[go: up one dir, main page]

Follow
Georgios Kambourakis
Georgios Kambourakis
Professor, Dept. of Information and Communication Systems Eng., University of the Aegean
Verified email at aegean.gr - Homepage
Title
Cited by
Cited by
Year
DDoS in the IoT: Mirai and other botnets
C Kolias, G Kambourakis, A Stavrou, J Voas
Computer 50 (7), 80-84, 2017
26222017
Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset
C Kolias, G Kambourakis, A Stavrou, S Gritzalis
IEEE Communications Surveys & Tutorials 18 (1), 184-208, 2015
6882015
The mirai botnet and the iot zombie armies
G Kambourakis, C Kolias, A Stavrou
MILCOM 2017-2017 IEEE military communications conference (MILCOM), 267-272, 2017
3382017
Survey of security vulnerabilities in session initiation protocol.
D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ...
IEEE Communications Surveys and Tutorials 8 (1-4), 68-81, 2006
2732006
Swarm intelligence in intrusion detection: A survey
C Kolias, G Kambourakis, M Maragoudakis
computers & security 30 (8), 625-642, 2011
2512011
Introducing deep learning self-adaptive misuse network intrusion detection systems
D Papamartzivanos, FG Mármol, G Kambourakis
IEEE access 7, 13546-13560, 2019
2142019
DNS amplification attack revisited
M Anagnostopoulos, G Kambourakis, P Kopanos, G Louloudakis, ...
Computers & Security 39, 475-485, 2013
1992013
Detecting DNS amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
International workshop on critical information infrastructures security, 185-196, 2007
1902007
Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks
P Nespoli, D Papamartzivanos, FG Mármol, G Kambourakis
IEEE Communications Surveys & Tutorials 20 (2), 1361-1396, 2017
1852017
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents
GM Makrakis, C Kolias, G Kambourakis, C Rieger, J Benjamin
IEEE Access 9, 165295-165325, 2021
176*2021
Dendron: Genetic trees driven rule induction for network intrusion detection systems
D Papamartzivanos, FG Mármol, G Kambourakis
Future Generation Computer Systems 79, 558-574, 2018
1642018
A critical review of 13 years of mobile game-based learning
F Giannakas, G Kambourakis, A Papasalouros, S Gritzalis
Educational Technology Research and Development 66 (2), 341-384, 2018
1582018
Introducing touchstroke: keystroke‐based authentication system for smartphones
G Kambourakis, D Damopoulos, D Papamartzivanos, E Pavlidakis
Security and Communication Networks 9 (6), 542-554, 2016
1562016
A critical review of 7 years of Mobile Device Forensics
K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos
Digital Investigation 10 (4), 323-349, 2013
1482013
The convergence of artificial intelligence and blockchain: The state of play and the road ahead
D Bhumichai, C Smiliotopoulos, R Benton, G Kambourakis, ...
Information 15 (5), 268, 2024
1472024
A comprehensive survey on machine learning techniques for android malware detection
V Kouliaridis, G Kambourakis
Information 12 (5), 185, 2021
1432021
Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps
T Martin, G Karopoulos, JL Hernández-Ramos, G Kambourakis, ...
Wireless Communications and Mobile Computing 2020, 2020
1422020
Empirical evaluation of attacks against IEEE 802.11 enterprise networks: The AWID3 dataset
E Chatzoglou, G Kambourakis, C Kolias
IEEE Access 9, 34188-34205, 2021
1412021
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
1302012
Automatic detection of online recruitment frauds: Characteristics, methods, and a public dataset
S Vidros, C Kolias, G Kambourakis, L Akoglu
Future Internet 9 (1), 6, 2017
1252017
The system can't perform the operation now. Try again later.
Articles 1–20