default search action
Efstratios Chatzoglou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j13]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, Stefanos Gritzalis:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. Comput. Secur. 125: 103051 (2023) - [j12]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis:
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study. Int. J. Inf. Sec. 22(2): 347-365 (2023) - [j11]Efstratios Chatzoglou, Sotirios K. Goudos:
Beam-Selection for 5G/B5G Networks Using Machine Learning: A Comparative Study. Sensors 23(6): 2967 (2023) - 2022
- [j10]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias, Christos Smiliotopoulos:
Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems. IEEE Access 10: 64761-64784 (2022) - [j9]Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos D. Zaroliagis:
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations. Cryptogr. 6(4): 53 (2022) - [j8]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE. J. Inf. Secur. Appl. 64: 103058 (2022) - [j7]Vyron Kampourakis, Georgios Kambourakis, Efstratios Chatzoglou, Christos D. Zaroliagis:
Revisiting man-in-the-middle attacks against HTTPS. Netw. Secur. 2022(3) (2022) - [j6]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces. Secur. Commun. Networks 2022: 1833062:1-1833062:24 (2022) - [j5]Efstratios Chatzoglou, Georgios Kambourakis, Christos Smiliotopoulos:
Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny. Sensors 22(2): 513 (2022) - [j4]Efstratios Chatzoglou, Georgios Kambourakis, Christos Smiliotopoulos, Constantinos Kolias:
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features. Sensors 22(15): 5633 (2022) - 2021
- [j3]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset. IEEE Access 9: 34188-34205 (2021) - [j2]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
WiF0: All Your Passphrase Are Belong to Us. Computer 54(7): 82-88 (2021) - [j1]Efstratios Chatzoglou, Georgios Kambourakis, Vasileios Kouliaridis:
A Multi-Tier Security Analysis of Official Car Management Apps for Android. Future Internet 13(3): 58 (2021)
Conference and Workshop Papers
- 2024
- [c3]Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers. SEC 2024: 61-75 - 2023
- [c2]Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas:
Bypassing antivirus detection: old-school malware, new tricks. ARES 2023: 150:1-150:10 - [c1]Efstratios Chatzoglou, Vyron Kampourakis, Georgios Kambourakis:
Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames. SEC 2023: 250-264
Informal and Other Publications
- 2024
- [i5]Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Keep your memory dump shut: Unveiling data leaks in password managers. CoRR abs/2404.00423 (2024) - 2023
- [i4]Efstratios Chatzoglou, Vyron Kampourakis, Georgios Kambourakis:
Bl0ck: Paralyzing 802.11 connections through Block Ack frames. CoRR abs/2302.05899 (2023) - [i3]Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas:
Bypassing antivirus detection: old-school malware, new tricks. CoRR abs/2305.04149 (2023) - [i2]José Luis Hernández Ramos, Georgios Karopoulos, Efstratios Chatzoglou, Vasileios Kouliaridis, Enrique Mármol Campos, Aurora González-Vidal, Georgios Kambourakis:
Intrusion Detection based on Federated Learning: a systematic review. CoRR abs/2308.09522 (2023) - 2022
- [i1]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, Stefanos Gritzalis:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. CoRR abs/2208.06722 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint