BibTeX records: Christos Xenakis

download as .bib file

@article{DBLP:journals/ijisec/FaraoPPPZX24,
  author       = {Aristeidis Farao and
                  Georgios Paparis and
                  Sakshyam Panda and
                  Emmanouil Panaousis and
                  Apostolis Zarras and
                  Christos Xenakis},
  title        = {{INCHAIN:} a cyber insurance architecture with smart contracts and
                  self-sovereign identity on top of blockchain},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {347--371},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00741-8},
  doi          = {10.1007/S10207-023-00741-8},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/FaraoPPPZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/BountakasZLX23,
  author       = {Panagiotis Bountakas and
                  Apostolis Zarras and
                  Alexios Lekidis and
                  Christos Xenakis},
  title        = {Defense strategies for Adversarial Machine Learning: {A} survey},
  journal      = {Comput. Sci. Rev.},
  volume       = {49},
  pages        = {100573},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cosrev.2023.100573},
  doi          = {10.1016/J.COSREV.2023.100573},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csr/BountakasZLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BountakasX23,
  author       = {Panagiotis Bountakas and
                  Christos Xenakis},
  title        = {{HELPHED:} Hybrid Ensemble Learning PHishing Email Detection},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {210},
  pages        = {103545},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2022.103545},
  doi          = {10.1016/J.JNCA.2022.103545},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BountakasX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PetihakisKFBPX23,
  author       = {George Petihakis and
                  Dimitrios Kiritsis and
                  Aristeidis Farao and
                  Panagiotis Bountakas and
                  Aggeliki Panou and
                  Christos Xenakis},
  title        = {A Bring Your Own Device security awareness survey among professionals},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {92:1--92:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605072},
  doi          = {10.1145/3600160.3605072},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PetihakisKFBPX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BampatsikosPBX23,
  author       = {Michail Bampatsikos and
                  Ilias Politis and
                  Vaios Bolgouras and
                  Christos Xenakis},
  title        = {Multi-Attribute Decision Making-based Trust Score Calculation in Trust
                  Management in IoT},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {94:1--94:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605074},
  doi          = {10.1145/3600160.3605074},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BampatsikosPBX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BolgourasPSPGSX23,
  author       = {Vaios Bolgouras and
                  Kostantinos Papadamou and
                  Ioana Stroinea and
                  Michail Papadakis and
                  George Gugulea and
                  Michael Sirivianos and
                  Christos Xenakis},
  title        = {Enabling Qualified Anonymity for Enhanced User Privacy in the Digital
                  Era},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {95:1--95:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605075},
  doi          = {10.1145/3600160.3605075},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BolgourasPSPGSX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LouposNMMSGPSDG23,
  author       = {Konstantinos Loupos and
                  Harris Niavis and
                  Fotis Michalopoulos and
                  George Misiakoulis and
                  Antonio F. Skarmeta and
                  Jes{\'{u}}s Garcia and
                  Angel Palomares and
                  Hui Song and
                  Rustem Dautov and
                  Francesca Giampaolo and
                  Rosella Mancilla and
                  Francesca Costantino and
                  Dimitri Van Landuyt and
                  Sam Michiels and
                  Stefan More and
                  Christos Xenakis and
                  Michail Bampatsikos and
                  Ilias Politis and
                  Konstantinos Krilakis and
                  Sokratis Vavilis},
  title        = {An inclusive Lifecycle Approach for IoT Devices Trust and Identity
                  Management},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {98:1--98:6},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605083},
  doi          = {10.1145/3600160.3605083},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LouposNMMSGPSDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PantelakisBFX23,
  author       = {Vasileios Pantelakis and
                  Panagiotis Bountakas and
                  Aristeidis Farao and
                  Christos Xenakis},
  title        = {Adversarial Machine Learning Attacks on Multiclass Classification
                  of IoT Network Traffic},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {100:1--100:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605086},
  doi          = {10.1145/3600160.3605086},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PantelakisBFX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IoannidisBXP23,
  author       = {Thodoris Ioannidis and
                  Vaios Bolgouras and
                  Christos Xenakis and
                  Ilias Politis},
  title        = {Securing the Flow: Security and Privacy Tools for Flow-based Programming},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {103:1--103:6},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605089},
  doi          = {10.1145/3600160.3605089},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IoannidisBXP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/SpanakisPMPGBAX23,
  author       = {Emmanouil G. Spanakis and
                  Ilias Politis and
                  Evangelos K. Markakis and
                  Dimitra Papatsaroucha and
                  Athanasios Vasileios Grammatopoulos and
                  Vaios Bolgouras and
                  Anna Angelogianni and
                  Christos Xenakis and
                  Vangelis Sakkalis},
  title        = {Towards building a Self-Sovereign Identity Framework for Healthcare},
  booktitle    = {45th Annual International Conference of the {IEEE} Engineering in
                  Medicine {\&} Biology Society, {EMBC} 2023, Sydney, Australia,
                  July 24-27, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EMBC40787.2023.10340626},
  doi          = {10.1109/EMBC40787.2023.10340626},
  timestamp    = {Thu, 11 Jan 2024 15:01:18 +0100},
  biburl       = {https://dblp.org/rec/conf/embc/SpanakisPMPGBAX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/StylianouPX23,
  author       = {Ioannis Stylianou and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {Enhancing 3GPP {CAPIF} Authentication and Authorization Across Mobile
                  Operators Using OpenID Connect and Single Sign-On},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {5310--5315},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279103},
  doi          = {10.1109/ICC45041.2023.10279103},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/StylianouPX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/ChochliourosKXT23,
  author       = {Ioannis P. Chochliouros and
                  Michail{-}Alexandros Kourtis and
                  George Xilouris and
                  Wouter Tavernier and
                  Enrique Areizaga Sanchez and
                  Margarita Anastassova and
                  Christian Bolzmacher and
                  Nikolay Tcholtchev and
                  Antonello Corsi and
                  Panagiotis Trakadas and
                  Marta Millet and
                  Christos Xenakis and
                  Adnan Imeri and
                  Francesco Bellesini and
                  Paride D'Ostilio and
                  Albertos Markakis and
                  Ihsan Bal Engin and
                  Antonis Litke and
                  Lucrezia Maria Quarato and
                  Diego Cugat and
                  Georgios Gardikis and
                  Charilaos C. Zarakovitis and
                  St{\'{e}}phane Bouilland and
                  Zaharias D. Zaharis and
                  Christina Lessi and
                  Dimitrios N. Arvanitozisis and
                  Anastasia S. Spiliopoulou},
  editor       = {Ilias Maglogiannis and
                  Lazaros S. Iliadis and
                  Antonios Papaleonidas and
                  Ioannis P. Chochliouros},
  title        = {{OASEES:} An Innovative Scope for a DAO-Based Programmable Swarm Solution,
                  for Decentralizing {AI} Applications Close to Data Generation Locations},
  booktitle    = {Artificial Intelligence Applications and Innovations. {AIAI} 2023
                  {IFIP} {WG} 12.5 International Workshops - {MHDW} 2023, 5G-PINE 2023,
                  {\(\Alpha\)}{\(\Iota\)}BMG 2023, and {VAA-CP-EB} 2023, Le{\'{o}}n,
                  Spain, June 14-17, 2023, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {677},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34171-7\_7},
  doi          = {10.1007/978-3-031-34171-7\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip12/ChochliourosKXT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08074,
  author       = {Vaios Bolgouras and
                  Thodoris Ioannidis and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {{RETINA:} Distributed and Secure Trust Management for Smart Grid Applications
                  and Energy Trading},
  journal      = {CoRR},
  volume       = {abs/2306.08074},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08074},
  doi          = {10.48550/ARXIV.2306.08074},
  eprinttype    = {arXiv},
  eprint       = {2306.08074},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BountakasNX22,
  author       = {Panagiotis Bountakas and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {EKnad: Exploit Kits' network activity detection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {134},
  pages        = {219--235},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.04.001},
  doi          = {10.1016/J.FUTURE.2022.04.001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BountakasNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LyvasNX22,
  author       = {Christos Lyvas and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {[m]allotROPism: a metamorphic engine for malicious software variation
                  development},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {1},
  pages        = {61--78},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-021-00541-y},
  doi          = {10.1007/S10207-021-00541-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LyvasNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VeroniNX22,
  author       = {Eleni Veroni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {A large-scale analysis of Wi-Fi passwords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103190},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103190},
  doi          = {10.1016/J.JISA.2022.103190},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VeroniNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Diaz-HonrubiaBS22,
  author       = {Antonio Jes{\'{u}}s D{\'{\i}}az{-}Honrubia and
                  Alberto Bl{\'{a}}zquez{-}Herranz and
                  Luc{\'{\i}}a Prieto Santamar{\'{\i}}a and
                  Ernestina Menasalvas Ruiz and
                  Alejandro Rodr{\'{\i}}guez Gonz{\'{a}}lez and
                  Gustavo {Gonzalez Granadillo} and
                  Rodrigo Diaz and
                  Emmanouil Panaousis and
                  Christos Xenakis},
  title        = {A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery
                  Tool},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103350},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103350},
  doi          = {10.1016/J.JISA.2022.103350},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Diaz-HonrubiaBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GrammatopoulosP22,
  author       = {Athanasios Vasileios Grammatopoulos and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {Blind software-assisted conformance and security assessment of FIDO2/WebAuthn
                  implementations},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {2},
  pages        = {96--127},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.06.30.096},
  doi          = {10.22667/JOWUA.2022.06.30.096},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GrammatopoulosP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SuciuFBPSVVMBMX22,
  author       = {George Suciu and
                  Aristeidis Farao and
                  Giorgio Bernardinetti and
                  Ivan Palam{\`{a}} and
                  Mari{-}Anais Sachian and
                  Alexandru Vulpe and
                  Marius{-}Constantin Vochin and
                  Pavel Muresan and
                  Michail Bampatsikos and
                  Antonio Mu{\~{n}}oz and
                  Christos Xenakis},
  title        = {{SAMGRID:} Security Authorization and Monitoring Module Based on SealedGRID
                  Platform},
  journal      = {Sensors},
  volume       = {22},
  number       = {17},
  pages        = {6527},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22176527},
  doi          = {10.3390/S22176527},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SuciuFBPSVVMBMX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TseliosPX22,
  author       = {Christos Tselios and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {Improving Network, Data and Application Security for SMEs},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {95:1--95:8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544426},
  doi          = {10.1145/3538969.3544426},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TseliosPX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BolgourasAPX22,
  author       = {Vaios Bolgouras and
                  Anna Angelogianni and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {Trusted and Secure Self-Sovereign Identity framework},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {101:1--101:6},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544436},
  doi          = {10.1145/3538969.3544436},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BolgourasAPX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/VoudourisPX22,
  author       = {Anastassios Voudouris and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {Secret sharing a key in a distributed way, Lagrange vs Newton},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {105:1--105:7},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544424},
  doi          = {10.1145/3538969.3544424},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/VoudourisPX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AhmedPXP22,
  author       = {Mohamed Ahmed and
                  Sakshyam Panda and
                  Christos Xenakis and
                  Emmanouil Panaousis},
  title        = {{MITRE} ATT{\&}CK-driven Cyber Risk Assessment},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {107:1--107:10},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544420},
  doi          = {10.1145/3538969.3544420},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AhmedPXP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KalderemidisFBP22,
  author       = {Ioannis Kalderemidis and
                  Aristeidis Farao and
                  Panagiotis Bountakas and
                  Sakshyam Panda and
                  Christos Xenakis},
  title        = {{GTM:} Game Theoretic Methodology for optimal cybersecurity defending
                  strategies and investments},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {120:1--120:9},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544431},
  doi          = {10.1145/3538969.3544431},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KalderemidisFBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/giots/LouposKNSTPSBGL22,
  author       = {Konstantinos Loupos and
                  Christos Kalogirou and
                  Harris Niavis and
                  Antonio F. Skarmeta and
                  Elena Torroglosa{-}Garc{\'{\i}}a and
                  Angel Palomares and
                  Hui Song and
                  Paul{-}Emmanuel Brun and
                  Francesca Giampaolo and
                  Dimitri Van Landuyt and
                  Sam Michiels and
                  Blaz Podgorelec and
                  Christos Xenakis and
                  Michail Bampatsikos and
                  Konstantinos Krilakis},
  editor       = {Aurora Gonz{\'{a}}lez{-}Vidal and
                  Ahmed Mohamed Abdelgawad and
                  Essaid Sabir and
                  S{\'{e}}bastien Ziegler and
                  Latif Ladid},
  title        = {A Holistic Approach for IoT Networks' Identity and Trust Management
                  - The {ERATOSTHENES} Project},
  booktitle    = {Internet of Things - 5th The Global IoT Summit, GIoTS 2022, Dublin,
                  Ireland, June 20-23, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13533},
  pages        = {338--347},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20936-9\_27},
  doi          = {10.1007/978-3-031-20936-9\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/giots/LouposKNSTPSBGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccomm/KaratisoglouFBX22,
  author       = {Marios Karatisoglou and
                  Aristeidis Farao and
                  Vaios Bolgouras and
                  Christos Xenakis},
  title        = {{BRIDGE:} BRIDGing the gap bEtween {CTI} production and consumption},
  booktitle    = {14th International Conference on Communications, {COMM} 2022, Bucharest,
                  Romania, June 16-18, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMM54429.2022.9817359},
  doi          = {10.1109/COMM54429.2022.9817359},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccomm/KaratisoglouFBX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssdbm/BellasKNGVXP22,
  author       = {Christos Bellas and
                  Georgia Kougka and
                  Athanasios Naskos and
                  Anastasios Gounaris and
                  Athena Vakali and
                  Christos Xenakis and
                  Apostolos Papadopoulos},
  editor       = {Elaheh Pourabbas and
                  Yongluan Zhou and
                  Yuchen Li and
                  Bin Yang},
  title        = {Facilitating DoS Attack Detection using Unsupervised Anomaly Detection},
  booktitle    = {{SSDBM} 2022: 34th International Conference on Scientific and Statistical
                  Database Management, Copenhagen, Denmark, July 6 - 8, 2022},
  pages        = {24:1--24:4},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538712.3538736},
  doi          = {10.1145/3538712.3538736},
  timestamp    = {Thu, 25 Aug 2022 15:02:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ssdbm/BellasKNGVXP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/RebecchiPMLBACG22,
  author       = {Filippo Rebecchi and
                  Antonio Pastor and
                  Alberto Mozo and
                  Chiara Lombardo and
                  Roberto Bruschi and
                  Ilias Aliferis and
                  Roberto Doriguzzi Corin and
                  Panagiotis Gouvas and
                  Antonio {\'{A}}lvarez Romero and
                  Anna Angelogianni and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {A Digital Twin for the 5G Era: the {SPIDER} Cyber Range},
  booktitle    = {23rd {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, WoWMoM 2022, Belfast, United Kingdom, June
                  14-17, 2022},
  pages        = {567--572},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WoWMoM54355.2022.00088},
  doi          = {10.1109/WOWMOM54355.2022.00088},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/RebecchiPMLBACG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XenakisTKXP21,
  author       = {Dionysis Xenakis and
                  Anastasia Tsiota and
                  Christos{-}Thrasyvoulos Koulis and
                  Christos Xenakis and
                  Nikos I. Passas},
  title        = {Contract-Less Mobile Data Access Beyond 5G: Fully-Decentralized, High-Throughput
                  and Anonymous Asset Trading Over the Blockchain},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {73963--74016},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3079625},
  doi          = {10.1109/ACCESS.2021.3079625},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XenakisTKXP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/MunozFCX21,
  author       = {Antonio Mu{\~{n}}oz and
                  Aristeidis Farao and
                  Jordy Ryan Casas Correia and
                  Christos Xenakis},
  title        = {{P2ISE:} Preserving Project Integrity in {CI/CD} Based on Secure Elements},
  journal      = {Inf.},
  volume       = {12},
  number       = {9},
  pages        = {357},
  year         = {2021},
  url          = {https://doi.org/10.3390/info12090357},
  doi          = {10.3390/INFO12090357},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/MunozFCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NtantogianBAPX21,
  author       = {Christoforos Ntantogian and
                  Panagiotis Bountakas and
                  Dimitris Antonaropoulos and
                  Constantinos Patsakis and
                  Christos Xenakis},
  title        = {NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection
                  and eXPloitation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102752},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102752},
  doi          = {10.1016/J.JISA.2021.102752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NtantogianBAPX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Koutroumpouchos21,
  author       = {Nikolaos Koutroumpouchos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Building Trust for Smart Connected Devices: The Challenges and Pitfalls
                  of TrustZone},
  journal      = {Sensors},
  volume       = {21},
  number       = {2},
  pages        = {520},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21020520},
  doi          = {10.3390/S21020520},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/Koutroumpouchos21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FaraoVNX21,
  author       = {Aristeidis Farao and
                  Eleni Veroni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {P4G2Go: {A} Privacy-Preserving Scheme for Roaming Energy Consumers
                  of the Smart Grid-to-Go},
  journal      = {Sensors},
  volume       = {21},
  number       = {8},
  pages        = {2686},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21082686},
  doi          = {10.3390/S21082686},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FaraoVNX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SuciuSVVFKX21,
  author       = {George Suciu and
                  Mari{-}Anais Sachian and
                  Alexandru Vulpe and
                  Marius{-}Constantin Vochin and
                  Aristeidis Farao and
                  Nikolaos Koutroumpouchos and
                  Christos Xenakis},
  title        = {SealedGRID: Secure and Interoperable Platform for Smart {GRID} Applications},
  journal      = {Sensors},
  volume       = {21},
  number       = {16},
  pages        = {5448},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21165448},
  doi          = {10.3390/S21165448},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SuciuSVVFKX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GranadilloMPRNO21,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Sofia{-}Anna Menesidou and
                  Dimitrios Papamartzivanos and
                  Ramon Romeu and
                  Diana Navarro{-}Llobet and
                  Caxton Okoh and
                  Sokratis Nifakos and
                  Christos Xenakis and
                  Emmanouil Panaousis},
  title        = {Automated Cyber and Privacy Risk Management Toolkit},
  journal      = {Sensors},
  volume       = {21},
  number       = {16},
  pages        = {5493},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21165493},
  doi          = {10.3390/S21165493},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GranadilloMPRNO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GrammatopoulosP21,
  author       = {Athanasios Vasileios Grammatopoulos and
                  Ilias Politis and
                  Christos Xenakis},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {A web tool for analyzing FIDO2/WebAuthn Requests and Responses},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {125:1--125:10},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3469209},
  doi          = {10.1145/3465481.3469209},
  timestamp    = {Tue, 17 Aug 2021 14:54:34 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GrammatopoulosP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BountakasKX21,
  author       = {Panagiotis Bountakas and
                  Konstantinos Koutroumpouchos and
                  Christos Xenakis},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {A Comparison of Natural Language Processing and Machine Learning Methods
                  for Phishing Email Detection},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {127:1--127:12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3469205},
  doi          = {10.1145/3465481.3469205},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BountakasKX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BampatsikosPXT21,
  author       = {Michail Bampatsikos and
                  Ilias Politis and
                  Christos Xenakis and
                  Stelios C. A. Thomopoulos},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Solving the cold start problem in Trust Management in IoT},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {128:1--128:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3469208},
  doi          = {10.1145/3465481.3469208},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BampatsikosPXT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/AngelogianniPPP21,
  author       = {Anna Angelogianni and
                  Ilias Politis and
                  Pier Luigi Polvanesi and
                  Antonio Pastor and
                  Christos Xenakis},
  title        = {Unveiling the user requirements of a cyber range for 5G security testing
                  and training},
  booktitle    = {26th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks, {CAMAD} 2021, Porto, Portugal,
                  October 25-27, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CAMAD52502.2021.9617776},
  doi          = {10.1109/CAMAD52502.2021.9617776},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/camad/AngelogianniPPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/GranadilloDVX21,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Rodrigo Diaz and
                  Eleni Veroni and
                  Christos Xenakis},
  editor       = {Alessandro Armando and
                  Michele Colajanni},
  title        = {A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities
                  affecting Healthcare Organizations},
  booktitle    = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021,
                  All Digital Event, April 7-9, 2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2940},
  pages        = {47--60},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2940/paper5.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/GranadilloDVX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-04142,
  author       = {Ilias Politis and
                  Christos Xenakis and
                  Adarbad Master and
                  John Polley},
  title        = {On an innovative architecture for digital immunity passports and vaccination
                  certificates},
  journal      = {CoRR},
  volume       = {abs/2103.04142},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.04142},
  eprinttype    = {arXiv},
  eprint       = {2103.04142},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-04142.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-00577,
  author       = {Anna Angelogianni and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {How many {FIDO} protocols are needed? Surveying the design, security
                  and market perspectives},
  journal      = {CoRR},
  volume       = {abs/2107.00577},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.00577},
  eprinttype    = {arXiv},
  eprint       = {2107.00577},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-00577.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AngelogianniPMX20,
  author       = {Anna Angelogianni and
                  Ilias Politis and
                  Farnaz Mohammadi and
                  Christos Xenakis},
  title        = {On Identifying Threats and Quantifying Cybersecurity Risks of Mnos
                  Deploying Heterogeneous Rats},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {224677--224701},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3045322},
  doi          = {10.1109/ACCESS.2020.3045322},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AngelogianniPMX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JonesJMX20,
  author       = {Kevin I. Jones and
                  Helge Janicke and
                  Leandros A. Maglaras and
                  Christos Xenakis},
  title        = {Introduction to the special issue of the journal of information security
                  and applications on" cyber security in {ICS} {\&} {SCADA}
                  systems"},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102542},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102542},
  doi          = {10.1016/J.JISA.2020.102542},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JonesJMX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PapadamouGXSZCT20,
  author       = {Kostantinos Papadamou and
                  Steven Gevers and
                  Christos Xenakis and
                  Michael Sirivianos and
                  Savvas Zannettou and
                  Bogdan Chifor and
                  Sorin Teican and
                  George Gugulea and
                  Alberto Caponi and
                  Annamaria Recupero and
                  Claudio Pisa and
                  Giuseppe Bianchi},
  title        = {Killing the Password and Preserving Privacy With Device-Centric and
                  Attribute-Based Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2183--2193},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2958763},
  doi          = {10.1109/TIFS.2019.2958763},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PapadamouGXSZCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/BolgourasNPX20,
  author       = {Vaios Bolgouras and
                  Christoforos Ntantogian and
                  Emmanouil Panaousis and
                  Christos Xenakis},
  title        = {Distributed Key Management in Microgrids},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {3},
  pages        = {2125--2133},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2941586},
  doi          = {10.1109/TII.2019.2941586},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/BolgourasNPX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/educon/XenakisXPK20,
  author       = {Apostolos Xenakis and
                  Christos Xenakis and
                  Sarantos Psycharis and
                  Konstantinos Kalovrektis},
  title        = {Calculation of the Hubble Universe Expansion Constant by Analyzing
                  Observational Data: An Exploratory Teaching Proposal based on {STEM}
                  Epistemology},
  booktitle    = {2020 {IEEE} Global Engineering Education Conference, {EDUCON} 2020,
                  Porto, Portugal, April 27-30, 2020},
  pages        = {170--177},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EDUCON45650.2020.9125209},
  doi          = {10.1109/EDUCON45650.2020.9125209},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/educon/XenakisXPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MunozFCX20,
  author       = {Antonio Mu{\~{n}}oz and
                  Aristeidis Farao and
                  Jordy Ryan Casas Correia and
                  Christos Xenakis},
  editor       = {Ioana Boureanu and
                  Constantin Catalin Dragan and
                  Mark Manulis and
                  Thanassis Giannetsos and
                  Christoforos Dadoyan and
                  Panagiotis Gouvas and
                  Roger A. Hallman and
                  Shujun Li and
                  Victor Chang and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse},
  title        = {{ICITPM:} Integrity Validation of Software in Iterative Continuous
                  Integration Through the Use of Trusted Platform Module {(TPM)}},
  booktitle    = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS,
                  DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12580},
  pages        = {147--165},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66504-3\_9},
  doi          = {10.1007/978-3-030-66504-3\_9},
  timestamp    = {Sun, 10 Dec 2023 06:07:27 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MunozFCX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/giots/SuciuISVVFX20,
  author       = {George Suciu and
                  Cristiana Istrate and
                  Mari{-}Anais Sachian and
                  Alexandru Vulpe and
                  Marius{-}Constantin Vochin and
                  Aristeidis Farao and
                  Christos Xenakis},
  title        = {{FI-WARE} authorization in a Smart Grid scenario},
  booktitle    = {2020 Global Internet of Things Summit, GIoTS 2020, Dublin, Ireland,
                  June 3, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GIOTS49054.2020.9119589},
  doi          = {10.1109/GIOTS49054.2020.9119589},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/giots/SuciuISVVFX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/FaraoPMVEKMGSSL20,
  author       = {Aristeidis Farao and
                  Sakshyam Panda and
                  Sofia{-}Anna Menesidou and
                  Entso Veliou and
                  Nikolaos Episkopos and
                  George Kalatzantonakis and
                  Farnaz Mohammadi and
                  Nikolaos Georgopoulos and
                  Michael Sirivianos and
                  Nikos Salamanos and
                  Spyros Loizou and
                  Michalis Pingos and
                  John Polley and
                  Andrew Fielder and
                  Emmanouil Panaousis and
                  Christos Xenakis},
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {{SECONDO:} {A} Platform for Cybersecurity Investments and Cyber Insurance
                  Decisions},
  booktitle    = {Trust, Privacy and Security in Digital Business - 17th International
                  Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12395},
  pages        = {65--74},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58986-8\_5},
  doi          = {10.1007/978-3-030-58986-8\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/FaraoPMVEKMGSSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/NtantogianVKX19,
  author       = {Christoforos Ntantogian and
                  Eleni Veroni and
                  Georgios Karopoulos and
                  Christos Xenakis},
  title        = {A survey of voice and communication protection solutions against wiretapping},
  journal      = {Comput. Electr. Eng.},
  volume       = {77},
  pages        = {163--178},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compeleceng.2019.05.008},
  doi          = {10.1016/J.COMPELECENG.2019.05.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/NtantogianVKX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianMX19,
  author       = {Christoforos Ntantogian and
                  Stefanos Malliaros and
                  Christos Xenakis},
  title        = {Evaluation of password hashing schemes in open source web platforms},
  journal      = {Comput. Secur.},
  volume       = {84},
  pages        = {206--224},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.03.011},
  doi          = {10.1016/J.COSE.2019.03.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianMX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/NtantogianPKX19,
  author       = {Christoforos Ntantogian and
                  Georgios Poulios and
                  Georgios Karopoulos and
                  Christos Xenakis},
  title        = {Transforming malicious code to {ROP} gadgets for antivirus evasion},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {570--578},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5386},
  doi          = {10.1049/IET-IFS.2018.5386},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/NtantogianPKX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/StasinopoulosNX19,
  author       = {Anastasios Stasinopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Commix: automating evaluation and exploitation of command injection
                  vulnerabilities in Web applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {18},
  number       = {1},
  pages        = {49--72},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10207-018-0399-z},
  doi          = {10.1007/S10207-018-0399-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/StasinopoulosNX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/FaraoRANX019,
  author       = {Aristeidis Farao and
                  Juan Enrique Rubio and
                  Cristina Alcaraz and
                  Christoforos Ntantogian and
                  Christos Xenakis and
                  Javier L{\'{o}}pez},
  editor       = {Simin Nadjm{-}Tehrani},
  title        = {SealedGRID: {A} Secure Interconnection of Technologies for Smart Grid
                  Applications},
  booktitle    = {Critical Information Infrastructures Security - 14th International
                  Conference, {CRITIS} 2019, Link{\"{o}}ping, Sweden, September
                  23-25, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11777},
  pages        = {169--175},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37670-3\_14},
  doi          = {10.1007/978-3-030-37670-3\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/FaraoRANX019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/Koutroumpouchos19,
  author       = {Nikos Koutroumpouchos and
                  Christoforos Ntantogian and
                  Sofia{-}Anna Menesidou and
                  Kaitai Liang and
                  Panagiotis Gouvas and
                  Christos Xenakis and
                  Thanassis Giannetsos},
  editor       = {Christian Jacquenet and
                  Filip De Turck and
                  Prosper Chemouil and
                  Flavio Esposito and
                  Olivier Festor and
                  Walter Cerroni and
                  Stefano Secci},
  title        = {Secure Edge Computing with Lightweight Control-Flow Property-based
                  Attestation},
  booktitle    = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris,
                  France, June 24-28, 2019},
  pages        = {84--92},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NETSOFT.2019.8806658},
  doi          = {10.1109/NETSOFT.2019.8806658},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsoft/Koutroumpouchos19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/Koutroumpouchos19,
  author       = {Nikolaos Koutroumpouchos and
                  Georgios Lavdanis and
                  Eleni Veroni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Yannis Manolopoulos and
                  George Angelos Papadopoulos and
                  Athena Stassopoulou and
                  Ioanna Dionysiou and
                  Ioannis Kyriakides and
                  Nicolas Tsapatsoulis},
  title        = {ObjectMap: detecting insecure object deserialization},
  booktitle    = {Proceedings of the 23rd Pan-Hellenic Conference on Informatics, {PCI}
                  2019, Nicosia, Cyprus, November 28-30, 2019},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368640.3368680},
  doi          = {10.1145/3368640.3368680},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/Koutroumpouchos19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/BampatsikosNXT19,
  author       = {Michail Bampatsikos and
                  Christoforos Ntantogian and
                  Christos Xenakis and
                  Stelios C. A. Thomopoulos},
  editor       = {Payam M. Barnaghi and
                  Georg Gottlob and
                  Dimitrios Katsaros and
                  Yannis Manolopoulos and
                  Rahul Pandey and
                  Theodoros Tzouramanis and
                  Athena Vakali},
  title        = {{BARRETT} BlockchAin Regulated REmote aTTestation},
  booktitle    = {2019 {IEEE/WIC/ACM} International Conference on Web Intelligence,
                  {WI} 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume},
  pages        = {256--262},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3358695.3361752},
  doi          = {10.1145/3358695.3361752},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/webi/BampatsikosNXT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/MohammadiPNKPX19,
  author       = {Farnaz Mohammadi and
                  Angeliki Panou and
                  Christoforos Ntantogian and
                  Eirini D. Karapistoli and
                  Emmanouil Panaousis and
                  Christos Xenakis},
  editor       = {Payam M. Barnaghi and
                  Georg Gottlob and
                  Dimitrios Katsaros and
                  Yannis Manolopoulos and
                  Rahul Pandey and
                  Theodoros Tzouramanis and
                  Athena Vakali},
  title        = {{CUREX:} seCUre and pRivate hEalth data eXchange},
  booktitle    = {2019 {IEEE/WIC/ACM} International Conference on Web Intelligence,
                  {WI} 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume},
  pages        = {263--268},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3358695.3361753},
  doi          = {10.1145/3358695.3361753},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/webi/MohammadiPNKPX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KaropoulosNX18,
  author       = {Georgios Karopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {{MASKER:} Masking for privacy-preserving aggregation in the smart
                  grid ecosystem},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {307--325},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.008},
  doi          = {10.1016/J.COSE.2017.11.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KaropoulosNX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/KitsakiANX18,
  author       = {Theodoula{-}Ioanna Kitsaki and
                  Anna Angelogianni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Nikitas N. Karanikolas and
                  Basilis Mamalis and
                  John Kontos and
                  Grammati E. Pantziou and
                  Stefanos Gritzalis and
                  Christos Douligeris},
  title        = {A forensic investigation of Android mobile applications},
  booktitle    = {Proceedings of the 22nd Pan-Hellenic Conference on Informatics, {PCI}
                  2018, Athens, Greece, November 29 - December 01, 2018},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3291533.3291573},
  doi          = {10.1145/3291533.3291573},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/KitsakiANX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-08360,
  author       = {Kostantinos Papadamou and
                  Savvas Zannettou and
                  Giuseppe Bianchi and
                  Alberto Caponi and
                  Annamaria Recupero and
                  Steven Gevers and
                  George Gugulea and
                  Sorin Teican and
                  Bogdan Chifor and
                  Christos Xenakis and
                  Michael Sirivianos},
  title        = {Killing the Password and Preserving Privacy with Device-Centric and
                  Attribute-based Authentication},
  journal      = {CoRR},
  volume       = {abs/1811.08360},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.08360},
  eprinttype    = {arXiv},
  eprint       = {1811.08360},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-08360.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PanosNMX17,
  author       = {Christoforos Panos and
                  Christoforos Ntantogian and
                  Stefanos Malliaros and
                  Christos Xenakis},
  title        = {Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less
                  networks},
  journal      = {Comput. Networks},
  volume       = {113},
  pages        = {94--110},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2016.12.006},
  doi          = {10.1016/J.COMNET.2016.12.006},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PanosNMX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/KaropoulosXTE17,
  author       = {Georgios Karopoulos and
                  Christos Xenakis and
                  Stefano Tennina and
                  Stefanos Evangelopoulos},
  title        = {Towards trusted metering in the smart grid},
  booktitle    = {22nd {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks, {CAMAD} 2017, Lund, Sweden,
                  June 19-21, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CAMAD.2017.8031643},
  doi          = {10.1109/CAMAD.2017.8031643},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/KaropoulosXTE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/PanouNX17,
  author       = {Angeliki Panou and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Vasileios Vlachos and
                  Ilias K. Savvas and
                  Cleo Sgouropoulou and
                  Vassilis P. Plagianakos and
                  Christos Douligeris and
                  Ioannis Voyiatzis and
                  Vassilis Tampakas and
                  George Soultis},
  title        = {RiSKi: {A} Framework for Modeling Cyber Threats to Estimate Risk for
                  Data Breach Insurance},
  booktitle    = {Proceedings of the 21st Pan-Hellenic Conference on Informatics, Larissa,
                  Greece, September 28-30, 2017},
  pages        = {32:1--32:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139367.3139426},
  doi          = {10.1145/3139367.3139426},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/PanouNX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tiwdc/PanosMNPX17,
  author       = {Christoforos Panos and
                  Stefanos Malliaros and
                  Christoforos Ntantogian and
                  Angeliki Panou and
                  Christos Xenakis},
  editor       = {Alessandro Piva and
                  Ilenia Tinnirello and
                  Simone Morosi},
  title        = {A Security Evaluation of FIDO's {UAF} Protocol in Mobile and Embedded
                  Devices},
  booktitle    = {Digital Communication. Towards a Smart and Secure Future Internet
                  - 28th International Tyrrhenian Workshop, {TIWDC} 2017, Palermo, Italy,
                  September 18-20, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {766},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67639-5\_11},
  doi          = {10.1007/978-3-319-67639-5\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tiwdc/PanosMNPX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XenakisNP16,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian and
                  Orestis Panos},
  title        = {(U)SimMonitor: {A} mobile application for security evaluation of cellular
                  networks},
  journal      = {Comput. Secur.},
  volume       = {60},
  pages        = {62--78},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.03.005},
  doi          = {10.1016/J.COSE.2016.03.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XenakisNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Chatzikonstantinou16,
  author       = {Alexia Chatzikonstantinou and
                  Christoforos Ntantogian and
                  Georgios Karopoulos and
                  Christos Xenakis},
  title        = {Evaluation of Cryptography Usage in Android Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e4},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262471},
  doi          = {10.4108/EAI.3-12-2015.2262471},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Chatzikonstantinou16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MalliarosNX16,
  author       = {Stefanos Malliaros and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Protecting Sensitive Information in the Volatile Memory from Disclosure
                  Attacks},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {687--693},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.75},
  doi          = {10.1109/ARES.2016.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MalliarosNX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianMX15,
  author       = {Christoforos Ntantogian and
                  Stefanos Malliaros and
                  Christos Xenakis},
  title        = {Gaithashing: {A} two-factor authentication scheme based on gait features},
  journal      = {Comput. Secur.},
  volume       = {52},
  pages        = {17--32},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.03.009},
  doi          = {10.1016/J.COSE.2015.03.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianMX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/DemertzisKXC15,
  author       = {Foivos F. Demertzis and
                  Georgios Karopoulos and
                  Christos Xenakis and
                  Andrea Colarieti},
  editor       = {Symeon Papavassiliou and
                  Stefan Ruehrup},
  title        = {Self-organised Key Management for the Smart Grid},
  booktitle    = {Ad-hoc, Mobile, and Wireless Networks - 14th International Conference,
                  {ADHOC-NOW} 2015, Athens, Greece, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9143},
  pages        = {303--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19662-6\_21},
  doi          = {10.1007/978-3-319-19662-6\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/DemertzisKXC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bionetics/Chatzikonstantinou15,
  author       = {Alexia Chatzikonstantinou and
                  Christoforos Ntantogian and
                  Georgios Karopoulos and
                  Christos Xenakis},
  editor       = {Junichi Suzuki and
                  Tadashi Nakano and
                  Henry Hess},
  title        = {Evaluation of Cryptography Usage in Android Applications},
  booktitle    = {{BICT} 2015, Proceedings of the 9th {EAI} International Conference
                  on Bio-inspired Information and Communications Technologies (formerly
                  BIONETICS), New York City, United States, December 3-5, 2015},
  pages        = {83--90},
  publisher    = {{ICST/ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2954820},
  timestamp    = {Fri, 03 Feb 2017 18:36:35 +0100},
  biburl       = {https://dblp.org/rec/conf/bionetics/Chatzikonstantinou15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/XenakisN15,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian},
  editor       = {Markus Maybaum and
                  Anna{-}Maria Osula and
                  Lauri Lindstr{\"{o}}m},
  title        = {Attacking the baseband modem of mobile phones to breach the users'
                  privacy and network security},
  booktitle    = {7th International Conference on Cyber Conflict: Architectures in Cyberspace,
                  CyCon 2015, Tallinn, Estonia, May 26-29, 2015},
  pages        = {231--244},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CYCON.2015.7158480},
  doi          = {10.1109/CYCON.2015.7158480},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/XenakisN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/NtantogianVKLKX15,
  author       = {Christoforos Ntantogian and
                  Grigoris Valtas and
                  Nikos Kapetanakis and
                  Faidon Lalagiannis and
                  Georgios Karopoulos and
                  Christos Xenakis},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {Attacking {GSM} Networks as a Script Kiddie Using Commodity Hardware
                  and Software},
  booktitle    = {Trust, Privacy and Security in Digital Business - 12th International
                  Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9264},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22906-5\_6},
  doi          = {10.1007/978-3-319-22906-5\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/NtantogianVKLKX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PanosXKS14,
  author       = {Christoforos Panos and
                  Christos Xenakis and
                  Platon Kotzias and
                  Ioannis Stavrakakis},
  title        = {A specification-based intrusion detection engine for infrastructure-less
                  networks},
  journal      = {Comput. Commun.},
  volume       = {54},
  pages        = {67--83},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comcom.2014.08.002},
  doi          = {10.1016/J.COMCOM.2014.08.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/PanosXKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XenakisN14,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian},
  title        = {An advanced persistent threat in 3G networks: Attacking the home network
                  from roaming networks},
  journal      = {Comput. Secur.},
  volume       = {40},
  pages        = {84--94},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.11.006},
  doi          = {10.1016/J.COSE.2013.11.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XenakisN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianAMX14,
  author       = {Christoforos Ntantogian and
                  Dimitris Apostolopoulos and
                  Giannis Marinakis and
                  Christos Xenakis},
  title        = {Evaluating the privacy of Android mobile applications under forensic
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {66--76},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.004},
  doi          = {10.1016/J.COSE.2014.01.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianAMX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/StasinopoulosNX14,
  author       = {Anastasios Stasinopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Bypassing {XSS} Auditor: Taking advantage of badly written {PHP} code},
  booktitle    = {2014 {IEEE} International Symposium on Signal Processing and Information
                  Technology, {ISSPIT} 2014, Noida, India, December 15-17, 2014},
  pages        = {290--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSPIT.2014.7300602},
  doi          = {10.1109/ISSPIT.2014.7300602},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/StasinopoulosNX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/DemertzisX13,
  author       = {Foivos F. Demertzis and
                  Christos Xenakis},
  title        = {{SOMA-E:} Self-organized mesh authentication - Extended},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {7-8},
  pages        = {1606--1616},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.06.009},
  doi          = {10.1016/J.MCM.2012.06.009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcm/DemertzisX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/ApostolopoulosMNX13,
  author       = {Dimitris Apostolopoulos and
                  Giannis Marinakis and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Christos Douligeris and
                  Nineta Polemi and
                  Athanasios Karantjias and
                  Winfried Lamersdorf},
  title        = {Discovering Authentication Credentials in Volatile Memory of Android
                  Mobile Devices},
  booktitle    = {Collaborative, Trusted and Privacy-Aware e/m-Services - 12th {IFIP}
                  {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E}
                  2013, Athens, Greece, April 25-26, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {399},
  pages        = {178--185},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37437-1\_15},
  doi          = {10.1007/978-3-642-37437-1\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/ApostolopoulosMNX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/StasinopoulosNX13,
  author       = {Anastasios Stasinopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {The weakest link on the network: Exploiting {ADSL} routers to perform
                  cyber-attacks},
  booktitle    = {{IEEE} International Symposium on Signal Processing and Information
                  Technology, Athens, Greece, December 12-15, 2013},
  pages        = {135--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSPIT.2013.6781868},
  doi          = {10.1109/ISSPIT.2013.6781868},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/StasinopoulosNX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PetrouNX13,
  author       = {Charalampos Petrou and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {A Better Time Approximation Scheme for e-Passports},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 10th International
                  Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8058},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40343-9\_2},
  doi          = {10.1007/978-3-642-40343-9\_2},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/PetrouNX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/NtantogianX12,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Questioning the Feasibility of {UMTS-GSM} Interworking Attacks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {65},
  number       = {1},
  pages        = {157--163},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11277-011-0233-7},
  doi          = {10.1007/S11277-011-0233-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/NtantogianX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/TsolkasPXPT12,
  author       = {Dimitris Tsolkas and
                  Nikos I. Passas and
                  Christos Xenakis and
                  Vassilis Papataxiarhis and
                  Vassileios Tsetsos},
  title        = {Busfinder: {A} Personalized Multimodal Transportation Guide with Dynamic
                  Routing},
  booktitle    = {16th Panhellenic Conference on Informatics, {PCI} 2012, Piraeus, Greece,
                  October 5-7, 2012},
  pages        = {25--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PCi.2012.19},
  doi          = {10.1109/PCI.2012.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/TsolkasPXPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NtantogianXS12,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated
                  Networks},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {475--488},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_39},
  doi          = {10.1007/978-3-642-30436-1\_39},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NtantogianXS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wons/PanosKXS12,
  author       = {Christoforos Panos and
                  Platon Kotzias and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  title        = {Securing the 802.11 {MAC} in MANETs: {A} specification-based intrusion
                  detection engine},
  booktitle    = {9th Annual Conference on Wireless On-demand Network Systems and Services,
                  {WONS} 2012, Courmayeur, Italy, January 9-11, 2012},
  pages        = {16--22},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WONS.2012.6152225},
  doi          = {10.1109/WONS.2012.6152225},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wons/PanosKXS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XenakisPS11,
  author       = {Christos Xenakis and
                  Christoforos Panos and
                  Ioannis Stavrakakis},
  title        = {A comparative evaluation of intrusion detection architectures for
                  mobile ad hoc networks},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {63--80},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2010.10.008},
  doi          = {10.1016/J.COSE.2010.10.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XenakisPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/NtantogianXS11,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  title        = {Reducing False Synchronizations in 3G-WLAN Integrated Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {10},
  number       = {11},
  pages        = {3765--3773},
  year         = {2011},
  url          = {https://doi.org/10.1109/TWC.2011.080611.101824},
  doi          = {10.1109/TWC.2011.080611.101824},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/NtantogianXS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/DarraNXK11,
  author       = {Eleni Darra and
                  Christoforos Ntantogian and
                  Christos Xenakis and
                  Sokratis K. Katsikas},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {A Mobility and Energy-Aware Hierarchical Intrusion Detection System
                  for Mobile Ad Hoc Networks},
  booktitle    = {Trust, Privacy and Security in Digital Business - 8th International
                  Conference, TrustBus 2011, Toulouse, France, August 29 - September
                  2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6863},
  pages        = {138--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22890-2\_12},
  doi          = {10.1007/978-3-642-22890-2\_12},
  timestamp    = {Mon, 03 Jan 2022 22:15:13 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/DarraNXK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PanosXS11,
  author       = {Christoforos Panos and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile
                  Ad Hoc Networks},
  booktitle    = {Trust, Privacy and Security in Digital Business - 8th International
                  Conference, TrustBus 2011, Toulouse, France, August 29 - September
                  2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6863},
  pages        = {150--160},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22890-2\_13},
  doi          = {10.1007/978-3-642-22890-2\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/PanosXS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/critis/2010,
  editor       = {Christos Xenakis and
                  Stephen D. Wolthusen},
  title        = {Critical Information Infrastructures Security - 5th International
                  Workshop, {CRITIS} 2010, Athens, Greece, September 23-24, 2010. Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6712},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21694-7},
  doi          = {10.1007/978-3-642-21694-7},
  isbn         = {978-3-642-21693-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianXS10,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  title        = {A generic mechanism for efficient authentication in {B3G} networks},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {460--475},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.001},
  doi          = {10.1016/J.COSE.2009.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/VavoulasX10,
  author       = {Nikos Vavoulas and
                  Christos Xenakis},
  editor       = {Christos Xenakis and
                  Stephen D. Wolthusen},
  title        = {A Quantitative Risk Analysis Approach for Deliberate Threats},
  booktitle    = {Critical Information Infrastructures Security - 5th International
                  Workshop, {CRITIS} 2010, Athens, Greece, September 23-24, 2010. Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6712},
  pages        = {13--25},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21694-7\_2},
  doi          = {10.1007/978-3-642-21694-7\_2},
  timestamp    = {Thu, 14 Oct 2021 09:58:37 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/VavoulasX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/DemertzisX10,
  author       = {Foivos F. Demertzis and
                  Christos Xenakis},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {{SOMA:} Self-Organised Mesh Authentication},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {31--44},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_3},
  doi          = {10.1007/978-3-642-22633-5\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/DemertzisX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PanosXS10,
  author       = {Christoforos Panos and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {A Novel Intrusion Detection System for MANETs},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {25--34},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PanosXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/NtantogianX09,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {One-Pass {EAP-AKA} Authentication in 3G-WLAN Integrated Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {48},
  number       = {4},
  pages        = {569--584},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11277-008-9548-4},
  doi          = {10.1007/S11277-008-9548-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/NtantogianX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/XenakisNS08,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian and
                  Ioannis Stavrakakis},
  title        = {A network-assisted mobile {VPN} for securing users data in {UMTS}},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {14},
  pages        = {3315--3327},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2008.05.018},
  doi          = {10.1016/J.COMCOM.2008.05.018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/XenakisNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Xenakis08,
  author       = {Christos Xenakis},
  title        = {Security Measures and Weaknesses of the {GPRS} Security Architecture},
  journal      = {Int. J. Netw. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {158--169},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n2/ijns-2008-v6-n2-p158-169.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Xenakis08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/XenakisAPS08,
  author       = {Christos Xenakis and
                  Danae Apostolopoulou and
                  Angeliki Panou and
                  Ioannis Stavrakakis},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {A Qualitative Risk Analysis for the {GPRS} Technology},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.123},
  doi          = {10.1109/EUC.2008.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/XenakisAPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iswpc/ZtoupisZSX08,
  author       = {D. Ztoupis and
                  K. Zarifis and
                  Ioannis Stavrakakis and
                  Christos Xenakis},
  title        = {Towards a security framework for an established autonomous network},
  booktitle    = {Third International Symposium on Wireless Pervasive Computing, {ISWPC}
                  2008, May 7-9, 2008, Santorini, Greece, Proceedings},
  pages        = {749--754},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISWPC.2008.4556310},
  doi          = {10.1109/ISWPC.2008.4556310},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iswpc/ZtoupisZSX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/XenakisN07,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian},
  title        = {Security architectures for {B3G} mobile networks},
  journal      = {Telecommun. Syst.},
  volume       = {35},
  number       = {3-4},
  pages        = {123--139},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11235-007-9044-2},
  doi          = {10.1007/S11235-007-9044-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/XenakisN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bionetics/NtantogianXS07,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  editor       = {Falko Dressler},
  title        = {Efficient Authentication for Users Autonomy in Next Generation All-IP
                  Networks},
  booktitle    = {2nd International {ICST} Conference on Bio-Inspired Models of Network,
                  Information, and Computing Systems, {BIONETICS} 2007, Budapest, Hungary,
                  December 10-13, 2007},
  pages        = {295--300},
  publisher    = {{ICST} / {IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.4108/ICST.BIONETICS2007.2372},
  doi          = {10.4108/ICST.BIONETICS2007.2372},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bionetics/NtantogianXS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/NtantogianX07,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {A Security Protocol for Mutual Authentication and Mobile {VPN} Deployment
                  in {B3G} Networks},
  booktitle    = {Proceedings of the {IEEE} 18th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
                  2007, Athens, Greece},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/PIMRC.2007.4394363},
  doi          = {10.1109/PIMRC.2007.4394363},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/NtantogianX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/NtantogianX07a,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Reducing Authentication Traffic in 3G-WLAN Integrated Networks},
  booktitle    = {Proceedings of the {IEEE} 18th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
                  2007, Athens, Greece},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/PIMRC.2007.4394508},
  doi          = {10.1109/PIMRC.2007.4394508},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/NtantogianX07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/XenakisLMS06,
  author       = {Christos Xenakis and
                  Nikolaos Laoutaris and
                  Lazaros F. Merakos and
                  Ioannis Stavrakakis},
  title        = {A generic characterization of the overheads imposed by IPsec and associated
                  cryptographic algorithms},
  journal      = {Comput. Networks},
  volume       = {50},
  number       = {17},
  pages        = {3225--3241},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comnet.2005.12.005},
  doi          = {10.1016/J.COMNET.2005.12.005},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/XenakisLMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Xenakis06,
  author       = {Christos Xenakis},
  title        = {Malicious actions against the {GPRS} technology},
  journal      = {J. Comput. Virol.},
  volume       = {2},
  number       = {2},
  pages        = {121--133},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11416-006-0021-1},
  doi          = {10.1007/S11416-006-0021-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Xenakis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/XenakisM06,
  author       = {Christos Xenakis and
                  Lazaros F. Merakos},
  title        = {Alternative Schemes for Dynamic Secure {VPN} Deployment in {UMTS}},
  journal      = {Wirel. Pers. Commun.},
  volume       = {36},
  number       = {2},
  pages        = {163--194},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11277-006-8864-9},
  doi          = {10.1007/S11277-006-8864-9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/XenakisM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/XenakisM06,
  author       = {Christos Xenakis and
                  Lazaros F. Merakos},
  editor       = {Javier L{\'{o}}pez},
  title        = {Vulnerabilities and Possible Attacks Against the {GPRS} Backbone Network},
  booktitle    = {Critical Information Infrastructures Security, First International
                  Workshop, {CRITIS} 2006, Samos, Greece, August 31 - September 1, 2006,
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4347},
  pages        = {262--272},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11962977\_21},
  doi          = {10.1007/11962977\_21},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/critis/XenakisM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/gr/Xenakis04,
  author       = {Christos Xenakis},
  title        = {{\(\Alpha\)}{\(\rho\)}{\(\chi\)}{\(\iota\)}{\(\tau\)}{\(\epsilon\)}{\(\kappa\)}{\(\tau\)}{\(o\)}{\(\nu\)}{\(\iota\)}{\(\kappa\)}{\(\acute{\epsilon}\)}{\(\varsigma\)}
                  {\(\alpha\)}{\(\sigma\)}{\(\varphi\)}{\'{$\alpha$}}{\(\lambda\)}{\(\epsilon\)}{\(\iota\)}{\(\alpha\)}{\(\varsigma\)}
                  {\(\epsilon\)}{\(\iota\)}{\(\kappa\)}{\(o\)}{\(\nu\)}{\(\iota\)}{\(\kappa\)}{\(\acute{\omega}\)}{\(\nu\)}
                  {\(\iota\)}{\(\delta\)}{\(\iota\)}{\(\omega\)}{\(\tau\)}{\(\iota\)}{\(\kappa\)}{\(\acute{\omega}\)}{\(\nu\)}
                  {\(\delta\)}{\(\iota\)}{\(\kappa\)}{\(\tau\)}{\(\acute{\upsilon}\)}{\(\omega\)}{\(\nu\)}
                  {\(\sigma\)}{\(\epsilon\)} {\(\kappa\)}{\(\iota\)}{\(\nu\)}{\(\eta\)}{\(\tau\)}{\'{$\alpha$}}
                  3{\(\eta\)}{\(\varsigma\)} {\(\gamma\)}{\(\epsilon\)}{\(\nu\)}{\(\iota\)}{\'{$\alpha$}}{\(\varsigma\)}},
  school       = {National and Kapodistrian University of Athens, Greece},
  year         = {2004},
  url          = {http://hdl.handle.net/10442/hedi/22583},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/gr/Xenakis04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/XenakisM04,
  author       = {Christos Xenakis and
                  Lazaros F. Merakos},
  title        = {Security in third Generation Mobile Networks},
  journal      = {Comput. Commun.},
  volume       = {27},
  number       = {7},
  pages        = {638--650},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comcom.2003.12.004},
  doi          = {10.1016/J.COMCOM.2003.12.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/XenakisM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/XenakisM04a,
  author       = {Christos Xenakis and
                  Lazaros F. Merakos},
  title        = {IPsec-based end-to-end {VPN} deployment over {UMTS}},
  journal      = {Comput. Commun.},
  volume       = {27},
  number       = {17},
  pages        = {1693--1708},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comcom.2004.05.021},
  doi          = {10.1016/J.COMCOM.2004.05.021},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/XenakisM04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/XenakisM02,
  author       = {Christos Xenakis and
                  Lazaros F. Merakos},
  title        = {On demand network-wide {VPN} deployment in {GPRS}},
  journal      = {{IEEE} Netw.},
  volume       = {16},
  number       = {6},
  pages        = {28--37},
  year         = {2002},
  url          = {https://doi.org/10.1109/MNET.2002.1081763},
  doi          = {10.1109/MNET.2002.1081763},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/XenakisM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/XenakisM02,
  author       = {Christos Xenakis and
                  Lazaros F. Merakos},
  title        = {Dynamic network-based secure {VPN} deployment in {GPRS}},
  booktitle    = {The 13th {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications, Lisboa, Portugal, September 15-18, 2002},
  pages        = {1260--1265},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/PIMRC.2002.1045231},
  doi          = {10.1109/PIMRC.2002.1045231},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/XenakisM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/LoukasXMV98,
  author       = {Nikolaos H. Loukas and
                  Christos K. Xenakis and
                  Lazaros F. Merakos and
                  Iakovos S. Venieris},
  title        = {Signaling and mobility control for wireless intelligent {ATM} CPNs},
  booktitle    = {The 9th {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications, {PIMRC} 1998, Boston, MA, USA, September 8-11,
                  1998},
  pages        = {738--743},
  publisher    = {{IEEE}},
  year         = {1998},
  url          = {https://doi.org/10.1109/PIMRC.1998.734661},
  doi          = {10.1109/PIMRC.1998.734661},
  timestamp    = {Tue, 19 May 2020 15:57:12 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/LoukasXMV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics