default search action
BibTeX records: Christos Xenakis
@article{DBLP:journals/csur/AngelogianniPX24, author = {Anna Angelogianni and Ilias Politis and Christos Xenakis}, title = {How many {FIDO} protocols are needed? Analysing the technology, security and compliance}, journal = {{ACM} Comput. Surv.}, volume = {56}, number = {8}, pages = {214:1--214:51}, year = {2024}, url = {https://doi.org/10.1145/3654661}, doi = {10.1145/3654661}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AngelogianniPX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/FaraoPPPZX24, author = {Aristeidis Farao and Georgios Paparis and Sakshyam Panda and Emmanouil Panaousis and Apostolis Zarras and Christos Xenakis}, title = {{INCHAIN:} a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {1}, pages = {347--371}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00741-8}, doi = {10.1007/S10207-023-00741-8}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/FaraoPPPZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/0002FBSPX24, author = {Georgios Petihakis and Aristeidis Farao and Panagiotis Bountakas and Athanasia Sabazioti and John Polley and Christos Xenakis}, title = {{AIAS:} AI-ASsisted cybersecurity platform to defend against adversarial {AI} attacks}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {126:1--126:7}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3669920}, doi = {10.1145/3664476.3669920}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/0002FBSPX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FaraoNKMDX24, author = {Aristeidis Farao and Christoforos Ntantogian and Stylianos Karagiannis and Emmanouil Magkos and Alexandra Dritsa and Christos Xenakis}, title = {{NITRO:} an Interconnected 5G-IoT Cyber Range}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {129:1--129:6}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3669919}, doi = {10.1145/3664476.3669919}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/FaraoNKMDX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VoudourisFPPX24, author = {Anastassios Voudouris and Aristeidis Farao and Aggeliki Panou and John Polley and Christos Xenakis}, title = {Integrating Hyperledger Fabric with Satellite Communications: {A} Revolutionary Approach for Enhanced Security and Decentralization in Space Networks}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {134:1--134:8}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3669921}, doi = {10.1145/3664476.3669921}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/VoudourisFPPX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/BountakasZLX23, author = {Panagiotis Bountakas and Apostolis Zarras and Alexios Lekidis and Christos Xenakis}, title = {Defense strategies for Adversarial Machine Learning: {A} survey}, journal = {Comput. Sci. Rev.}, volume = {49}, pages = {100573}, year = {2023}, url = {https://doi.org/10.1016/j.cosrev.2023.100573}, doi = {10.1016/J.COSREV.2023.100573}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csr/BountakasZLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BountakasX23, author = {Panagiotis Bountakas and Christos Xenakis}, title = {{HELPHED:} Hybrid Ensemble Learning PHishing Email Detection}, journal = {J. Netw. Comput. Appl.}, volume = {210}, pages = {103545}, year = {2023}, url = {https://doi.org/10.1016/j.jnca.2022.103545}, doi = {10.1016/J.JNCA.2022.103545}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BountakasX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PetihakisKFBPX23, author = {George Petihakis and Dimitrios Kiritsis and Aristeidis Farao and Panagiotis Bountakas and Aggeliki Panou and Christos Xenakis}, title = {A Bring Your Own Device security awareness survey among professionals}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {92:1--92:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605072}, doi = {10.1145/3600160.3605072}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PetihakisKFBPX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BampatsikosPBX23, author = {Michail Bampatsikos and Ilias Politis and Vaios Bolgouras and Christos Xenakis}, title = {Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {94:1--94:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605074}, doi = {10.1145/3600160.3605074}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BampatsikosPBX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BolgourasPSPGSX23, author = {Vaios Bolgouras and Kostantinos Papadamou and Ioana Stroinea and Michail Papadakis and George Gugulea and Michael Sirivianos and Christos Xenakis}, title = {Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {95:1--95:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605075}, doi = {10.1145/3600160.3605075}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BolgourasPSPGSX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LouposNMMSGPSDG23, author = {Konstantinos Loupos and Harris Niavis and Fotis Michalopoulos and George Misiakoulis and Antonio F. Skarmeta and Jes{\'{u}}s Garcia and Angel Palomares and Hui Song and Rustem Dautov and Francesca Giampaolo and Rosella Mancilla and Francesca Costantino and Dimitri Van Landuyt and Sam Michiels and Stefan More and Christos Xenakis and Michail Bampatsikos and Ilias Politis and Konstantinos Krilakis and Sokratis Vavilis}, title = {An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {98:1--98:6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605083}, doi = {10.1145/3600160.3605083}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LouposNMMSGPSDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PantelakisBFX23, author = {Vasileios Pantelakis and Panagiotis Bountakas and Aristeidis Farao and Christos Xenakis}, title = {Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {100:1--100:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605086}, doi = {10.1145/3600160.3605086}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PantelakisBFX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/IoannidisBXP23, author = {Thodoris Ioannidis and Vaios Bolgouras and Christos Xenakis and Ilias Politis}, title = {Securing the Flow: Security and Privacy Tools for Flow-based Programming}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {103:1--103:6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605089}, doi = {10.1145/3600160.3605089}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/IoannidisBXP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/SpanakisPMPGBAX23, author = {Emmanouil G. Spanakis and Ilias Politis and Evangelos K. Markakis and Dimitra Papatsaroucha and Athanasios Vasileios Grammatopoulos and Vaios Bolgouras and Anna Angelogianni and Christos Xenakis and Vangelis Sakkalis}, title = {Towards building a Self-Sovereign Identity Framework for Healthcare}, booktitle = {45th Annual International Conference of the {IEEE} Engineering in Medicine {\&} Biology Society, {EMBC} 2023, Sydney, Australia, July 24-27, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EMBC40787.2023.10340626}, doi = {10.1109/EMBC40787.2023.10340626}, timestamp = {Thu, 11 Jan 2024 15:01:18 +0100}, biburl = {https://dblp.org/rec/conf/embc/SpanakisPMPGBAX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/StylianouPX23, author = {Ioannis Stylianou and Ilias Politis and Christos Xenakis}, title = {Enhancing 3GPP {CAPIF} Authentication and Authorization Across Mobile Operators Using OpenID Connect and Single Sign-On}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {5310--5315}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279103}, doi = {10.1109/ICC45041.2023.10279103}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/StylianouPX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/ChochliourosKXT23, author = {Ioannis P. Chochliouros and Michail{-}Alexandros Kourtis and George Xilouris and Wouter Tavernier and Enrique Areizaga Sanchez and Margarita Anastassova and Christian Bolzmacher and Nikolay Tcholtchev and Antonello Corsi and Panagiotis Trakadas and Marta Millet and Christos Xenakis and Adnan Imeri and Francesco Bellesini and Paride D'Ostilio and Albertos Markakis and Ihsan Bal Engin and Antonis Litke and Lucrezia Maria Quarato and Diego Cugat and Georgios Gardikis and Charilaos C. Zarakovitis and St{\'{e}}phane Bouilland and Zaharias D. Zaharis and Christina Lessi and Dimitrios N. Arvanitozisis and Anastasia S. Spiliopoulou}, editor = {Ilias Maglogiannis and Lazaros S. Iliadis and Antonios Papaleonidas and Ioannis P. Chochliouros}, title = {{OASEES:} An Innovative Scope for a DAO-Based Programmable Swarm Solution, for Decentralizing {AI} Applications Close to Data Generation Locations}, booktitle = {Artificial Intelligence Applications and Innovations. {AIAI} 2023 {IFIP} {WG} 12.5 International Workshops - {MHDW} 2023, 5G-PINE 2023, {\(\Alpha\)}{\(\Iota\)}BMG 2023, and {VAA-CP-EB} 2023, Le{\'{o}}n, Spain, June 14-17, 2023, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {677}, pages = {91--105}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34171-7\_7}, doi = {10.1007/978-3-031-34171-7\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip12/ChochliourosKXT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08074, author = {Vaios Bolgouras and Thodoris Ioannidis and Ilias Politis and Christos Xenakis}, title = {{RETINA:} Distributed and Secure Trust Management for Smart Grid Applications and Energy Trading}, journal = {CoRR}, volume = {abs/2306.08074}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08074}, doi = {10.48550/ARXIV.2306.08074}, eprinttype = {arXiv}, eprint = {2306.08074}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08074.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BountakasNX22, author = {Panagiotis Bountakas and Christoforos Ntantogian and Christos Xenakis}, title = {EKnad: Exploit Kits' network activity detection}, journal = {Future Gener. Comput. Syst.}, volume = {134}, pages = {219--235}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.04.001}, doi = {10.1016/J.FUTURE.2022.04.001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BountakasNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LyvasNX22, author = {Christos Lyvas and Christoforos Ntantogian and Christos Xenakis}, title = {[m]allotROPism: a metamorphic engine for malicious software variation development}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {1}, pages = {61--78}, year = {2022}, url = {https://doi.org/10.1007/s10207-021-00541-y}, doi = {10.1007/S10207-021-00541-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LyvasNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VeroniNX22, author = {Eleni Veroni and Christoforos Ntantogian and Christos Xenakis}, title = {A large-scale analysis of Wi-Fi passwords}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103190}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103190}, doi = {10.1016/J.JISA.2022.103190}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VeroniNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Diaz-HonrubiaBS22, author = {Antonio Jes{\'{u}}s D{\'{\i}}az{-}Honrubia and Alberto Bl{\'{a}}zquez{-}Herranz and Luc{\'{\i}}a Prieto Santamar{\'{\i}}a and Ernestina Menasalvas Ruiz and Alejandro Rodr{\'{\i}}guez Gonz{\'{a}}lez and Gustavo {Gonzalez Granadillo} and Rodrigo Diaz and Emmanouil Panaousis and Christos Xenakis}, title = {A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103350}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103350}, doi = {10.1016/J.JISA.2022.103350}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Diaz-HonrubiaBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GrammatopoulosP22, author = {Athanasios Vasileios Grammatopoulos and Ilias Politis and Christos Xenakis}, title = {Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {2}, pages = {96--127}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.06.30.096}, doi = {10.22667/JOWUA.2022.06.30.096}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GrammatopoulosP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SuciuFBPSVVMBMX22, author = {George Suciu and Aristeidis Farao and Giorgio Bernardinetti and Ivan Palam{\`{a}} and Mari{-}Anais Sachian and Alexandru Vulpe and Marius{-}Constantin Vochin and Pavel Muresan and Michail Bampatsikos and Antonio Mu{\~{n}}oz and Christos Xenakis}, title = {{SAMGRID:} Security Authorization and Monitoring Module Based on SealedGRID Platform}, journal = {Sensors}, volume = {22}, number = {17}, pages = {6527}, year = {2022}, url = {https://doi.org/10.3390/s22176527}, doi = {10.3390/S22176527}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SuciuFBPSVVMBMX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TseliosPX22, author = {Christos Tselios and Ilias Politis and Christos Xenakis}, title = {Improving Network, Data and Application Security for SMEs}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {95:1--95:8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544426}, doi = {10.1145/3538969.3544426}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TseliosPX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BolgourasAPX22, author = {Vaios Bolgouras and Anna Angelogianni and Ilias Politis and Christos Xenakis}, title = {Trusted and Secure Self-Sovereign Identity framework}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {101:1--101:6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544436}, doi = {10.1145/3538969.3544436}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BolgourasAPX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VoudourisPX22, author = {Anastassios Voudouris and Ilias Politis and Christos Xenakis}, title = {Secret sharing a key in a distributed way, Lagrange vs Newton}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {105:1--105:7}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544424}, doi = {10.1145/3538969.3544424}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/VoudourisPX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AhmedPXP22, author = {Mohamed Ahmed and Sakshyam Panda and Christos Xenakis and Emmanouil Panaousis}, title = {{MITRE} ATT{\&}CK-driven Cyber Risk Assessment}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {107:1--107:10}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544420}, doi = {10.1145/3538969.3544420}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AhmedPXP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KalderemidisFBP22, author = {Ioannis Kalderemidis and Aristeidis Farao and Panagiotis Bountakas and Sakshyam Panda and Christos Xenakis}, title = {{GTM:} Game Theoretic Methodology for optimal cybersecurity defending strategies and investments}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {120:1--120:9}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544431}, doi = {10.1145/3538969.3544431}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KalderemidisFBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/giots/LouposKNSTPSBGL22, author = {Konstantinos Loupos and Christos Kalogirou and Harris Niavis and Antonio F. Skarmeta and Elena Torroglosa{-}Garc{\'{\i}}a and Angel Palomares and Hui Song and Paul{-}Emmanuel Brun and Francesca Giampaolo and Dimitri Van Landuyt and Sam Michiels and Blaz Podgorelec and Christos Xenakis and Michail Bampatsikos and Konstantinos Krilakis}, editor = {Aurora Gonz{\'{a}}lez{-}Vidal and Ahmed Mohamed Abdelgawad and Essaid Sabir and S{\'{e}}bastien Ziegler and Latif Ladid}, title = {A Holistic Approach for IoT Networks' Identity and Trust Management - The {ERATOSTHENES} Project}, booktitle = {Internet of Things - 5th The Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20-23, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13533}, pages = {338--347}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20936-9\_27}, doi = {10.1007/978-3-031-20936-9\_27}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/giots/LouposKNSTPSBGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccomm/KaratisoglouFBX22, author = {Marios Karatisoglou and Aristeidis Farao and Vaios Bolgouras and Christos Xenakis}, title = {{BRIDGE:} BRIDGing the gap bEtween {CTI} production and consumption}, booktitle = {14th International Conference on Communications, {COMM} 2022, Bucharest, Romania, June 16-18, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COMM54429.2022.9817359}, doi = {10.1109/COMM54429.2022.9817359}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccomm/KaratisoglouFBX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssdbm/BellasKNGVXP22, author = {Christos Bellas and Georgia Kougka and Athanasios Naskos and Anastasios Gounaris and Athena Vakali and Christos Xenakis and Apostolos Papadopoulos}, editor = {Elaheh Pourabbas and Yongluan Zhou and Yuchen Li and Bin Yang}, title = {Facilitating DoS Attack Detection using Unsupervised Anomaly Detection}, booktitle = {{SSDBM} 2022: 34th International Conference on Scientific and Statistical Database Management, Copenhagen, Denmark, July 6 - 8, 2022}, pages = {24:1--24:4}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538712.3538736}, doi = {10.1145/3538712.3538736}, timestamp = {Thu, 25 Aug 2022 15:02:48 +0200}, biburl = {https://dblp.org/rec/conf/ssdbm/BellasKNGVXP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/RebecchiPMLBACG22, author = {Filippo Rebecchi and Antonio Pastor and Alberto Mozo and Chiara Lombardo and Roberto Bruschi and Ilias Aliferis and Roberto Doriguzzi Corin and Panagiotis Gouvas and Antonio {\'{A}}lvarez Romero and Anna Angelogianni and Ilias Politis and Christos Xenakis}, title = {A Digital Twin for the 5G Era: the {SPIDER} Cyber Range}, booktitle = {23rd {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2022, Belfast, United Kingdom, June 14-17, 2022}, pages = {567--572}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WoWMoM54355.2022.00088}, doi = {10.1109/WOWMOM54355.2022.00088}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/RebecchiPMLBACG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XenakisTKXP21, author = {Dionysis Xenakis and Anastasia Tsiota and Christos{-}Thrasyvoulos Koulis and Christos Xenakis and Nikos I. Passas}, title = {Contract-Less Mobile Data Access Beyond 5G: Fully-Decentralized, High-Throughput and Anonymous Asset Trading Over the Blockchain}, journal = {{IEEE} Access}, volume = {9}, pages = {73963--74016}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3079625}, doi = {10.1109/ACCESS.2021.3079625}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XenakisTKXP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/MunozFCX21, author = {Antonio Mu{\~{n}}oz and Aristeidis Farao and Jordy Ryan Casas Correia and Christos Xenakis}, title = {{P2ISE:} Preserving Project Integrity in {CI/CD} Based on Secure Elements}, journal = {Inf.}, volume = {12}, number = {9}, pages = {357}, year = {2021}, url = {https://doi.org/10.3390/info12090357}, doi = {10.3390/INFO12090357}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/MunozFCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NtantogianBAPX21, author = {Christoforos Ntantogian and Panagiotis Bountakas and Dimitris Antonaropoulos and Constantinos Patsakis and Christos Xenakis}, title = {NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102752}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102752}, doi = {10.1016/J.JISA.2021.102752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NtantogianBAPX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Koutroumpouchos21, author = {Nikolaos Koutroumpouchos and Christoforos Ntantogian and Christos Xenakis}, title = {Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone}, journal = {Sensors}, volume = {21}, number = {2}, pages = {520}, year = {2021}, url = {https://doi.org/10.3390/s21020520}, doi = {10.3390/S21020520}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Koutroumpouchos21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FaraoVNX21, author = {Aristeidis Farao and Eleni Veroni and Christoforos Ntantogian and Christos Xenakis}, title = {P4G2Go: {A} Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go}, journal = {Sensors}, volume = {21}, number = {8}, pages = {2686}, year = {2021}, url = {https://doi.org/10.3390/s21082686}, doi = {10.3390/S21082686}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FaraoVNX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SuciuSVVFKX21, author = {George Suciu and Mari{-}Anais Sachian and Alexandru Vulpe and Marius{-}Constantin Vochin and Aristeidis Farao and Nikolaos Koutroumpouchos and Christos Xenakis}, title = {SealedGRID: Secure and Interoperable Platform for Smart {GRID} Applications}, journal = {Sensors}, volume = {21}, number = {16}, pages = {5448}, year = {2021}, url = {https://doi.org/10.3390/s21165448}, doi = {10.3390/S21165448}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SuciuSVVFKX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GranadilloMPRNO21, author = {Gustavo {Gonzalez Granadillo} and Sofia{-}Anna Menesidou and Dimitrios Papamartzivanos and Ramon Romeu and Diana Navarro{-}Llobet and Caxton Okoh and Sokratis Nifakos and Christos Xenakis and Emmanouil Panaousis}, title = {Automated Cyber and Privacy Risk Management Toolkit}, journal = {Sensors}, volume = {21}, number = {16}, pages = {5493}, year = {2021}, url = {https://doi.org/10.3390/s21165493}, doi = {10.3390/S21165493}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/GranadilloMPRNO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GrammatopoulosP21, author = {Athanasios Vasileios Grammatopoulos and Ilias Politis and Christos Xenakis}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {A web tool for analyzing FIDO2/WebAuthn Requests and Responses}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {125:1--125:10}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3469209}, doi = {10.1145/3465481.3469209}, timestamp = {Tue, 17 Aug 2021 14:54:34 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GrammatopoulosP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BountakasKX21, author = {Panagiotis Bountakas and Konstantinos Koutroumpouchos and Christos Xenakis}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {127:1--127:12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3469205}, doi = {10.1145/3465481.3469205}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BountakasKX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BampatsikosPXT21, author = {Michail Bampatsikos and Ilias Politis and Christos Xenakis and Stelios C. A. Thomopoulos}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Solving the cold start problem in Trust Management in IoT}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {128:1--128:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3469208}, doi = {10.1145/3465481.3469208}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BampatsikosPXT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/AngelogianniPPP21, author = {Anna Angelogianni and Ilias Politis and Pier Luigi Polvanesi and Antonio Pastor and Christos Xenakis}, title = {Unveiling the user requirements of a cyber range for 5G security testing and training}, booktitle = {26th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, {CAMAD} 2021, Porto, Portugal, October 25-27, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CAMAD52502.2021.9617776}, doi = {10.1109/CAMAD52502.2021.9617776}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/camad/AngelogianniPPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GranadilloDVX21, author = {Gustavo {Gonzalez Granadillo} and Rodrigo Diaz and Eleni Veroni and Christos Xenakis}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {47--60}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/GranadilloDVX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-04142, author = {Ilias Politis and Christos Xenakis and Adarbad Master and John Polley}, title = {On an innovative architecture for digital immunity passports and vaccination certificates}, journal = {CoRR}, volume = {abs/2103.04142}, year = {2021}, url = {https://arxiv.org/abs/2103.04142}, eprinttype = {arXiv}, eprint = {2103.04142}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-04142.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-00577, author = {Anna Angelogianni and Ilias Politis and Christos Xenakis}, title = {How many {FIDO} protocols are needed? Surveying the design, security and market perspectives}, journal = {CoRR}, volume = {abs/2107.00577}, year = {2021}, url = {https://arxiv.org/abs/2107.00577}, eprinttype = {arXiv}, eprint = {2107.00577}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-00577.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AngelogianniPMX20, author = {Anna Angelogianni and Ilias Politis and Farnaz Mohammadi and Christos Xenakis}, title = {On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats}, journal = {{IEEE} Access}, volume = {8}, pages = {224677--224701}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3045322}, doi = {10.1109/ACCESS.2020.3045322}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AngelogianniPMX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JonesJMX20, author = {Kevin I. Jones and Helge Janicke and Leandros Maglaras and Christos Xenakis}, title = {Introduction to the special issue of the journal of information security and applications on" cyber security in {ICS} {\&} {SCADA} systems"}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102542}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102542}, doi = {10.1016/J.JISA.2020.102542}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JonesJMX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PapadamouGXSZCT20, author = {Kostantinos Papadamou and Steven Gevers and Christos Xenakis and Michael Sirivianos and Savvas Zannettou and Bogdan Chifor and Sorin Teican and George Gugulea and Alberto Caponi and Annamaria Recupero and Claudio Pisa and Giuseppe Bianchi}, title = {Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2183--2193}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2958763}, doi = {10.1109/TIFS.2019.2958763}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PapadamouGXSZCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/BolgourasNPX20, author = {Vaios Bolgouras and Christoforos Ntantogian and Emmanouil Panaousis and Christos Xenakis}, title = {Distributed Key Management in Microgrids}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {3}, pages = {2125--2133}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2941586}, doi = {10.1109/TII.2019.2941586}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/BolgourasNPX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/educon/XenakisXPK20, author = {Apostolos Xenakis and Christos Xenakis and Sarantos Psycharis and Konstantinos Kalovrektis}, title = {Calculation of the Hubble Universe Expansion Constant by Analyzing Observational Data: An Exploratory Teaching Proposal based on {STEM} Epistemology}, booktitle = {2020 {IEEE} Global Engineering Education Conference, {EDUCON} 2020, Porto, Portugal, April 27-30, 2020}, pages = {170--177}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EDUCON45650.2020.9125209}, doi = {10.1109/EDUCON45650.2020.9125209}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/educon/XenakisXPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MunozFCX20, author = {Antonio Mu{\~{n}}oz and Aristeidis Farao and Jordy Ryan Casas Correia and Christos Xenakis}, editor = {Ioana Boureanu and Constantin Catalin Dragan and Mark Manulis and Thanassis Giannetsos and Christoforos Dadoyan and Panagiotis Gouvas and Roger A. Hallman and Shujun Li and Victor Chang and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse}, title = {{ICITPM:} Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module {(TPM)}}, booktitle = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12580}, pages = {147--165}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66504-3\_9}, doi = {10.1007/978-3-030-66504-3\_9}, timestamp = {Sun, 10 Dec 2023 06:07:27 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MunozFCX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/giots/SuciuISVVFX20, author = {George Suciu and Cristiana Istrate and Mari{-}Anais Sachian and Alexandru Vulpe and Marius{-}Constantin Vochin and Aristeidis Farao and Christos Xenakis}, title = {{FI-WARE} authorization in a Smart Grid scenario}, booktitle = {2020 Global Internet of Things Summit, GIoTS 2020, Dublin, Ireland, June 3, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GIOTS49054.2020.9119589}, doi = {10.1109/GIOTS49054.2020.9119589}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/giots/SuciuISVVFX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/FaraoPMVEKMGSSL20, author = {Aristeidis Farao and Sakshyam Panda and Sofia{-}Anna Menesidou and Entso Veliou and Nikolaos Episkopos and George Kalatzantonakis and Farnaz Mohammadi and Nikolaos Georgopoulos and Michael Sirivianos and Nikos Salamanos and Spyros Loizou and Michalis Pingos and John Polley and Andrew Fielder and Emmanouil Panaousis and Christos Xenakis}, editor = {Stefanos Gritzalis and Edgar R. Weippl and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {{SECONDO:} {A} Platform for Cybersecurity Investments and Cyber Insurance Decisions}, booktitle = {Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12395}, pages = {65--74}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58986-8\_5}, doi = {10.1007/978-3-030-58986-8\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/FaraoPMVEKMGSSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/NtantogianVKX19, author = {Christoforos Ntantogian and Eleni Veroni and Georgios Karopoulos and Christos Xenakis}, title = {A survey of voice and communication protection solutions against wiretapping}, journal = {Comput. Electr. Eng.}, volume = {77}, pages = {163--178}, year = {2019}, url = {https://doi.org/10.1016/j.compeleceng.2019.05.008}, doi = {10.1016/J.COMPELECENG.2019.05.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/NtantogianVKX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianMX19, author = {Christoforos Ntantogian and Stefanos Malliaros and Christos Xenakis}, title = {Evaluation of password hashing schemes in open source web platforms}, journal = {Comput. Secur.}, volume = {84}, pages = {206--224}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.03.011}, doi = {10.1016/J.COSE.2019.03.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianMX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/NtantogianPKX19, author = {Christoforos Ntantogian and Georgios Poulios and Georgios Karopoulos and Christos Xenakis}, title = {Transforming malicious code to {ROP} gadgets for antivirus evasion}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {6}, pages = {570--578}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5386}, doi = {10.1049/IET-IFS.2018.5386}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/NtantogianPKX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/StasinopoulosNX19, author = {Anastasios Stasinopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications}, journal = {Int. J. Inf. Sec.}, volume = {18}, number = {1}, pages = {49--72}, year = {2019}, url = {https://doi.org/10.1007/s10207-018-0399-z}, doi = {10.1007/S10207-018-0399-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/StasinopoulosNX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FaraoRANX019, author = {Aristeidis Farao and Juan Enrique Rubio and Cristina Alcaraz and Christoforos Ntantogian and Christos Xenakis and Javier L{\'{o}}pez}, editor = {Simin Nadjm{-}Tehrani}, title = {SealedGRID: {A} Secure Interconnection of Technologies for Smart Grid Applications}, booktitle = {Critical Information Infrastructures Security - 14th International Conference, {CRITIS} 2019, Link{\"{o}}ping, Sweden, September 23-25, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11777}, pages = {169--175}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37670-3\_14}, doi = {10.1007/978-3-030-37670-3\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/FaraoRANX019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/Koutroumpouchos19, author = {Nikos Koutroumpouchos and Christoforos Ntantogian and Sofia{-}Anna Menesidou and Kaitai Liang and Panagiotis Gouvas and Christos Xenakis and Thanassis Giannetsos}, editor = {Christian Jacquenet and Filip De Turck and Prosper Chemouil and Flavio Esposito and Olivier Festor and Walter Cerroni and Stefano Secci}, title = {Secure Edge Computing with Lightweight Control-Flow Property-based Attestation}, booktitle = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019}, pages = {84--92}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NETSOFT.2019.8806658}, doi = {10.1109/NETSOFT.2019.8806658}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsoft/Koutroumpouchos19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/Koutroumpouchos19, author = {Nikolaos Koutroumpouchos and Georgios Lavdanis and Eleni Veroni and Christoforos Ntantogian and Christos Xenakis}, editor = {Yannis Manolopoulos and George Angelos Papadopoulos and Athena Stassopoulou and Ioanna Dionysiou and Ioannis Kyriakides and Nicolas Tsapatsoulis}, title = {ObjectMap: detecting insecure object deserialization}, booktitle = {Proceedings of the 23rd Pan-Hellenic Conference on Informatics, {PCI} 2019, Nicosia, Cyprus, November 28-30, 2019}, pages = {67--72}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368640.3368680}, doi = {10.1145/3368640.3368680}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/Koutroumpouchos19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/BampatsikosNXT19, author = {Michail Bampatsikos and Christoforos Ntantogian and Christos Xenakis and Stelios C. A. Thomopoulos}, editor = {Payam M. Barnaghi and Georg Gottlob and Dimitrios Katsaros and Yannis Manolopoulos and Rahul Pandey and Theodoros Tzouramanis and Athena Vakali}, title = {{BARRETT} BlockchAin Regulated REmote aTTestation}, booktitle = {2019 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume}, pages = {256--262}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3358695.3361752}, doi = {10.1145/3358695.3361752}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webi/BampatsikosNXT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/MohammadiPNKPX19, author = {Farnaz Mohammadi and Angeliki Panou and Christoforos Ntantogian and Eirini D. Karapistoli and Emmanouil Panaousis and Christos Xenakis}, editor = {Payam M. Barnaghi and Georg Gottlob and Dimitrios Katsaros and Yannis Manolopoulos and Rahul Pandey and Theodoros Tzouramanis and Athena Vakali}, title = {{CUREX:} seCUre and pRivate hEalth data eXchange}, booktitle = {2019 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume}, pages = {263--268}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3358695.3361753}, doi = {10.1145/3358695.3361753}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webi/MohammadiPNKPX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KaropoulosNX18, author = {Georgios Karopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {{MASKER:} Masking for privacy-preserving aggregation in the smart grid ecosystem}, journal = {Comput. Secur.}, volume = {73}, pages = {307--325}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.008}, doi = {10.1016/J.COSE.2017.11.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KaropoulosNX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/KitsakiANX18, author = {Theodoula{-}Ioanna Kitsaki and Anna Angelogianni and Christoforos Ntantogian and Christos Xenakis}, editor = {Nikitas N. Karanikolas and Basilis Mamalis and John Kontos and Grammati E. Pantziou and Stefanos Gritzalis and Christos Douligeris}, title = {A forensic investigation of Android mobile applications}, booktitle = {Proceedings of the 22nd Pan-Hellenic Conference on Informatics, {PCI} 2018, Athens, Greece, November 29 - December 01, 2018}, pages = {58--63}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3291533.3291573}, doi = {10.1145/3291533.3291573}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/KitsakiANX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-08360, author = {Kostantinos Papadamou and Savvas Zannettou and Giuseppe Bianchi and Alberto Caponi and Annamaria Recupero and Steven Gevers and George Gugulea and Sorin Teican and Bogdan Chifor and Christos Xenakis and Michael Sirivianos}, title = {Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication}, journal = {CoRR}, volume = {abs/1811.08360}, year = {2018}, url = {http://arxiv.org/abs/1811.08360}, eprinttype = {arXiv}, eprint = {1811.08360}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-08360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PanosNMX17, author = {Christoforos Panos and Christoforos Ntantogian and Stefanos Malliaros and Christos Xenakis}, title = {Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks}, journal = {Comput. Networks}, volume = {113}, pages = {94--110}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2016.12.006}, doi = {10.1016/J.COMNET.2016.12.006}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PanosNMX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/KaropoulosXTE17, author = {Georgios Karopoulos and Christos Xenakis and Stefano Tennina and Stefanos Evangelopoulos}, title = {Towards trusted metering in the smart grid}, booktitle = {22nd {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, {CAMAD} 2017, Lund, Sweden, June 19-21, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CAMAD.2017.8031643}, doi = {10.1109/CAMAD.2017.8031643}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/camad/KaropoulosXTE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/PanouNX17, author = {Angeliki Panou and Christoforos Ntantogian and Christos Xenakis}, editor = {Vasileios Vlachos and Ilias K. Savvas and Cleo Sgouropoulou and Vassilis P. Plagianakos and Christos Douligeris and Ioannis Voyiatzis and Vassilis Tampakas and George Soultis}, title = {RiSKi: {A} Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance}, booktitle = {Proceedings of the 21st Pan-Hellenic Conference on Informatics, Larissa, Greece, September 28-30, 2017}, pages = {32:1--32:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139367.3139426}, doi = {10.1145/3139367.3139426}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/PanouNX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tiwdc/PanosMNPX17, author = {Christoforos Panos and Stefanos Malliaros and Christoforos Ntantogian and Angeliki Panou and Christos Xenakis}, editor = {Alessandro Piva and Ilenia Tinnirello and Simone Morosi}, title = {A Security Evaluation of FIDO's {UAF} Protocol in Mobile and Embedded Devices}, booktitle = {Digital Communication. Towards a Smart and Secure Future Internet - 28th International Tyrrhenian Workshop, {TIWDC} 2017, Palermo, Italy, September 18-20, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {766}, pages = {127--142}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67639-5\_11}, doi = {10.1007/978-3-319-67639-5\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tiwdc/PanosMNPX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XenakisNP16, author = {Christos Xenakis and Christoforos Ntantogian and Orestis Panos}, title = {(U)SimMonitor: {A} mobile application for security evaluation of cellular networks}, journal = {Comput. Secur.}, volume = {60}, pages = {62--78}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.03.005}, doi = {10.1016/J.COSE.2016.03.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XenakisNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Chatzikonstantinou16, author = {Alexia Chatzikonstantinou and Christoforos Ntantogian and Georgios Karopoulos and Christos Xenakis}, title = {Evaluation of Cryptography Usage in Android Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e4}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262471}, doi = {10.4108/EAI.3-12-2015.2262471}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Chatzikonstantinou16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MalliarosNX16, author = {Stefanos Malliaros and Christoforos Ntantogian and Christos Xenakis}, title = {Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {687--693}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.75}, doi = {10.1109/ARES.2016.75}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MalliarosNX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianMX15, author = {Christoforos Ntantogian and Stefanos Malliaros and Christos Xenakis}, title = {Gaithashing: {A} two-factor authentication scheme based on gait features}, journal = {Comput. Secur.}, volume = {52}, pages = {17--32}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.03.009}, doi = {10.1016/J.COSE.2015.03.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianMX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/DemertzisKXC15, author = {Foivos F. Demertzis and Georgios Karopoulos and Christos Xenakis and Andrea Colarieti}, editor = {Symeon Papavassiliou and Stefan Ruehrup}, title = {Self-organised Key Management for the Smart Grid}, booktitle = {Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, {ADHOC-NOW} 2015, Athens, Greece, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9143}, pages = {303--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19662-6\_21}, doi = {10.1007/978-3-319-19662-6\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/DemertzisKXC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bionetics/Chatzikonstantinou15, author = {Alexia Chatzikonstantinou and Christoforos Ntantogian and Georgios Karopoulos and Christos Xenakis}, editor = {Junichi Suzuki and Tadashi Nakano and Henry Hess}, title = {Evaluation of Cryptography Usage in Android Applications}, booktitle = {{BICT} 2015, Proceedings of the 9th {EAI} International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), New York City, United States, December 3-5, 2015}, pages = {83--90}, publisher = {{ICST/ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2954820}, timestamp = {Fri, 03 Feb 2017 18:36:35 +0100}, biburl = {https://dblp.org/rec/conf/bionetics/Chatzikonstantinou15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/XenakisN15, author = {Christos Xenakis and Christoforos Ntantogian}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Attacking the baseband modem of mobile phones to breach the users' privacy and network security}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {231--244}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158480}, doi = {10.1109/CYCON.2015.7158480}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/XenakisN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/NtantogianVKLKX15, author = {Christoforos Ntantogian and Grigoris Valtas and Nikos Kapetanakis and Faidon Lalagiannis and Georgios Karopoulos and Christos Xenakis}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {Attacking {GSM} Networks as a Script Kiddie Using Commodity Hardware and Software}, booktitle = {Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9264}, pages = {73--86}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22906-5\_6}, doi = {10.1007/978-3-319-22906-5\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/NtantogianVKLKX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PanosXKS14, author = {Christoforos Panos and Christos Xenakis and Platon Kotzias and Ioannis Stavrakakis}, title = {A specification-based intrusion detection engine for infrastructure-less networks}, journal = {Comput. Commun.}, volume = {54}, pages = {67--83}, year = {2014}, url = {https://doi.org/10.1016/j.comcom.2014.08.002}, doi = {10.1016/J.COMCOM.2014.08.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/PanosXKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XenakisN14, author = {Christos Xenakis and Christoforos Ntantogian}, title = {An advanced persistent threat in 3G networks: Attacking the home network from roaming networks}, journal = {Comput. Secur.}, volume = {40}, pages = {84--94}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.11.006}, doi = {10.1016/J.COSE.2013.11.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XenakisN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianAMX14, author = {Christoforos Ntantogian and Dimitris Apostolopoulos and Giannis Marinakis and Christos Xenakis}, title = {Evaluating the privacy of Android mobile applications under forensic analysis}, journal = {Comput. Secur.}, volume = {42}, pages = {66--76}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.004}, doi = {10.1016/J.COSE.2014.01.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianAMX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/StasinopoulosNX14, author = {Anastasios Stasinopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {Bypassing {XSS} Auditor: Taking advantage of badly written {PHP} code}, booktitle = {2014 {IEEE} International Symposium on Signal Processing and Information Technology, {ISSPIT} 2014, Noida, India, December 15-17, 2014}, pages = {290--295}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISSPIT.2014.7300602}, doi = {10.1109/ISSPIT.2014.7300602}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/StasinopoulosNX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/DemertzisX13, author = {Foivos F. Demertzis and Christos Xenakis}, title = {{SOMA-E:} Self-organized mesh authentication - Extended}, journal = {Math. Comput. Model.}, volume = {57}, number = {7-8}, pages = {1606--1616}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.06.009}, doi = {10.1016/J.MCM.2012.06.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcm/DemertzisX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/ApostolopoulosMNX13, author = {Dimitris Apostolopoulos and Giannis Marinakis and Christoforos Ntantogian and Christos Xenakis}, editor = {Christos Douligeris and Nineta Polemi and Athanasios Karantjias and Winfried Lamersdorf}, title = {Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices}, booktitle = {Collaborative, Trusted and Privacy-Aware e/m-Services - 12th {IFIP} {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E} 2013, Athens, Greece, April 25-26, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {399}, pages = {178--185}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37437-1\_15}, doi = {10.1007/978-3-642-37437-1\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/ApostolopoulosMNX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/StasinopoulosNX13, author = {Anastasios Stasinopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {The weakest link on the network: Exploiting {ADSL} routers to perform cyber-attacks}, booktitle = {{IEEE} International Symposium on Signal Processing and Information Technology, Athens, Greece, December 12-15, 2013}, pages = {135--139}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISSPIT.2013.6781868}, doi = {10.1109/ISSPIT.2013.6781868}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/StasinopoulosNX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PetrouNX13, author = {Charalampos Petrou and Christoforos Ntantogian and Christos Xenakis}, editor = {Steven Furnell and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {A Better Time Approximation Scheme for e-Passports}, booktitle = {Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8058}, pages = {13--23}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40343-9\_2}, doi = {10.1007/978-3-642-40343-9\_2}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/PetrouNX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/NtantogianX12, author = {Christoforos Ntantogian and Christos Xenakis}, title = {Questioning the Feasibility of {UMTS-GSM} Interworking Attacks}, journal = {Wirel. Pers. Commun.}, volume = {65}, number = {1}, pages = {157--163}, year = {2012}, url = {https://doi.org/10.1007/s11277-011-0233-7}, doi = {10.1007/S11277-011-0233-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/NtantogianX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/TsolkasPXPT12, author = {Dimitris Tsolkas and Nikos I. Passas and Christos Xenakis and Vassilis Papataxiarhis and Vassileios Tsetsos}, title = {Busfinder: {A} Personalized Multimodal Transportation Guide with Dynamic Routing}, booktitle = {16th Panhellenic Conference on Informatics, {PCI} 2012, Piraeus, Greece, October 5-7, 2012}, pages = {25--30}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PCi.2012.19}, doi = {10.1109/PCI.2012.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/TsolkasPXPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NtantogianXS12, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {475--488}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_39}, doi = {10.1007/978-3-642-30436-1\_39}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NtantogianXS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wons/PanosKXS12, author = {Christoforos Panos and Platon Kotzias and Christos Xenakis and Ioannis Stavrakakis}, title = {Securing the 802.11 {MAC} in MANETs: {A} specification-based intrusion detection engine}, booktitle = {9th Annual Conference on Wireless On-demand Network Systems and Services, {WONS} 2012, Courmayeur, Italy, January 9-11, 2012}, pages = {16--22}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/WONS.2012.6152225}, doi = {10.1109/WONS.2012.6152225}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wons/PanosKXS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XenakisPS11, author = {Christos Xenakis and Christoforos Panos and Ioannis Stavrakakis}, title = {A comparative evaluation of intrusion detection architectures for mobile ad hoc networks}, journal = {Comput. Secur.}, volume = {30}, number = {1}, pages = {63--80}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2010.10.008}, doi = {10.1016/J.COSE.2010.10.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XenakisPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/NtantogianXS11, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, title = {Reducing False Synchronizations in 3G-WLAN Integrated Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {10}, number = {11}, pages = {3765--3773}, year = {2011}, url = {https://doi.org/10.1109/TWC.2011.080611.101824}, doi = {10.1109/TWC.2011.080611.101824}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/NtantogianXS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/DarraNXK11, author = {Eleni Darra and Christoforos Ntantogian and Christos Xenakis and Sokratis K. Katsikas}, editor = {Steven Furnell and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks}, booktitle = {Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6863}, pages = {138--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22890-2\_12}, doi = {10.1007/978-3-642-22890-2\_12}, timestamp = {Mon, 03 Jan 2022 22:15:13 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/DarraNXK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PanosXS11, author = {Christoforos Panos and Christos Xenakis and Ioannis Stavrakakis}, editor = {Steven Furnell and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks}, booktitle = {Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6863}, pages = {150--160}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22890-2\_13}, doi = {10.1007/978-3-642-22890-2\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/PanosXS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/critis/2010, editor = {Christos Xenakis and Stephen D. Wolthusen}, title = {Critical Information Infrastructures Security - 5th International Workshop, {CRITIS} 2010, Athens, Greece, September 23-24, 2010. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {6712}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21694-7}, doi = {10.1007/978-3-642-21694-7}, isbn = {978-3-642-21693-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianXS10, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, title = {A generic mechanism for efficient authentication in {B3G} networks}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {460--475}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.001}, doi = {10.1016/J.COSE.2009.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/VavoulasX10, author = {Nikos Vavoulas and Christos Xenakis}, editor = {Christos Xenakis and Stephen D. Wolthusen}, title = {A Quantitative Risk Analysis Approach for Deliberate Threats}, booktitle = {Critical Information Infrastructures Security - 5th International Workshop, {CRITIS} 2010, Athens, Greece, September 23-24, 2010. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {6712}, pages = {13--25}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21694-7\_2}, doi = {10.1007/978-3-642-21694-7\_2}, timestamp = {Thu, 14 Oct 2021 09:58:37 +0200}, biburl = {https://dblp.org/rec/conf/critis/VavoulasX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/DemertzisX10, author = {Foivos F. Demertzis and Christos Xenakis}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {{SOMA:} Self-Organised Mesh Authentication}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {31--44}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_3}, doi = {10.1007/978-3-642-22633-5\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/DemertzisX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PanosXS10, author = {Christoforos Panos and Christos Xenakis and Ioannis Stavrakakis}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {A Novel Intrusion Detection System for MANETs}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {25--34}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PanosXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/NtantogianX09, author = {Christoforos Ntantogian and Christos Xenakis}, title = {One-Pass {EAP-AKA} Authentication in 3G-WLAN Integrated Networks}, journal = {Wirel. Pers. Commun.}, volume = {48}, number = {4}, pages = {569--584}, year = {2009}, url = {https://doi.org/10.1007/s11277-008-9548-4}, doi = {10.1007/S11277-008-9548-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/NtantogianX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/XenakisNS08, author = {Christos Xenakis and Christoforos Ntantogian and Ioannis Stavrakakis}, title = {A network-assisted mobile {VPN} for securing users data in {UMTS}}, journal = {Comput. Commun.}, volume = {31}, number = {14}, pages = {3315--3327}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2008.05.018}, doi = {10.1016/J.COMCOM.2008.05.018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/XenakisNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Xenakis08, author = {Christos Xenakis}, title = {Security Measures and Weaknesses of the {GPRS} Security Architecture}, journal = {Int. J. Netw. Secur.}, volume = {6}, number = {2}, pages = {158--169}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n2/ijns-2008-v6-n2-p158-169.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Xenakis08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/XenakisAPS08, author = {Christos Xenakis and Danae Apostolopoulou and Angeliki Panou and Ioannis Stavrakakis}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {A Qualitative Risk Analysis for the {GPRS} Technology}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.123}, doi = {10.1109/EUC.2008.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/XenakisAPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iswpc/ZtoupisZSX08, author = {D. Ztoupis and K. Zarifis and Ioannis Stavrakakis and Christos Xenakis}, title = {Towards a security framework for an established autonomous network}, booktitle = {Third International Symposium on Wireless Pervasive Computing, {ISWPC} 2008, May 7-9, 2008, Santorini, Greece, Proceedings}, pages = {749--754}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISWPC.2008.4556310}, doi = {10.1109/ISWPC.2008.4556310}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iswpc/ZtoupisZSX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/XenakisN07, author = {Christos Xenakis and Christoforos Ntantogian}, title = {Security architectures for {B3G} mobile networks}, journal = {Telecommun. Syst.}, volume = {35}, number = {3-4}, pages = {123--139}, year = {2007}, url = {https://doi.org/10.1007/s11235-007-9044-2}, doi = {10.1007/S11235-007-9044-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/XenakisN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bionetics/NtantogianXS07, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, editor = {Falko Dressler}, title = {Efficient Authentication for Users Autonomy in Next Generation All-IP Networks}, booktitle = {2nd International {ICST} Conference on Bio-Inspired Models of Network, Information, and Computing Systems, {BIONETICS} 2007, Budapest, Hungary, December 10-13, 2007}, pages = {295--300}, publisher = {{ICST} / {IEEE}}, year = {2007}, url = {https://doi.org/10.4108/ICST.BIONETICS2007.2372}, doi = {10.4108/ICST.BIONETICS2007.2372}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bionetics/NtantogianXS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/NtantogianX07, author = {Christoforos Ntantogian and Christos Xenakis}, title = {A Security Protocol for Mutual Authentication and Mobile {VPN} Deployment in {B3G} Networks}, booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September 2007, Athens, Greece}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/PIMRC.2007.4394363}, doi = {10.1109/PIMRC.2007.4394363}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/NtantogianX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/NtantogianX07a, author = {Christoforos Ntantogian and Christos Xenakis}, title = {Reducing Authentication Traffic in 3G-WLAN Integrated Networks}, booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September 2007, Athens, Greece}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/PIMRC.2007.4394508}, doi = {10.1109/PIMRC.2007.4394508}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/NtantogianX07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XenakisLMS06, author = {Christos Xenakis and Nikolaos Laoutaris and Lazaros F. Merakos and Ioannis Stavrakakis}, title = {A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms}, journal = {Comput. Networks}, volume = {50}, number = {17}, pages = {3225--3241}, year = {2006}, url = {https://doi.org/10.1016/j.comnet.2005.12.005}, doi = {10.1016/J.COMNET.2005.12.005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/XenakisLMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Xenakis06, author = {Christos Xenakis}, title = {Malicious actions against the {GPRS} technology}, journal = {J. Comput. Virol.}, volume = {2}, number = {2}, pages = {121--133}, year = {2006}, url = {https://doi.org/10.1007/s11416-006-0021-1}, doi = {10.1007/S11416-006-0021-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Xenakis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/XenakisM06, author = {Christos Xenakis and Lazaros F. Merakos}, title = {Alternative Schemes for Dynamic Secure {VPN} Deployment in {UMTS}}, journal = {Wirel. Pers. Commun.}, volume = {36}, number = {2}, pages = {163--194}, year = {2006}, url = {https://doi.org/10.1007/s11277-006-8864-9}, doi = {10.1007/S11277-006-8864-9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/XenakisM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/XenakisM06, author = {Christos Xenakis and Lazaros F. Merakos}, editor = {Javier L{\'{o}}pez}, title = {Vulnerabilities and Possible Attacks Against the {GPRS} Backbone Network}, booktitle = {Critical Information Infrastructures Security, First International Workshop, {CRITIS} 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {4347}, pages = {262--272}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11962977\_21}, doi = {10.1007/11962977\_21}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/XenakisM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/gr/Xenakis04, author = {Christos Xenakis}, title = {{\(\Alpha\)}{\(\rho\)}{\(\chi\)}{\(\iota\)}{\(\tau\)}{\(\epsilon\)}{\(\kappa\)}{\(\tau\)}{\(o\)}{\(\nu\)}{\(\iota\)}{\(\kappa\)}{\(\acute{\epsilon}\)}{\(\varsigma\)} {\(\alpha\)}{\(\sigma\)}{\(\varphi\)}{\'{$\alpha$}}{\(\lambda\)}{\(\epsilon\)}{\(\iota\)}{\(\alpha\)}{\(\varsigma\)} {\(\epsilon\)}{\(\iota\)}{\(\kappa\)}{\(o\)}{\(\nu\)}{\(\iota\)}{\(\kappa\)}{\(\acute{\omega}\)}{\(\nu\)} {\(\iota\)}{\(\delta\)}{\(\iota\)}{\(\omega\)}{\(\tau\)}{\(\iota\)}{\(\kappa\)}{\(\acute{\omega}\)}{\(\nu\)} {\(\delta\)}{\(\iota\)}{\(\kappa\)}{\(\tau\)}{\(\acute{\upsilon}\)}{\(\omega\)}{\(\nu\)} {\(\sigma\)}{\(\epsilon\)} {\(\kappa\)}{\(\iota\)}{\(\nu\)}{\(\eta\)}{\(\tau\)}{\'{$\alpha$}} 3{\(\eta\)}{\(\varsigma\)} {\(\gamma\)}{\(\epsilon\)}{\(\nu\)}{\(\iota\)}{\'{$\alpha$}}{\(\varsigma\)}}, school = {National and Kapodistrian University of Athens, Greece}, year = {2004}, url = {http://hdl.handle.net/10442/hedi/22583}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/gr/Xenakis04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/XenakisM04, author = {Christos Xenakis and Lazaros F. Merakos}, title = {Security in third Generation Mobile Networks}, journal = {Comput. Commun.}, volume = {27}, number = {7}, pages = {638--650}, year = {2004}, url = {https://doi.org/10.1016/j.comcom.2003.12.004}, doi = {10.1016/J.COMCOM.2003.12.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/XenakisM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/XenakisM04a, author = {Christos Xenakis and Lazaros F. Merakos}, title = {IPsec-based end-to-end {VPN} deployment over {UMTS}}, journal = {Comput. Commun.}, volume = {27}, number = {17}, pages = {1693--1708}, year = {2004}, url = {https://doi.org/10.1016/j.comcom.2004.05.021}, doi = {10.1016/J.COMCOM.2004.05.021}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/XenakisM04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/XenakisM02, author = {Christos Xenakis and Lazaros F. Merakos}, title = {On demand network-wide {VPN} deployment in {GPRS}}, journal = {{IEEE} Netw.}, volume = {16}, number = {6}, pages = {28--37}, year = {2002}, url = {https://doi.org/10.1109/MNET.2002.1081763}, doi = {10.1109/MNET.2002.1081763}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/XenakisM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/XenakisM02, author = {Christos Xenakis and Lazaros F. Merakos}, title = {Dynamic network-based secure {VPN} deployment in {GPRS}}, booktitle = {The 13th {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 15-18, 2002}, pages = {1260--1265}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/PIMRC.2002.1045231}, doi = {10.1109/PIMRC.2002.1045231}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/XenakisM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/LoukasXMV98, author = {Nikolaos H. Loukas and Christos K. Xenakis and Lazaros F. Merakos and Iakovos S. Venieris}, title = {Signaling and mobility control for wireless intelligent {ATM} CPNs}, booktitle = {The 9th {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 1998, Boston, MA, USA, September 8-11, 1998}, pages = {738--743}, publisher = {{IEEE}}, year = {1998}, url = {https://doi.org/10.1109/PIMRC.1998.734661}, doi = {10.1109/PIMRC.1998.734661}, timestamp = {Tue, 19 May 2020 15:57:12 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/LoukasXMV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.