Journal | year |
---|---|
Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, “Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications”, International Journal of Information Security, Springer, Volume 18, Issue 1, pp 49–72, February 2019. | 2019 |
Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis, "A survey of voice and communication protection solutions against wiretapping," Computers & Electrical Engineering, Vol. 77, pp:163-178, July, 2019. | 2019 |
Christoforos Ntantogian, George Poulios, George Karopoulos, Christos Xenakis, “Transforming Malicious Code to ROP Gadgets for Antivirus Evasion”, IET Information Security, March 2019. | 2019 |
Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, “Evaluation of password hashing schemes in open source web platforms”, Computers & Security, Elsevier, July 2019. | 2019 |
Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis, “A survey of voice and communication protection solutions against wiretapping,” Computers & Electrical Engineering, Vol. 77, pp:163-178, July 2019. | 2019 |
Vaios Bolgouras, Christoforos Ntantogian, Emmanouil Panaousis, Christos Xenakis, “ Distributed Key Management in Microgrids.” IEEE Transactions on Industrial Informatics, 2019. | 2019 |
Kostantinos Papadamou, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea, Alberto Caponi, Annamaria Recupero, Claudio Pisa, Giuseppe Bianchi, Steven Gevers, Christos Xenakis, Michael Sirivianos, " Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication." Transactions on Information Forensics & Security, 2019 (accepted). | 2019 |
Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis, "MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem," Computers & Security, Elsevier Science, Vol. 73, Issue 1, pp:307-325, March, 2018. | 2018 |
Lyvas C., Lambrinoudakis C., Geneiatakis D., “Dypermin: Dynamic Permission Mining Framework for Android Platform”, Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2018. | 2018 |
Kostantinos Papadamou, Savvas Zannettou, Giuseppe Bianchi, Alberto Caponi, Annamaria Recupero, Steven Gevers, George Gugulea, Sorin Teican, Bogdan Chifor, Christos Xenakis, Michael Sirivianos, “Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication, arXiv preprint arXiv:1811.08360 | 2018 |
Christoforos Panos, Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, "Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks," Computer Networks, Elsevier Science, Vol. 113, Issue 1, pp: 94-110, February 2017. | 2017 |
Georgiou D., Lambrinoudakis C., “Security Policy Rules and Required Procedures for Two Crucial Threats of Cloud Computing”, International Journal of Electronic Governance, Special Issue on Citizen Rights in the World of the New Computing Paradigms, Inderscience Publishers, 2017 (under review). | 2017 |
Christos Xenakis, Christoforos Ntantogian, Orestis Panos, "(U)SimMonitor: a mobile application for security evaluation of cellular networks," Computers & Security, Elsevier Science, Vol. 60, Issue 1, pp: 62-70, July 2016. | 2016 |
Furnell S., Katsikas S., Lambrinoudakis C. (Guest Eds.), “Trust, Privacy and Security in Digital Business”, Special Issue of Information (ISSN 2078-2489), Open Access Information Science Journal, MDPI, 2016. | 2016 |
Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, "Gaithashing: a two-factor authentication scheme based on gait features," Computers & Security, Elsevier Science, Vol. 52, Issue 1, pp: 17-32, July. 2015. | 2015 |
Drogkaris P., Gritzalis S., Kalloniatis C., Lambrinoudakis C., “Hierarchical Multitier Approach for Privacy Policies in e-Government Environments”, Future Internet (indexed in ESCI), Vol. 7, pp. 500-515; DOI:10.3390/fi7040500, MDPI, 2015. | 2015 |
Pitropakis N., Pikrakis A., Lambrinoudakis C., "Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments”, International Journal of Information Security (indexed in ISI/SCI-E), Volume 14, Issue 4, pp 299–305, Elsevier, 2015. | 2015 |
Christos Xenakis, Christoforos Ntantogian, "An advanced persistent threat in 3G networks: Attacking the home network from roaming networks," Computers & Security, Elsevier Science, Vol. 40, Issue 1, pp:84-94, February 2014. | 2014 |
Christoforos Panos, Christos Xenakis, Platon Kotzias, Ioannis Stavrakakis, "A specification-based intrusion detection engine for infrastructure-less networks," Computer Communications, Elsevier Science, Vol. 54, pp: 67-83, Dec. 2014. | 2014 |
Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis, "Evaluating the privacy of Android mobile applications under forensic analysis," Computers & Security, Elsevier Science, Vol. 42, pp:66-76, May 2014. | 2014 |
Pitropakis N., Anastasopoulou D., Pikrakis A., Lambrinoudakis C., "If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments”, Journal of Cloud Computing: Advances, Systems and Applications, Vol.3:20, DOI: 10.1186/s13677-014-0020-6, Springer, 2014. | 2014 |
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Obscuring Users' Identity in VoIP/IMS Environments”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 43, pp. 145-158, Elsevier, 2014. | 2014 |
Foivos Demertzis, Christos Xenakis, "SOMA-E: Self-Organised Mesh Authentication Extended," Mathematical and Computer Modeling, Elsevier Science, Vol. 57, Issue 7-8, pp: 1606 – 1616, April 2013. | 2013 |
Shon T., Park J.H., Lambrinoudakis C., Seigneur J. (Guest Eds.), "Advanced Information Security", Special Issue of the Computers & Mathematics with Applications Journal, Vol.65, Iss.9, pp.1233, Elsevier, May 2013. | 2013 |
Camenisch J., Lambrinoudakis C. (Guest Eds.), “Public Key Services and Infrastructures”, Special Issue of the Mathematical and Computer Modelling journal, Vol.57, No. 7-8, Elsevier, 2013. | 2013 |
Vrakas N., Lambrinoudakis C., “An Intrusion Detection and Prevention System for IMS and VoIP Services”, International Journal of Information Security (indexed in ISI/SCI-E), Vol. 12, No.3, pp. 201-217, Springer, 2013. | 2013 |
Drogkaris P., Gritzalis S., Lambrinoudakis C., “Employing privacy policies and preferences in modern e-government environments”, International Journal of Electronic Governance, Vol. 6, No. 2, pp. 101-116, Inderscience Publishers, 2013. | 2013 |
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments”, IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), Vol. 15, No.2, pp. 803-819, IEEE Press, 2013. | 2013 |
Lambrinoudakis C., “Evaluating and Enriching Information and Communication Technologies Compliance Frameworks with Regard to Privacy”, Information Management & Computer Security, Vol.21, No.3, pp. 177-190, Emerald, 2013. | 2013 |
Christoforos Ntantogian, Christos Xenakis, "Questioning the Feasibility of UMTS-GSM Interworking Attacks," Wireless Personal Communications, Springer, Vol. 65, No. 1, pp:157-163, July 2012. | 2012 |
Jaatun M.G., Lambrinoudakis C., Rong C. (Guest Eds.), “Security in Cloud Computing”, Special Issue of the Journal of Cloud Computing: Advances, Systems and Applications, Vol.1, Issue 1, Springer, 2012. | 2012 |
Shon T., Lambrinoudakis C., Zhou X. (Guest Eds.), “Next Generation Communication and Network Security”, Special Issue of the Security and Communication Networks Journal, Vol.5, No. 10, Wiley, 2012. | 2012 |
Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis " A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks ," Computers & Security, Elsevier Science, Vol. 30, Issue 1, pp: 63-80, Jan. 2011. | 2011 |
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis " Reducing False Synchronizations in 3G-WLAN Interworking Networks ," IEEE Transactions on Wireless Communications, Vol. 10, No. 11, pp: 3765–3773, Nov. 2011. | 2011 |
Vrakas N., Lambrinoudakis C., “A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services”, International Journal of Information Technologies and the Systems Approach, Special Issue on Privacy and Security Issues in IT, Vol.4, Issue 2, pp. 32-47, IGI Global, 2011. | 2011 |
Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing (indexed in ISI/SCI-E), Special Issue on Network Security and Digital Forensics in Next Generation Communications, Vol.11, Issue 2, pp. 289-302, Wiley, 2011. | 2011 |
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis "A Generic Mechanism for Efficient Authentication in B3G Networks ," Computers & Security, Elsevier Science, Vol. 29, Issue 4, pp: 460-475, June 2010. | 2010 |
Tsohou Α., Kokolakis S., Lambrinoudakis C., Gritzalis S., “A Security Standards' framework to facilitate best practices’ Awareness and Conformity”, Information Management & Computer Security, Vol. 18, No.5, pp. 350-365, Emerald, 2010. | 2010 |
Lambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiuklas A., Ehlert S., Fiedler J., "High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation", International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010. | 2010 |
Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Privacy and Identity Management, Vol. xi, No. 1, pp.32-37, also in Novatica journal, Issue 202 (www.ati.es/novatica), 2010. | 2010 |
Christoforos Ntantogian, Christos Xenakis, "One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks ," Wireless Personal Communications, Springer, Vol. 48, Issue 4, pp: 569-584, March 2009. | 2009 |
Rizomiliotis P., Tsohou A., Lambrinoudakis C., Gritzalis S., "Security and Privacy Issues in Bipolar Disorder Research", The Journal on Information Technology in Healthcare, Vo. 7, No. 4, pp. 244-250 (republication of the C.28. article), HL7, 2009. | 2009 |
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009. | 2009 |
Christos Xenakis, Christoforos Ntantogian, Ioannis Stavrakakis, "A network-assisted mobile VPN for securing users data in UMTS ," Computer Communications, Elsevier Science, vol. 31, No. 14, pp. 3315-3327 September 2008. | 2008 |
Christos Xenakis, "Security Measures and Weaknesses of the GPRS Security Architecture ," International Journal of Network Security, Vol.6, No.2, pp:158-169, Mar. 2008. | 2008 |
Geneiatakis D., Lambrinoudakis C., Kambourakis, G., “An Ontology Based-Policy for Deploying Secure SIP- based VoIP Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 27, Issues 7-8, pp. 285-297, Elsevier, 2008. | 2008 |
Christos Xenakis, Christoforos Ntantogian, "Security Architectures for B3G Mobile Networks, " Telecommunication Systems, Springer, Vol.35, pp: 123-139, Aug. 2007. | 2007 |
Fischer-Hübner S., Furnell S., Lambrinoudakis C. (Guest Eds.), “Trust, Privacy and Security in Digital Business -2006”, Special Issue of the International Journal of Computer Systems, Science and Engineering, Vol.22, No. 5, CRL Publishing, 2007. | 2007 |
Geneiatakis D., Lambrinoudakis C., “A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment”, Telecommunication Systems (indexed in ISI/SCI-E), Vol.36, No.4, pp. 153-159, Springer, 2007. | 2007 |
Geneiatakis D., Lambrinoudakis C., “An Ontology Description for SIP Security Flaws”, Computer Communications (indexed in ISI/SCI-E), Vol. 30, Issue 6, pp. 1367-1374, Elsevier, 2007. | 2007 |
Showing 1 to 50 of 77 entries