default search action
Georgios Kambourakis
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j96]Christos Smiliotopoulos, Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis:
Assessing the detection of lateral movement through unsupervised learning techniques. Comput. Secur. 149: 104190 (2025) - [j95]Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Unmasking the hidden credential leaks in password managers and VPN clients. Comput. Secur. 150: 104298 (2025) - [j94]Konstantinos E. Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Dimitrios Serpanos:
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS. Int. J. Inf. Sec. 24(1): 47 (2025) - 2024
- [j93]Dhanasak Bhumichai, Christos Smiliotopoulos, Ryan Benton, Georgios Kambourakis, Dimitrios Damopoulos:
The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead. Inf. 15(5): 268 (2024) - [j92]Mingshan You, Yong-Feng Ge, Kate N. Wang, Hua Wang, Jinli Cao, Georgios Kambourakis:
Hierarchical adaptive evolution framework for privacy-preserving data publishing. World Wide Web (WWW) 27(4): 49 (2024) - [c55]Yong-Feng Ge, Hua Wang, Jinli Cao, Yanchun Zhang, Georgios Kambourakis:
Federated Genetic Algorithm: Two-Layer Privacy-Preserving Trajectory Data Publishing. GECCO 2024 - [c54]Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers. SEC 2024: 61-75 - [i11]Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Keep your memory dump shut: Unveiling data leaks in password managers. CoRR abs/2404.00423 (2024) - [i10]Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis:
Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis. CoRR abs/2406.18894 (2024) - 2023
- [j91]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, Stefanos Gritzalis:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. Comput. Secur. 125: 103051 (2023) - [j90]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis:
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study. Int. J. Inf. Sec. 22(2): 347-365 (2023) - [j89]Christos Smiliotopoulos, Georgios Kambourakis, Konstantia Barbatsalou:
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs. Int. J. Inf. Sec. 22(6): 1893-1919 (2023) - [j88]Filippos Giannakas, Vasileios Kouliaridis, Georgios Kambourakis:
A Closer Look at Machine Learning Effectiveness in Android Malware Detection. Inf. 14(1): 2 (2023) - [j87]Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis:
Assessing the Security and Privacy of Android Official ID Wallet Apps. Inf. 14(8): 457 (2023) - [j86]José Luis Hernández Ramos, Paolo Bellavista, Georgios Kambourakis, Jason R. C. Nurse, J. Morris Chang:
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond. IT Prof. 25(5): 17-19 (2023) - [c53]Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas:
Bypassing antivirus detection: old-school malware, new tricks. ARES 2023: 150:1-150:10 - [c52]Efstratios Chatzoglou, Vyron Kampourakis, Georgios Kambourakis:
Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames. SEC 2023: 250-264 - [c51]Mingshan You, Yong-Feng Ge, Kate N. Wang, Hua Wang, Jinli Cao, Georgios Kambourakis:
TLEF: Two-Layer Evolutionary Framework for t-Closeness Anonymization. WISE 2023: 235-244 - [i9]Efstratios Chatzoglou, Vyron Kampourakis, Georgios Kambourakis:
Bl0ck: Paralyzing 802.11 connections through Block Ack frames. CoRR abs/2302.05899 (2023) - [i8]Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas:
Bypassing antivirus detection: old-school malware, new tricks. CoRR abs/2305.04149 (2023) - [i7]José Luis Hernández Ramos, Georgios Karopoulos, Efstratios Chatzoglou, Vasileios Kouliaridis, Enrique Mármol Campos, Aurora González-Vidal, Georgios Kambourakis:
Intrusion Detection based on Federated Learning: a systematic review. CoRR abs/2308.09522 (2023) - 2022
- [j85]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias, Christos Smiliotopoulos:
Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems. IEEE Access 10: 64761-64784 (2022) - [j84]Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos D. Zaroliagis:
