default search action
Christos Ilioudis
Person information
- affiliation: International Hellenic University, Greece
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Carmine Clemente, Daniel Tonelli, Alessandro Lotti, Finlay Rollo, Christos Ilioudis, Sebastian Diaz Riofrio, Filippo Biondi, Enrico Tubaldi, Malcolm Macdonald, Daniele Zonta, Massimo Zavagli, Mario Costantini, Federico Minati, Francesco Vecchioli, Pietro Milillo, Marc Zimmermanns, Ernesto Imbembo, Maria Michela Corvino:
On Micro-Motion Extraction from High Resolution X-band SAR products. IGARSS 2024: 1182-1186 - [c20]Sotiris Raptis, Ioannis Tsougos, Kiki Theodorou, Christos Ilioudis:
Harmonizing Radiomics and Interpretable AI: Precision and Transparency in Oncological Prognostication. ISBI 2024: 1-4 - 2023
- [j12]Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos:
An autoML network traffic analyzer for cyber threat detection. Int. J. Inf. Sec. 22(5): 1511-1530 (2023) - [c19]Alexandros Papanikolaou, Christos Ilioudis, Vasilis Katos:
Introducing responsibly self-healing into the incident management lifecycle. PETRA 2023: 335-337 - [c18]Alexandros Papanikolaou, Christos Ilioudis, Vasilis Katos:
Cyber-pi: Intelligent cyberthreat detection and supervised response. RCIS (Research Projects) 2023 - [i1]Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos:
A Cyber Threat Intelligence Management Platform for Industrial Environments. CoRR abs/2301.03445 (2023) - 2020
- [j11]Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, Vasilios Katos:
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Comput. 9(1): 18 (2020) - [c17]Arnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou, Christos Ilioudis:
An Innovative Self-Healing Approach with STIX Data Utilisation. ICETE (2) 2020: 645-651
2010 – 2019
- 2019
- [j10]Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos:
Improving Forensic Triage Efficiency through Cyber Threat Intelligence. Future Internet 11(7): 162 (2019) - [j9]Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios A. Baltatzis, George J. Pangalos:
Actionable threat intelligence for digital forensics readiness. Inf. Comput. Secur. 27(2): 273-291 (2019) - [j8]Konstantinos Rantos, George Drosatos, Antonios Kritsas, Christos Ilioudis, Alexandros Papanikolaou, Adam P. Filippidis:
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem. Secur. Commun. Networks 2019: 1431578:1-1431578:15 (2019) - [c16]Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr:
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. ARES 2019: 83:1-83:10 - 2018
- [c15]Konstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou:
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem. ICETE (2) 2018: 738-743 - [c14]Konstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou, Antonios Kritsas:
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology. SecITC 2018: 300-313 - 2014
- [j7]Simeon Veloudis, Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos:
A formal framework to support dynamic authorisation in collaborative environments. Int. J. Comput. Sci. Eng. 9(4): 278-291 (2014) - [j6]Spyridon Kollias, Vasileios Vlachos, Alexandros Papanikolaou, Periklis Chatzimisios, Christos Ilioudis, Kostas S. Metaxiotis:
A global-local approach for estimating the Internet's threat level. J. Commun. Networks 16(4): 407-414 (2014) - [c13]Spyridon Kollias, Vasileios Vlachos, Alexandros Papanikolaou, Periklis Chatzimisios, Christos Ilioudis, Kostas S. Metaxiotis:
Measuring the Internet's threat level: A global-local approach. ISCC 2014: 1-6 - 2013
- [j5]Alexandros Papanikolaou, Vasileios Vlachos, Andreas Venieris, Christos Ilioudis, Konstantinos Papapanagiotou, Anastasios Stasinopoulos:
A framework for teaching network security in academic environments. Inf. Manag. Comput. Secur. 21(4): 315-338 (2013) - [c12]Alkiviadis Tsimpiris, Dimitris Kugiumtzis, Anastasios Drosou, Christos Ilioudis, George Pangalos, Dimitrios Tzovaras:
Geometrical facial feature selection for person identification. FUSION 2013: 730-735 - 2012
- [j4]Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos:
A Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments. Inf. Secur. J. A Glob. Perspect. 21(1): 12-27 (2012) - [j3]Thanasis Vafeiadis, Alexandros Papanikolaou, Christos Ilioudis, Stefanos Charchalakis:
Real-time network data analysis using time series models. Simul. Model. Pract. Theory 29: 173-180 (2012) - [c11]Nikos Vesyropoulos, Christos K. Georgiadis, Christos Ilioudis:
Analyzing the selection and dynamic composition of web services in e-commerce transactions. BCI 2012: 130-135 - [c10]Veroniki Stamati-Koromina, Christos Ilioudis, Richard E. Overill, Christos K. Georgiadis, Demosthenes Stamatis:
Insider threats in corporate environments: a case study for data leakage prevention. BCI 2012: 271-274 - 2011
- [j2]Alexandros Zaharis, Adamantini Martini, Theo Tryfonas, Christos Ilioudis, George Pangalos:
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. Int. J. Digit. Crime Forensics 3(4): 29-41 (2011) - [c9]Vasileios Vlachos, Christos Ilioudis, Alexandros Papanikolaou:
On the Evolution of Malware Species. ICGS3/e-Democracy 2011: 54-61 - [c8]Alexandros Papanikolaou, Vassilios Karakoidas, Vasileios Vlachos, Andreas Venieris, Christos Ilioudis, Georgios Zouganelis:
A Hacker's Perspective on Educating Future Security Experts. Panhellenic Conference on Informatics 2011: 68-72 - [c7]Alexandros Zaharis, Adamantini Martini, Theodore Tryfonas, Christos Ilioudis, George Pangalos:
Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination. WDFIA 2011: 55-68 - 2010
- [c6]George Pangalos, Christos Ilioudis, Ioannis Pagkalos:
The Importance of Corporate Forensic Readiness in the Information Security Framework. WETICE 2010: 12-16
2000 – 2009
- 2009
- [c5]A. Samaras, George Pangalos, Christos Ilioudis, Ioannis Pagkalos:
Using Nature and Bio-inspired Technologies for Building Innovative Proactive Security Mechanisms. Panhellenic Conference on Informatics 2009: 7-13 - [c4]Alexandros Zaharis, Adamantini Martini, Christos Ilioudis:
Data Hiding in the SWF Format and Spreading through Social Network Services. WDFIA 2009: 105-114 - 2008
- [j1]Ioannis Mavridis, Andreas K. Mattas, Ioannis Pagkalos, Isabella Kotini, Christos Ilioudis:
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time. Int. J. Inf. Comput. Secur. 2(4): 328-352 (2008) - [c3]Alexandros Papanikolaou, Christos Ilioudis, Christos K. Georgiadis, Elias Pimenidis:
The importance of biometric sensor continuous secure monitoring. ICDIM 2008: 569-574 - 2007
- [c2]Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos, Christos K. Georgiadis:
Securing Healthgrid Environments. SECRYPT 2007: 394-401 - 2001
- [b1]Christos Ilioudis:
Ασφάλεια διαδικτυακών πληροφοριακών συστημάτων. Aristotle University Of Thessaloniki, Greece, 2001 - [c1]Christos Ilioudis, George Pangalos, Athena Vakali:
Security Model for XML Data. International Conference on Internet Computing (1) 2001: 400-406
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint