[go: up one dir, main page]

Follow
Christos Xenakis
Christos Xenakis
Professor, Department of Digital Systems, University of Piraeus
Verified email at unipi.gr - Homepage
Title
Cited by
Cited by
Year
Helphed: Hybrid ensemble learning phishing email detection
P Bountakas, C Xenakis
Journal of network and computer applications 210, 103545, 2023
1092023
Security in third generation mobile networks
C Xenakis, L Merakos
Computer communications 27 (7), 638-650, 2004
942004
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
C Xenakis, N Laoutaris, L Merakos, I Stavrakakis
Computer Networks 50 (17), 3225-3241, 2006
922006
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
C Xenakis, C Panos, I Stavrakakis
Computers & Security 30 (1), 63-80, 2011
892011
A comparison of natural language processing and machine learning methods for phishing email detection
P Bountakas, K Koutroumpouchos, C Xenakis
Proceedings of the 16th International Conference on Availability …, 2021
862021
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks
C Panos, C Ntantogian, S Malliaros, C Xenakis
Computer Networks 113, 94-110, 2017
862017
Defense strategies for adversarial machine learning: A survey
P Bountakas, A Zarras, A Lekidis, C Xenakis
Computer Science Review 49, 100573, 2023
752023
MITRE ATT&CK-driven cyber risk assessment
M Ahmed, S Panda, C Xenakis, E Panaousis
Proceedings of the 17th International Conference on Availability …, 2022
752022
Evaluating the privacy of Android mobile applications under forensic analysis
C Ntantogian, D Apostolopoulos, G Marinakis, C Xenakis
Computers & Security 42, 66-76, 2014
682014
Evaluation of cryptography usage in android applications
A Chatzikonstantinou, C Ntantogian, G Karopoulos, C Xenakis
Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016
622016
Evaluation of password hashing schemes in open source web platforms
C Ntantogian, S Malliaros, C Xenakis
Computers & Security 84, 206-224, 2019
602019
Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications
A Stasinopoulos, C Ntantogian, C Xenakis
International Journal of Information Security 18 (1), 49-72, 2019
592019
Automated cyber and privacy risk management toolkit
G Gonzalez-Granadillo, SA Menesidou, D Papamartzivanos, R Romeu, ...
Sensors 21 (16), 5493, 2021
442021
Discovering authentication credentials in volatile memory of android mobile devices
D Apostolopoulos, G Marinakis, C Ntantogian, C Xenakis
Conference on e-Business, e-Services and e-Society, 178-185, 2013
422013
One-pass EAP-AKA authentication in 3G-WLAN integrated networks
C Ntantogian, C Xenakis
Wireless personal communications 48 (4), 569-584, 2009
422009
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
A Farao, G Paparis, S Panda, E Panaousis, A Zarras, C Xenakis
International Journal of Information Security 23 (1), 347-371, 2024
402024
ObjectMap: Detecting insecure object deserialization
N Koutroumpouchos, G Lavdanis, E Veroni, C Ntantogian, C Xenakis
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 67-72, 2019
402019
P4G2Go: a privacy-preserving scheme for roaming energy consumers of the smart grid-to-go
A Farao, E Veroni, C Ntantogian, C Xenakis
Sensors 21 (8), 2686, 2021
392021
Building trust for smart connected devices: The challenges and pitfalls of TrustZone
N Koutroumpouchos, C Ntantogian, C Xenakis
Sensors 21 (2), 520, 2021
362021
Secure edge computing with lightweight control-flow property-based attestation
N Koutroumpouchos, C Ntantogian, SA Menesidou, K Liang, P Gouvas, ...
2019 IEEE Conference on Network Softwarization (NetSoft), 84-92, 2019
352019
The system can't perform the operation now. Try again later.
Articles 1–20