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations. Cryptogr. 6(4): 53 (2022) - [j83]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE. J. Inf. Secur. Appl. 64: 103058 (2022) - [j82]Marios Anagnostopoulos, Stavros Lagos, Georgios Kambourakis:
Large-scale empirical evaluation of DNS and SSDP amplification attacks. J. Inf. Secur. Appl. 66: 103168 (2022) - [j81]Vyron Kampourakis, Georgios Kambourakis, Efstratios Chatzoglou, Christos D. Zaroliagis:
Revisiting man-in-the-middle attacks against HTTPS. Netw. Secur. 2022(3) (2022) - [j80]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces. Secur. Commun. Networks 2022: 1833062:1-1833062:24 (2022) - [j79]Efstratios Chatzoglou, Georgios Kambourakis, Christos Smiliotopoulos:
Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny. Sensors 22(2): 513 (2022) - [j78]Efstratios Chatzoglou, Georgios Kambourakis, Christos Smiliotopoulos, Constantinos Kolias:
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features. Sensors 22(15): 5633 (2022) - [c50]Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 81-96 - [c49]Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 177-190 - [i6]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, Stefanos Gritzalis:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. CoRR abs/2208.06722 (2022) - 2021
- [j77]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset. IEEE Access 9: 34188-34205 (2021) - [j76]Georgios Karopoulos, José Luis Hernández Ramos, Vasileios Kouliaridis, Georgios Kambourakis:
A Survey on Digital Certificates Approaches for the COVID-19 Pandemic. IEEE Access 9: 138003-138025 (2021) - [j75]Georgios Michail Makrakis, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, Jacob Benjamin:
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents. IEEE Access 9: 165295-165325 (2021) - [j74]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
WiF0: All Your Passphrase Are Belong to Us. Computer 54(7): 82-88 (2021) - [j73]Nektaria Potha, Vasileios Kouliaridis, Georgios Kambourakis:
An extrinsic random-based ensemble approach for android malware detection. Connect. Sci. 33(4): 1077-1093 (2021) - [j72]Efstratios Chatzoglou, Georgios Kambourakis, Vasileios Kouliaridis:
A Multi-Tier Security Analysis of Official Car Management Apps for Android. Future Internet 13(3): 58 (2021) - [j71]Vasileios Kouliaridis, Georgios Kambourakis:
A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection. Inf. 12(5): 185 (2021) - [j70]José Luis Hernández Ramos, Georgios Karopoulos, Dimitris Geneiatakis, Tania Martin, Georgios Kambourakis, Igor Nai Fovino:
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation. Wirel. Commun. Mob. Comput. 2021: 2427896:1-2427896:12 (2021) - [c48]Pantaleone Nespoli, Félix Gómez Mármol, Georgios Kambourakis:
AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm. ARES 2021: 103:1-103:8 - [c47]Zisis Tsiatsikas, Georgios Kambourakis, Dimitrios Geneiatakis:
At Your Service 24/7 or Not? Denial of Service on ESInet Systems. TrustBus 2021: 35-49 - [c46]Georgios Karopoulos, Dimitris Geneiatakis, Georgios Kambourakis:
Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response Headers. TrustBus 2021: 83-95 - [i5]José Luis Hernández Ramos, Georgios Karopoulos, Dimitris Geneiatakis, Tania Martin, Georgios Kambourakis, Igor Nai Fovino:
Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation. CoRR abs/2101.04575 (2021) - [i4]Georgios Michail Makrakis, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, Jacob Benjamin:
Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures. CoRR abs/2109.03945 (2021) - 2020
- [j69]Georgios Kambourakis, Gerard Draper-Gil, Ignacio Sanchez:
What Email Servers Can Tell to Johnny: An Empirical Study of Provider-to-Provider Email Security. IEEE Access 8: 130066-130081 (2020) - [j68]Alexandros Fakis, Georgios Karopoulos, Georgios Kambourakis:
Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks. Future Internet 12(5): 92 (2020) - [j67]Vasileios Kouliaridis, Konstantia Barmpatsalou, Georgios Kambourakis, Shuhong Chen:
A Survey on Mobile Malware Detection Techniques. IEICE Trans. Inf. Syst. 103-D(2): 204-211 (2020) - [j66]Georgios Kambourakis, Constantinos Kolias, Dimitris Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, Ioannis Kounelis:
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks. Symmetry 12(4): 579 (2020) - [j65]Vasileios Kouliaridis, Georgios Kambourakis, Dimitris Geneiatakis, Nektaria Potha:
Two Anatomists Are Better than One - Dual-Level Android Malware Detection. Symmetry 12(7): 1128 (2020) - [j64]Tania Martin, Georgios Karopoulos, José Luis Hernández Ramos, Georgios Kambourakis, Igor Nai Fovino:
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps. Wirel. Commun. Mob. Comput. 2020: 8851429:1-8851429:29 (2020) - [c45]Vasileios Kouliaridis, Nektaria Potha, Georgios Kambourakis:
Improving Android Malware Detection Through Dimensionality Reduction Techniques. MLN 2020: 57-72 - [c44]Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng:
Feature importance in Android malware detection. TrustCom 2020: 1449-1454 - [i3]Tania Martin, Georgios Karopoulos, José Luis Hernández Ramos, Georgios Kambourakis, Igor Nai Fovino:
Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps. CoRR abs/2007.11687 (2020) - [i2]Vasileios Kouliaridis, Georgios Kambourakis, Dimitrios Geneiatakis:
Dissecting contact tracing apps in the Android platform. CoRR abs/2008.00214 (2020) - [i1]Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng:
Feature importance in mobile malware detection. CoRR abs/2008.05299 (2020)
2010 – 2019
- 2019
- [j63]Zisis Tsiatsikas, Georgios Kambourakis, Dimitris Geneiatakis, Hua Wang:
The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems. IEEE Access 7: 2401-2417 (2019) - [j62]Dimitrios Papamartzivanos, Félix Gómez Mármol, Georgios Kambourakis:
Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems. IEEE Access 7: 13546-13560 (2019) - [j61]Mattia Zago, Pantaleone Nespoli, Dimitrios Papamartzivanos, Manuel Gil Pérez, Félix Gómez Mármol, Georgios Kambourakis, Gregorio Martínez Pérez:
Screening Out Social Bots Interference: Are There Any Silver Bullets? IEEE Commun. Mag. 57(8): 98-104 (2019) - [j60]Georgios Kambourakis, Gregorio Martínez Pérez, Félix Gómez Mármol:
Editorial: special issue on advances in security and privacy for future mobile communications. Electron. Commer. Res. 19(3): 471-475 (2019) - [j59]Filippos Giannakas, Andreas Papasalouros, Georgios Kambourakis, Stefanos Gritzalis:
A comprehensive cybersecurity learning platform for elementary education. Inf. Secur. J. A Glob. Perspect. 28(3): 81-106 (2019) - [j58]Dimitrios Damopoulos, Georgios Kambourakis:
Hands-Free one-Time and continuous authentication using glass wearable devices. J. Inf. Secur. Appl. 46: 138-150 (2019) - [j57]Constantinos Kolias, Weizhi Meng, Georgios Kambourakis, Jiageng Chen:
Security, Privacy, and Trust on Internet of Things. Wirel. Commun. Mob. Comput. 2019 (2019) - 2018
- [j56]Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis:
Cybertrust in the IoT Age. Computer 51(7): 12-15 (2018) - [j55]Pantaleone Nespoli, Dimitrios Papamartzivanos, Félix Gómez Mármol, Georgios Kambourakis:
Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks. IEEE Commun. Surv. Tutorials 20(2): 1361-1396 (2018) - [j54]Dimitrios Papamartzivanos, Félix Gómez Mármol, Georgios Kambourakis:
Dendron : Genetic trees driven rule induction for network intrusion detection systems. Future Gener. Comput. Syst. 79: 558-574 (2018) - [j53]Georgios Kambourakis, Félix Gómez Mármol, Guojun Wang:
Security and Privacy in Wireless and Mobile Networks. Future Internet 10(2): 18 (2018) - [c43]Marios Anagnostopoulos, Georgios Kambourakis, Stefanos Gritzalis, David K. Y. Yau:
Never say never: Authoritative TLD nameserver-powered DNS amplification. NOMS 2018: 1-9 - [c42]Vasileios Kouliaridis, Konstantia Barmpatsalou, Georgios Kambourakis, Guojun Wang:
Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral Patterns. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1503-1508 - 2017
- [j52]Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Jeffrey M. Voas:
DDoS in the IoT: Mirai and Other Botnets. Computer 50(7): 80-84 (2017) - [j51]Sokratis Vidros, Constantinos Kolias, Georgios Kambourakis, Leman Akoglu:
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset. Future Internet 9(1): 6 (2017) - [j50]Sofia-Anna Menesidou, Vasilios Katos, Georgios Kambourakis:
Cryptographic Key Management in Delay Tolerant Networks: A Survey. Future Internet 9(3): 26 (2017) - [j49]Constantinos Kolias, Vassilis Kolias, Georgios Kambourakis:
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection. Int. J. Inf. Sec. 16(4): 401-416 (2017) - [j48]Alexandros Fakis, Georgios Karopoulos, Georgios Kambourakis:
OnionSIP: Preserving Privacy in SIP with Onion Routing. J. Univers. Comput. Sci. 23(10): 969-991 (2017) - [c41]Vittoria Cozza, Zisis Tsiatsikas, Mauro Conti, Georgios Kambourakis:
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services. ICISSP 2017: 431-438 - [c40]Georgios Kambourakis, Constantinos Kolias, Angelos Stavrou:
The Mirai botnet and the IoT Zombie Armies. MILCOM 2017: 267-272 - [c39]Christos Gkountis, Miran Taha, Jaime Lloret, Georgios Kambourakis:
Lightweight algorithm for protecting SDN controller against DDoS attacks. WMNC 2017: 1-6 - [c38]Marios Anagnostopoulos, Georgios Kambourakis, Drakatos Panagiotis, Michail Karavolos, Sarantis Kotsilitis, David K. Y. Yau:
Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing. WISE (2) 2017: 517-527 - 2016
- [j47]Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis:
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Commun. Surv. Tutorials 18(1): 184-208 (2016) - [j46]Filippos Giannakas, Georgios Kambourakis, Andreas Papasalouros, Stefanos Gritzalis:
Security Education and Awareness for K-6 Going Mobile. Int. J. Interact. Mob. Technol. 10(2): 41-48 (2016) - [j45]Marios Anagnostopoulos, Georgios Kambourakis, Stefanos Gritzalis:
New facets of mobile botnet: architecture and evaluation. Int. J. Inf. Sec. 15(5): 455-473 (2016) - [j44]Georgios Kambourakis, Dimitrios Damopoulos, Dimitrios Papamartzivanos, Emmanouil Pavlidakis:
Introducing touchstroke: keystroke-based authentication system for smartphones. Secur. Commun. Networks 9(6): 542-554 (2016) - [c37]Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis:
Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade. NSS 2016: 126-139 - [c36]Evangelos Mitakidis, Dimitrios Taketzis, Alexandros Fakis, Georgios Kambourakis:
SnoopyBot: An Android spyware to bridge the mixes in Tor. SoftCOM 2016: 1-5 - 2015
- [j43]Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis:
An efficient and easily deployable method for dealing with DoS in SIP services. Comput. Commun. 57: 50-63 (2015) - [j42]Georgios Karopoulos, Georgios Portokalidis, Josep Domingo-Ferrer, Ying-Dar Lin, Dimitris Geneiatakis, Georgios Kambourakis:
Security and privacy in unified communications: Challenges and solutions. Comput. Commun. 68: 1-3 (2015) - [j41]Georgios Kambourakis, Gregorio Martínez Pérez, Félix Gómez Mármol:
Editorial: special issue on advances in security and privacy for future mobile communications. Electron. Commer. Res. 15(1): 73-74 (2015) - [j40]Hua Wang, Xiaohong Jiang, Georgios Kambourakis:
Special issue on Security, Privacy and Trust in network-based Big Data. Inf. Sci. 318: 48-50 (2015) - [j39]Lampros Ntalkos, Georgios Kambourakis, Dimitrios Damopoulos:
Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework. Telematics Informatics 32(4): 539-563 (2015) - [c35]Zisis Tsiatsikas, Alexandros Fakis, Dimitrios Papamartzivanos, Dimitris Geneiatakis, Georgios Kambourakis, Constantinos Kolias:
Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?. SECRYPT 2015: 301-308 - [c34]Zisis Tsiatsikas, Marios Anagnostopoulos, Georgios Kambourakis, Sozon Lambrou, Dimitris Geneiatakis:
Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication. TrustBus 2015: 48-59 - 2014
- [j38]Ying-Dar Lin, Chun-Ying Huang, Matthew K. Wright, Georgios Kambourakis:
Mobile Application Security. Computer 47(6): 21-23 (2014) - [j37]Georgios Kambourakis, Fernando Pereñíguez-Garcia, Peter Mueller, Tom Karygiannis:
Secure mobility in future communication systems under standardization. Comput. Stand. Interfaces 36(3): 435-437 (2014) - [j36]Georgios Kambourakis:
Anonymity and closely related terms in the cyberspace: An analysis by example. J. Inf. Secur. Appl. 19(1): 2-17 (2014) - [j35]Georgios Kambourakis, Gregorio Martínez Pérez, Félix Gómez Mármol:
Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks. Mob. Networks Appl. 19(1): 61-63 (2014) - [j34]Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis, Sang Oh Park:
Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer-to-Peer Netw. Appl. 7(4): 687-697 (2014) - [c33]Georgios Karopoulos, Alexandros Fakis, Georgios Kambourakis:
Complete SIP Message Obfuscation: PrivaSIP over Tor. ARES 2014: 217-226 - [c32]Dimitrios Damopoulos, Georgios Kambourakis, Georgios Portokalidis:
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones. EUROSEC 2014: 6:1-6:6 - [c31]Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan L. Clarke, Georgios Kambourakis:
Android forensics: Correlation analysis. ICITST 2014: 157-162 - [c30]Dimitrios Papamartzivanos, Dimitrios Damopoulos, Georgios Kambourakis:
A cloud-based architecture to crowdsource mobile app privacy leaks. Panhellenic Conference on Informatics 2014: 59:1-59:6 - 2013
- [j33]Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis:
From keyloggers to touchloggers: Take the rough with the smooth. Comput. Secur. 32: 102-114 (2013) - [j32]Marios Anagnostopoulos, Georgios Kambourakis, Panagiotis Kopanos, Georgios Louloudakis, Stefanos Gritzalis:
DNS amplification attack revisited. Comput. Secur. 39: 475-485 (2013) - [j31]Constantinos Kolias, Georgios Kambourakis, Stefanos Gritzalis:
Attacks and Countermeasures on 802.16: Analysis and Assessment. IEEE Commun. Surv. Tutorials 15(1): 487-514 (2013) - [j30]Konstantia Barmpatsalou, Dimitrios Damopoulos, Georgios Kambourakis, Vasilios Katos:
A critical review of 7 years of Mobile Device Forensics. Digit. Investig. 10(4): 323-349 (2013) - [j29]Fernando Pereñíguez-Garcia, Rafael Marín López, Georgios Kambourakis, Antonio Ruiz-Martínez, Stefanos Gritzalis, Antonio Fernandez Gómez-Skarmeta:
KAMU: providing advanced user privacy in Kerberos multi-domain scenarios. Int. J. Inf. Sec. 12(6): 505-525 (2013) - [j28]Dimitrios Damopoulos, Georgios Kambourakis, Marios Anagnostopoulos, Stefanos Gritzalis, J. H. Park:
User privacy and modern mobile services: are they on the same path? Pers. Ubiquitous Comput. 17(7): 1437-1448 (2013) - [c29]Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis:
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP. ARES 2013: 224-229 - [p1]Constantinos Kolias, Vassilis Kolias, Georgios Kambourakis, Eleftherios Kayafas:
A Client-Side Privacy Framework for Web Personalization. Semantic Hyper/Multimedia Adaptation 2013: 297-316 - 2012
- [j27]Athanasios Loukas, Dimitrios Damopoulos, Sofia-Anna Menesidou, Maria Eleni Skarkala, Georgios Kambourakis, Stefanos Gritzalis:
MILC: A secure and privacy-preserving mobile instant locator with chatting. Inf. Syst. Frontiers 14(3): 481-497 (2012) - [j26]Dimitrios Damopoulos, Sofia-Anna Menesidou, Georgios Kambourakis, Maria Papadaki, Nathan L. Clarke, Stefanos Gritzalis:
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Secur. Commun. Networks 5(1): 3-14 (2012) - [j25]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
SIPA: generic and secure accounting for SIP. Secur. Commun. Networks 5(9): 1006-1027 (2012) - 2011
- [j24]Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park:
DoS attacks exploiting signaling in UMTS and IMS. Comput. Commun. 34(3): 226-235 (2011) - [j23]Fernando Pereñíguez-Garcia, Rafael Marín López, Georgios Kambourakis, Stefanos Gritzalis, Antonio Fernandez Gómez-Skarmeta:
PrivaKERB: A user privacy framework for Kerberos. Comput. Secur. 30(6-7): 446-463 (2011) - [j22]Constantinos Kolias, Georgios Kambourakis, Manolis Maragoudakis:
Swarm intelligence in intrusion detection: A survey. Comput. Secur. 30(8): 625-642 (2011) - [j21]Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
A Survey on Cluster-Based Group Key Agreement Protocols for WSNs. IEEE Commun. Surv. Tutorials 13(3): 429-442 (2011) - [j20]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
PrivaSIP: Ad-hoc identity privacy in SIP. Comput. Stand. Interfaces 33(3): 301-314 (2011) - [j19]Iosif Terzis, Georgios Kambourakis, Giorgos Karopoulos, Costas Lambrinoudakis:
Privacy preserving context transfer schemes for 4G networks. Wirel. Commun. Mob. Comput. 11(2): 289-302 (2011) - [c28]Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis:
iSAM: An iPhone Stealth Airborne Malware. SEC 2011: 17-28 - 2010
- [j18]Georgios Kambourakis, Elisavet Konstantinou, Stefanos Gritzalis:
Revisiting WiMAX MBS security. Comput. Math. Appl. 60(2): 217-223 (2010) - [j17]Fernando Pereñíguez-Garcia, Georgios Kambourakis, Rafael Marín López, Stefanos Gritzalis, Antonio Fernandez Gómez-Skarmeta:
Privacy-enhanced fast re-authentication for EAP-based next generation network. Comput. Commun. 33(14): 1682-1694 (2010) - [j16]Georgios Kambourakis, Elisavet Konstantinou, Anastasia Douma, Marios Anagnostopoulos, Georgios Fotiadis:
Efficient Certification Path Discovery for MANET. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j15]Georgios Kambourakis, Stefanos Gritzalis, Jong Hyuk Park:
Device Authentication In Wireless And Pervasive Environments. Intell. Autom. Soft Comput. 16(3): 399-418 (2010) - [j14]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis, Elisavet Konstantinou:
A framework for identity privacy in SIP. J. Netw. Comput. Appl. 33(1): 16-28 (2010) - [j13]Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas:
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web. Pers. Ubiquitous Comput. 14(6): 527-539 (2010)
2000 – 2009
- 2009
- [j12]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
A generic accounting scheme for next generation networks. Comput. Networks 53(14): 2408-2426 (2009) - [j11]Lambros Boukas, Georgios Kambourakis, Stefanos Gritzalis:
Pandora: An SMS-oriented m-informational system for educational realms. J. Netw. Comput. Appl. 32(3): 684-702 (2009) - [c27]Dimitris Geneiatakis, Costas Lambrinoudakis, Georgios Kambourakis, Aggelos Kafkalas, Sven Ehlert:
A First Order Logic Security Verification Model for SIP. ICC 2009: 1-6 - [c26]Constantinos Kolias, Vasilis Kolias, Georgios Kambourakis:
A secure and efficient authentication protocol for passive RFID tags. ISWCS 2009: 36-40 - [c25]Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park:
Signaling-Oriented DoS Attacks in UMTS Networks. ISA 2009: 280-289 - [c24]Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
A Cluster-Based Framework for the Security of Medical Sensor Environments. TrustBus 2009: 52-62 - 2008
- [j10]Sven Ehlert, Ge Zhang, Dimitris Geneiatakis, Georgios Kambourakis, Tasos Dagiuklas, Jirí Markl, Dorgham Sisalem:
Two layer Denial of Service prevention on SIP VoIP infrastructures. Comput. Commun. 31(10): 2443-2456 (2008) - [j9]Dimitris Geneiatakis, Costas Lambrinoudakis, Georgios Kambourakis:
An ontology-based policy for deploying secure SIP-based VoIP services. Comput. Secur. 27(7-8): 285-297 (2008) - [j8]Demosthenes Vouyioukas, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis:
Enabling the provision of secure web based m-health services utilizing XML based security models. Secur. Commun. Networks 1(5): 375-388 (2008) - [c23]Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
Clustering Oriented Architectures in Medical Sensor Environments. ARES 2008: 929-934 - [c22]Iason Demiros, George Carayannis, Vassilios Antonopoulos, Georgios Kambourakis, Vassilios Katsouros, Panayotis Kolevris, Marios Nottas, Harris Papageorgiou, Vassilis Papavassiliou, Spyros Raptis, Fotini Simistira, Themos Stafylakis:
PANOPTIS: A System for Intelligent Monitoring of the Hellenic Broadcast Sector. DEXA Workshops 2008: 605-609 - [c21]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Caller identity privacy in SIP heterogeneous realms: A practical solution. ISCC 2008: 37-43 - [c20]Georgios Kambourakis, Elisavet Konstantinou, Stefanos Gritzalis:
Binary tree based public-key management for Mobile Ad Hoc Networks. ISWCS 2008: 687-692 - [c19]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Privacy Protection in Context Transfer Protocol. PDP 2008: 590-596 - [c18]Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas:
A pervasive wiki application based on VoiceXML. PETRA 2008: 58 - [c17]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
A new Accounting Mechanism for Modern and Future AAA Services. SEC 2008: 693-697 - [c16]Vassilis Kolias, Constantinos Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas:
A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization. SMAP 2008: 157-163 - [c15]Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas:
Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles. SMAP 2008: 170-176 - [c14]Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis:
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony. TrustBus 2008: 59-68 - 2007
- [j7]Georgios Kambourakis, Denise-Penelope N. Kontoni, Angelos N. Rouskas, Stefanos Gritzalis:
A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Comput. Educ. 48(1): 1-16 (2007) - [j6]Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis:
A framework for protecting a SIP-based infrastructure against malformed message attacks. Comput. Networks 51(10): 2580-2593 (2007) - [j5]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks. IEEE Commun. Surv. Tutorials 9(1-4): 18-28 (2007) - [c13]Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis:
Securing Medical Sensor Environments: The CodeBlue Framework Case. ARES 2007: 637-643 - [c12]Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, Stefanos Gritzalis:
Detecting DNS Amplification Attacks. CRITIS 2007: 185-196 - [c11]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Two privacy enhanced context transfer schemes. Q2SWinet 2007: 172-175 - [c10]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
On RSN-Oriented Wireless Intrusion Detection. OTM Conferences (2) 2007: 1601-1615 - [c9]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
Towards effective Wireless Intrusion Detection in IEEE 802.11i. SECPerU 2007: 37-42 - [c8]Georgios Kambourakis, Stefanos Gritzalis:
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. TrustBus 2007: 135-144 - 2006
- [j4]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis, Dimitris Geneiatakis:
Support of subscribers' certificates in a hybrid WLAN-3G environment. Comput. Networks 50(11): 1843-1859 (2006) - [j3]Dimitris Geneiatakis, Tasos Dagiuklas, Georgios Kambourakis, Costas Lambrinoudakis, Stefanos Gritzalis, Sven Ehlert, Dorgham Sisalem:
Survey of security vulnerabilities in session initiation protocol. IEEE Commun. Surv. Tutorials 8(1-4): 68-81 (2006) - 2005
- [c7]Nikolaos Doukas, Eleni Klaoudatou, Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Evaluation of digital certificates acquisition in large-scale 802.11-3GPP hybrid environments. LANMAN 2005 - [c6]Dimitris Geneiatakis, Georgios Kambourakis, Tasos Dagiuklas, Costas Lambrinoudakis, Stefanos Gritzalis:
A framework for detecting malformed messages in SIP networks. LANMAN 2005 - 2004
- [j2]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems. EURASIP J. Wirel. Commun. Netw. 2004(1): 184-197 (2004) - [j1]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks. Wirel. Pers. Commun. 29(3-4): 303-321 (2004) - [c5]Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis:
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. EuroPKI 2004: 287-296 - [c4]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. NETWORKING 2004: 13-24 - [c3]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Delivering Attribute Certificates over GPRS. SAC 2004: 1166-1170 - 2003
- [c2]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Introducing PKI to Enhance Security in Future Mobile Networks. SEC 2003: 109-120 - 2002
- [c1]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Using SSL/TLS in authentication and key agreement procedures of future mobile networks. MWCN 2002: 152-156
Coauthor Index
aka: Dimitrios Geneiatakis
aka: Giorgos Karopoulos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint