A., Ehlert S., Fiedler J., "High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation", International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010. | 2010 |
Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Privacy and Identity Management, Vol. xi, No. 1, pp.32-37, also in Novatica journal, Issue 202 (www.ati.es/novatica), 2010. | 2010 |
Christoforos Ntantogian, Christos Xenakis, "One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks ," Wireless Personal Communications, Springer, Vol. 48, Issue 4, pp: 569-584, March 2009. | 2009 |
Rizomiliotis P., Tsohou A., Lambrinoudakis C., Gritzalis S., "Security and Privacy Issues in Bipolar Disorder Research", The Journal on Information Technology in Healthcare, Vo. 7, No. 4, pp. 244-250 (republication of the C.28. article), HL7, 2009. | 2009 |
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009. | 2009 |
Christos Xenakis, Christoforos Ntantogian, Ioannis Stavrakakis, "A network-assisted mobile VPN for securing users data in UMTS ," Computer Communications, Elsevier Science, vol. 31, No. 14, pp. 3315-3327 September 2008. | 2008 |
Christos Xenakis, "Security Measures and Weaknesses of the GPRS Security Architecture ," International Journal of Network Security, Vol.6, No.2, pp:158-169, Mar. 2008. | 2008 |
Geneiatakis D., Lambrinoudakis C., Kambourakis, G., “An Ontology Based-Policy for Deploying Secure SIP- based VoIP Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 27, Issues 7-8, pp. 285-297, Elsevier, 2008. | 2008 |
Christos Xenakis, Christoforos Ntantogian, "Security Architectures for B3G Mobile Networks, " Telecommunication Systems, Springer, Vol.35, pp: 123-139, Aug. 2007. | 2007 |
Fischer-Hübner S., Furnell S., Lambrinoudakis C. (Guest Eds.), “Trust, Privacy and Security in Digital Business -2006”, Special Issue of the International Journal of Computer Systems, Science and Engineering, Vol.22, No. 5, CRL Publishing, 2007. | 2007 |
Geneiatakis D., Lambrinoudakis C., “A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment”, Telecommunication Systems (indexed in ISI/SCI-E), Vol.36, No.4, pp. 153-159, Springer, 2007. | 2007 |
Geneiatakis D., Lambrinoudakis C., “An Ontology Description for SIP Security Flaws”, Computer Communications (indexed in ISI/SCI-E), Vol. 30, Issue 6, pp. 1367-1374, Elsevier, 2007. | 2007 |
Gritzalis S., Yannacopoulos A., Lambrinoudakis C., Hatzopoulos P., Katsikas S., "A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments", International Journal of Information Security (indexed in ISI/SCI-E), Vol.6, No.4, pp. 197-211, Springer, 2007. | 2007 |
Geneiatakis D., Kambourakis G., Lambrinoudakis C., Dagiuklas A., Gritzalis S., “A Framework for Protecting a SIP-based Infrastructure against Malformed Message Attacks”, Computer Networks Journal (indexed in ISI/SCI-E), Vol. 51, Issue 10, pp. 2580-2593, Elsevier, 2007. | 2007 |
Christos Xenakis, Nikos Laoutaris, Lazaros Merakos, Ioannis Stavrakakis, "A Generic Characterization of the Overheads Imposed by IPsec and Associated Cryptographic Algorithms ," Computer Networks, Elsevier Science, Vol. 50, No. 17, Dec 2006, pp. 3225-3241. | 2006 |
Christos Xenakis, Lazaros Merakos, "Alternative Schemes for Dynamic Secure VPN Deployment over UMTS," Wireless Personal Communications, Springer, Vol. 36, No. 2, Jan 2006, pp. 163-194. | 2006 |
Christos Xenakis, "Malicious actions against the GPRS technology," Computer Virology, Springer, Vol. 2, No. 2, Nov. 2006, pp. 121-133. | 2006 |
Geneiatakis D., Dagiuklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., «Survey of Security Vulnerabilities in Session Initiation Protocol», IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), Vol.8, No.3, pp. 68-81, IEEE Press, 3rd Quarter 2006. | 2006 |
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Katsikas S., “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, October 2006. | 2006 |
Lekkas D., Lambrinoudakis C., “Outsourcing Digital Signatures: A solution to key management burden”, Information Management and Computer Security Journal, Special issue on Security Issues of IT Outsourcing, Vol. 14, No. 5, pp. 436-449, Emerald, 2006. | 2006 |
Maglogiannis I., Zafiropoulos E., Platis A., Lambrinoudakis C., “Risk analysis of a patient monitoring system using Bayesian Network modeling”, Journal of Biomedical Informatics (indexed in ISI/SCI-E), Vol. 39, No. 6, pp. 637-647, Elsevier, 2006. | 2006 |
Dritsas S., Gritzalis D., Lambrinoudakis C., “Protecting privacy and anonymity in pervasive computing: trends and perspectives”, Telematics and Informatics Journal, Special Issue on Privacy and Anonymity in the Global Village, Vol. 23, No. 3, pp. 196-210, Elsevier, 2006. | 2006 |
Kokolakis S., Lambrinoudakis C., “ICT Security Standards for Healthcare Applications”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Standardization for ICT Security, Vol. 6, No. 4, pp. 47-54, also in Novatica journal, Issue 176 (www.ati.es/novatica), 2005. | 2005 |
Lambrinoudakis C., Gritzalis S., Hatzopoulos P., Yannacopoulos A., Katsikas S., “A formal model for pricing information systems insurance contracts”, Computer Standards and Interfaces (indexed in ISI/SCI-E), Vol. 7, No. 5, pp. 521-532, Elsevier, 2005. | 2005 |
Gritzalis S., Lambrinoudakis C., Lekkas D., Deftereos S., “Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments”, IEEE Transactions on Information Technology in BioMedicine (indexed in ISI/SCI-E), Vol. 9, No. 3, pp. 413-423, IEEE Press, 2005. | 2005 |
Christos Xenakis, Lazaros Merakos, "Security in third Generation Mobile Networks," Computer Communications, Elsevier Science, Vol. 27, No. 7, pp. 638-650, May 2004. (Most requested article of the Journal) | 2004 |
Christos Xenakis, Lazaros Merakos, "IPsec-based End-to-end VPN Deployment over UMTS," Computer Communications, Elsevier Science, vol. 27, No. 17, pp. 1693-1708, November 2004. (8th in the list of most requested articles of the Journal) | 2004 |
Aggelis G., Gritzalis S., Lambrinoudakis C., "Mechanisms for Controlling Access in the Global Grid Environment", Internet Research (indexed in ISI/SCI-E), Vol. 14, No. 5, pp. 347-352, Emerald, 2004. | 2004 |
Gritzalis D., Lambrinoudakis C., “A Security Architecture for Interconnecting Health Information Systems”, International Journal of Medical Informatics (indexed in ISI/SCI-E), Vol. 73, Issue 3, pp. 305-309, Elsevier, 2004. | 2004 |
Deftereos S., Lambrinoudakis C., Gritzalis S., Andriopoulos P., Georgonikou D., Aessopos A., “A macro-directive mechanism to automate updating and processing of the contents of CEN-compatible Electronic Healthcare Records”, Medical Informatics and the Internet in Medicine International Journal (indexed in ISI/SCI-E), Vol.28, No. 1, pp. 21-41, Taylor and Francis Publications, 2003. | 2003 |
Lambrinoudakis C., Gritzalis S., Dridi F., Pernul G., “Security Requirements for e-Government Services: A methodological approach for developing a common PKI based security policy”, Computer Communications (indexed in ISI/SCI-E), Vol. 26, Issue 16, pp. 1873-1883, Elsevier, 2003. | 2003 |
J.33. Lambrinoudakis C., Maistros G., Bofilios D., Darzentas J., “An Architecture for an Intelligent Support System for Design Validation and Manufacturing of Aerospace Components”, International Transactions in Operational Research (indexed in ISI/SCI-E), Vol. 10(4), pp. 351-363, Blackwell Publishers, 2003. | 2003 |
Christos Xenakis, Lazaros Merakos, "On Demand Network-wide VPN Deployment in GPRS," IEEE Network, Vol. 16, No. 6, pp. 28-37, November/December 2002. | 2002 |
Deftereos S., Lambrinoudakis C., Andriopoulos P., Farmakis D., Aessopos A., “A Java-based Electronic Healthcare Record software for beta-Thalassaemia”, Journal of Medical Internet Research (indexed in ISI/SCI-E), Vol.3(4):e33, 2001. | 2001 |
Konstantopoulos, M., Spyrou, T., Koutsabasis, P., Darzentas, J.S., Lambrinoudakis, C., Darzentas, J., “The Role of Directory Services in Online Education Delivery: The GESTALT Example”, International Journal of Continuing Engineering Education and Life-Long Learning, Vol.11, Nos 1/2, pp. 5-24, Inderscience Enterprises Ltd, 2001. | 2001 |
Lambrinoudakis C., Gritzalis S., “Managing Medical and Insurance Information through a Smart Card Based Information System”, Journal of Medical Systems (indexed in ISI/SCI-E), Vol. 24, No. 4, pp. 213-234, Kluwer Academic Publisher, 2000. | 2000 |
Lambrinoudakis C., “Smart Card Technology for Deploying a Secure Information Management Framework”, Information Management and Computer Security Journal, Vol. 8, Issue 4, pp. 173-183, MCB University Press, 2000. | 2000 |
Gritzalis, D., Lambrinoudakis C., “A Data Protection Scheme for a Remote Vital Signs Monitoring Healthcare Service”, Medical Informatics and the Internet in Medicine International Journal (indexed in ISI/SCI-E), Vol.25, No.3, pp. 207-224, Taylor and Francis Publications, 2000. | 2000 |
Beal D. and Lambrinoudakis C., “Design of a Reconfigurable High Performance Massively Parallel SIMD System”, International Journal of High Speed Computing (indexed in ISI/SCI-E), Vol.7, No.3, pp. 365-390, World Scientific Publishing Company, 1995. | 1998 |