


default search action
Christos Xenakis
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e3]Sokratis K. Katsikas
, Christos Xenakis
, Christos Kalloniatis
, Costas Lambrinoudakis
:
Information and Communications Security - 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15056, Springer 2025, ISBN 978-981-97-8797-5 [contents] - [e2]Sokratis K. Katsikas
, Christos Xenakis
, Christos Kalloniatis
, Costas Lambrinoudakis
:
Information and Communications Security - 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15057, Springer 2025, ISBN 978-981-97-8800-2 [contents] - 2024
- [j48]Anna Angelogianni
, Ilias Politis
, Christos Xenakis
:
How many FIDO protocols are needed? Analysing the technology, security and compliance. ACM Comput. Surv. 56(8): 214:1-214:51 (2024) - [j47]Aristeidis Farao
, Georgios Paparis
, Sakshyam Panda
, Emmanouil Panaousis
, Apostolis Zarras
, Christos Xenakis
:
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. Int. J. Inf. Sec. 23(1): 347-371 (2024) - [c64]Georgios Petihakis
, Aristeidis Farao
, Panagiotis Bountakas
, Athanasia Sabazioti, John Polley
, Christos Xenakis
:
AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks. ARES 2024: 126:1-126:7 - [c63]Aristeidis Farao
, Christoforos Ntantogian
, Stylianos Karagiannis
, Emmanouil Magkos
, Alexandra Dritsa
, Christos Xenakis
:
NITRO: an Interconnected 5G-IoT Cyber Range. ARES 2024: 129:1-129:6 - [c62]Anastassios Voudouris
, Aristeidis Farao
, Aggeliki Panou
, John Polley
, Christos Xenakis
:
Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space Networks. ARES 2024: 134:1-134:8 - [i5]Martiño Rivera-Dourado, Christos Xenakis, Alejandro Pazos, José Manuel Vázquez-Naya:
EAP-FIDO: A Novel EAP Method for Using FIDO2 Credentials for Network Authentication. CoRR abs/2412.03277 (2024) - 2023
- [j46]Panagiotis Bountakas
, Apostolis Zarras
, Alexios Lekidis
, Christos Xenakis:
Defense strategies for Adversarial Machine Learning: A survey. Comput. Sci. Rev. 49: 100573 (2023) - [j45]Panagiotis Bountakas
, Christos Xenakis:
HELPHED: Hybrid Ensemble Learning PHishing Email Detection. J. Netw. Comput. Appl. 210: 103545 (2023) - [c61]George Petihakis
, Dimitrios Kiritsis
, Aristeidis Farao
, Panagiotis Bountakas
, Aggeliki Panou
, Christos Xenakis
:
A Bring Your Own Device security awareness survey among professionals. ARES 2023: 92:1-92:10 - [c60]Michail Bampatsikos
, Ilias Politis
, Vaios Bolgouras
, Christos Xenakis
:
Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT. ARES 2023: 94:1-94:8 - [c59]Vaios Bolgouras
, Kostantinos Papadamou
, Ioana Stroinea
, Michail Papadakis
, George Gugulea
, Michael Sirivianos
, Christos Xenakis
:
Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era. ARES 2023: 95:1-95:8 - [c58]Konstantinos Loupos, Harris Niavis
, Fotis Michalopoulos
, George Misiakoulis, Antonio F. Skarmeta
, Jesús Garcia
, Angel Palomares
, Hui Song, Rustem Dautov, Francesca Giampaolo, Rosella Mancilla, Francesca Costantino, Dimitri Van Landuyt
, Sam Michiels
, Stefan More
, Christos Xenakis, Michail Bampatsikos, Ilias Politis, Konstantinos Krilakis, Sokratis Vavilis
:
An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management. ARES 2023: 98:1-98:6 - [c57]Vasileios Pantelakis
, Panagiotis Bountakas
, Aristeidis Farao
, Christos Xenakis
:
Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic. ARES 2023: 100:1-100:8 - [c56]Thodoris Ioannidis
, Vaios Bolgouras
, Christos Xenakis
, Ilias Politis
:
Securing the Flow: Security and Privacy Tools for Flow-based Programming. ARES 2023: 103:1-103:6 - [c55]Emmanouil G. Spanakis, Ilias Politis, Evangelos K. Markakis, Dimitra Papatsaroucha, Athanasios Vasileios Grammatopoulos, Vaios Bolgouras, Anna Angelogianni, Christos Xenakis, Vangelis Sakkalis:
Towards building a Self-Sovereign Identity Framework for Healthcare. EMBC 2023: 1-4 - [c54]Ioannis Stylianou, Ilias Politis, Christos Xenakis:
Enhancing 3GPP CAPIF Authentication and Authorization Across Mobile Operators Using OpenID Connect and Single Sign-On. ICC 2023: 5310-5315 - [c53]Ioannis P. Chochliouros
, Michail-Alexandros Kourtis, George Xilouris, Wouter Tavernier, Enrique Areizaga Sanchez, Margarita Anastassova, Christian Bolzmacher, Nikolay Tcholtchev
, Antonello Corsi, Panagiotis Trakadas, Marta Millet, Christos Xenakis, Adnan Imeri, Francesco Bellesini, Paride D'Ostilio, Albertos Markakis, Ihsan Bal Engin, Antonis Litke, Lucrezia Maria Quarato, Diego Cugat, Georgios Gardikis, Charilaos C. Zarakovitis
, Stéphane Bouilland, Zaharias D. Zaharis, Christina Lessi, Dimitrios N. Arvanitozisis, Anastasia S. Spiliopoulou:
OASEES: An Innovative Scope for a DAO-Based Programmable Swarm Solution, for Decentralizing AI Applications Close to Data Generation Locations. AIAI Workshops 2023: 91-105 - [i4]Vaios Bolgouras, Thodoris Ioannidis, Ilias Politis, Christos Xenakis:
RETINA: Distributed and Secure Trust Management for Smart Grid Applications and Energy Trading. CoRR abs/2306.08074 (2023) - 2022
- [j44]Panagiotis Bountakas, Christoforos Ntantogian, Christos Xenakis
:
EKnad: Exploit Kits' network activity detection. Future Gener. Comput. Syst. 134: 219-235 (2022) - [j43]Christos Lyvas, Christoforos Ntantogian, Christos Xenakis
:
[m]allotROPism: a metamorphic engine for malicious software variation development. Int. J. Inf. Sec. 21(1): 61-78 (2022) - [j42]Eleni Veroni
, Christoforos Ntantogian, Christos Xenakis
:
A large-scale analysis of Wi-Fi passwords. J. Inf. Secur. Appl. 67: 103190 (2022) - [j41]Antonio Jesús Díaz-Honrubia
, Alberto Blázquez-Herranz
, Lucía Prieto Santamaría
, Ernestina Menasalvas Ruiz, Alejandro Rodríguez González
, Gustavo Gonzalez Granadillo, Rodrigo Diaz, Emmanouil Panaousis
, Christos Xenakis
:
A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool. J. Inf. Secur. Appl. 71: 103350 (2022) - [j40]Athanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis:
Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 96-127 (2022) - [j39]George Suciu
, Aristeidis Farao
, Giorgio Bernardinetti, Ivan Palamà
, Mari-Anais Sachian, Alexandru Vulpe
, Marius-Constantin Vochin
, Pavel Muresan, Michail Bampatsikos
, Antonio Muñoz
, Christos Xenakis
:
SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform. Sensors 22(17): 6527 (2022) - [c52]Christos Tselios, Ilias Politis, Christos Xenakis
:
Improving Network, Data and Application Security for SMEs. ARES 2022: 95:1-95:8 - [c51]Vaios Bolgouras, Anna Angelogianni
, Ilias Politis, Christos Xenakis
:
Trusted and Secure Self-Sovereign Identity framework. ARES 2022: 101:1-101:6 - [c50]Anastassios Voudouris, Ilias Politis, Christos Xenakis
:
Secret sharing a key in a distributed way, Lagrange vs Newton. ARES 2022: 105:1-105:7 - [c49]Mohamed Ahmed, Sakshyam Panda
, Christos Xenakis
, Emmanouil Panaousis:
MITRE ATT&CK-driven Cyber Risk Assessment. ARES 2022: 107:1-107:10 - [c48]Ioannis Kalderemidis, Aristeidis Farao
, Panagiotis Bountakas, Sakshyam Panda
, Christos Xenakis
:
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments. ARES 2022: 120:1-120:9 - [c47]Konstantinos Loupos, Christos Kalogirou, Harris Niavis
, Antonio F. Skarmeta, Elena Torroglosa-García, Angel Palomares, Hui Song, Paul-Emmanuel Brun, Francesca Giampaolo, Dimitri Van Landuyt
, Sam Michiels
, Blaz Podgorelec
, Christos Xenakis, Michail Bampatsikos, Konstantinos Krilakis:
A Holistic Approach for IoT Networks' Identity and Trust Management - The ERATOSTHENES Project. GIOTS 2022: 338-347 - [c46]Marios Karatisoglou, Aristeidis Farao
, Vaios Bolgouras, Christos Xenakis
:
BRIDGE: BRIDGing the gap bEtween CTI production and consumption. COMM 2022: 1-6 - [c45]Christos Bellas, Georgia Kougka, Athanasios Naskos, Anastasios Gounaris, Athena Vakali, Christos Xenakis, Apostolos Papadopoulos:
Facilitating DoS Attack Detection using Unsupervised Anomaly Detection. SSDBM 2022: 24:1-24:4 - [c44]Filippo Rebecchi, Antonio Pastor, Alberto Mozo, Chiara Lombardo, Roberto Bruschi, Ilias Aliferis, Roberto Doriguzzi Corin
, Panagiotis Gouvas, Antonio Álvarez Romero, Anna Angelogianni
, Ilias Politis, Christos Xenakis
:
A Digital Twin for the 5G Era: the SPIDER Cyber Range. WoWMoM 2022: 567-572 - 2021
- [j38]Dionysis Xenakis
, Anastasia Tsiota
, Christos-Thrasyvoulos Koulis, Christos Xenakis
, Nikos I. Passas:
Contract-Less Mobile Data Access Beyond 5G: Fully-Decentralized, High-Throughput and Anonymous Asset Trading Over the Blockchain. IEEE Access 9: 73963-74016 (2021) - [j37]Antonio Muñoz
, Aristeidis Farao
, Jordy Ryan Casas Correia, Christos Xenakis
:
P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements. Inf. 12(9): 357 (2021) - [j36]Christoforos Ntantogian, Panagiotis Bountakas
, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis
:
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation. J. Inf. Secur. Appl. 58: 102752 (2021) - [j35]Nikolaos Koutroumpouchos
, Christoforos Ntantogian, Christos Xenakis
:
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone. Sensors 21(2): 520 (2021) - [j34]Aristeidis Farao
, Eleni Veroni
, Christoforos Ntantogian, Christos Xenakis
:
P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go. Sensors 21(8): 2686 (2021) - [j33]George Suciu
, Mari-Anais Sachian, Alexandru Vulpe
, Marius-Constantin Vochin
, Aristeidis Farao
, Nikolaos Koutroumpouchos
, Christos Xenakis
:
SealedGRID: Secure and Interoperable Platform for Smart GRID Applications. Sensors 21(16): 5448 (2021) - [j32]Gustavo Gonzalez Granadillo
, Sofia-Anna Menesidou
, Dimitrios Papamartzivanos
, Ramon Romeu
, Diana Navarro-Llobet
, Caxton Okoh, Sokratis Nifakos, Christos Xenakis
, Emmanouil Panaousis
:
Automated Cyber and Privacy Risk Management Toolkit. Sensors 21(16): 5493 (2021) - [c43]Athanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis:
A web tool for analyzing FIDO2/WebAuthn Requests and Responses. ARES 2021: 125:1-125:10 - [c42]Panagiotis Bountakas
, Konstantinos Koutroumpouchos, Christos Xenakis:
A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection. ARES 2021: 127:1-127:12 - [c41]Michail Bampatsikos
, Ilias Politis, Christos Xenakis, Stelios C. A. Thomopoulos
:
Solving the cold start problem in Trust Management in IoT. ARES 2021: 128:1-128:9 - [c40]Anna Angelogianni
, Ilias Politis, Pier Luigi Polvanesi, Antonio Pastor, Christos Xenakis:
Unveiling the user requirements of a cyber range for 5G security testing and training. CAMAD 2021: 1-6 - [c39]Gustavo Gonzalez Granadillo, Rodrigo Diaz, Eleni Veroni, Christos Xenakis:
A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations. ITASEC 2021: 47-60 - [i3]Ilias Politis, Christos Xenakis, Adarbad Master, John Polley:
On an innovative architecture for digital immunity passports and vaccination certificates. CoRR abs/2103.04142 (2021) - [i2]Anna Angelogianni, Ilias Politis, Christos Xenakis:
How many FIDO protocols are needed? Surveying the design, security and market perspectives. CoRR abs/2107.00577 (2021) - 2020
- [j31]Anna Angelogianni
, Ilias Politis
, Farnaz Mohammadi
, Christos Xenakis
:
On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats. IEEE Access 8: 224677-224701 (2020) - [j30]Kevin I. Jones, Helge Janicke, Leandros Maglaras
, Christos Xenakis
:
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems". J. Inf. Secur. Appl. 54: 102542 (2020) - [j29]Kostantinos Papadamou
, Steven Gevers, Christos Xenakis
, Michael Sirivianos, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea
, Alberto Caponi, Annamaria Recupero
, Claudio Pisa, Giuseppe Bianchi:
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication. IEEE Trans. Inf. Forensics Secur. 15: 2183-2193 (2020) - [j28]Vaios Bolgouras
, Christoforos Ntantogian, Emmanouil Panaousis
, Christos Xenakis
:
Distributed Key Management in Microgrids. IEEE Trans. Ind. Informatics 16(3): 2125-2133 (2020) - [c38]Apostolos Xenakis, Christos Xenakis, Sarantos Psycharis
, Konstantinos Kalovrektis:
Calculation of the Hubble Universe Expansion Constant by Analyzing Observational Data: An Exploratory Teaching Proposal based on STEM Epistemology. EDUCON 2020: 170-177 - [c37]Antonio Muñoz
, Aristeidis Farao
, Jordy Ryan Casas Correia, Christos Xenakis:
ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM). DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 147-165 - [c36]George Suciu, Cristiana Istrate, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin
, Aristeidis Farao
, Christos Xenakis
:
FI-WARE authorization in a Smart Grid scenario. GIoTS 2020: 1-5 - [c35]Aristeidis Farao
, Sakshyam Panda
, Sofia-Anna Menesidou
, Entso Veliou, Nikolaos Episkopos, George Kalatzantonakis, Farnaz Mohammadi
, Nikolaos Georgopoulos, Michael Sirivianos, Nikos Salamanos, Spyros Loizou, Michalis Pingos, John Polley, Andrew Fielder, Emmanouil Panaousis
, Christos Xenakis
:
SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions. TrustBus 2020: 65-74
2010 – 2019
- 2019
- [j27]Christoforos Ntantogian, Eleni Veroni
, Georgios Karopoulos, Christos Xenakis
:
A survey of voice and communication protection solutions against wiretapping. Comput. Electr. Eng. 77: 163-178 (2019) - [j26]Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis
:
Evaluation of password hashing schemes in open source web platforms. Comput. Secur. 84: 206-224 (2019) - [j25]Christoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis
:
Transforming malicious code to ROP gadgets for antivirus evasion. IET Inf. Secur. 13(6): 570-578 (2019) - [j24]Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis
:
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications. Int. J. Inf. Sec. 18(1): 49-72 (2019) - [c34]Aristeidis Farao
, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis
, Javier López:
SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications. CRITIS 2019: 169-175 - [c33]Nikos Koutroumpouchos
, Christoforos Ntantogian, Sofia-Anna Menesidou
, Kaitai Liang
, Panagiotis Gouvas, Christos Xenakis
, Thanassis Giannetsos:
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation. NetSoft 2019: 84-92 - [c32]Nikolaos Koutroumpouchos
, Georgios Lavdanis, Eleni Veroni
, Christoforos Ntantogian, Christos Xenakis
:
ObjectMap: detecting insecure object deserialization. PCI 2019: 67-72 - [c31]Michail Bampatsikos
, Christoforos Ntantogian, Christos Xenakis
, Stelios C. A. Thomopoulos:
BARRETT BlockchAin Regulated REmote aTTestation. WI (Companion) 2019: 256-262 - [c30]Farnaz Mohammadi
, Angeliki Panou, Christoforos Ntantogian, Eirini D. Karapistoli, Emmanouil Panaousis
, Christos Xenakis
:
CUREX: seCUre and pRivate hEalth data eXchange. WI (Companion) 2019: 263-268 - 2018
- [j23]Georgios Karopoulos
, Christoforos Ntantogian, Christos Xenakis
:
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem. Comput. Secur. 73: 307-325 (2018) - [c29]Theodoula-Ioanna Kitsaki, Anna Angelogianni
, Christoforos Ntantogian, Christos Xenakis
:
A forensic investigation of Android mobile applications. PCI 2018: 58-63 - [i1]Kostantinos Papadamou, Savvas Zannettou, Giuseppe Bianchi, Alberto Caponi, Annamaria Recupero, Steven Gevers, George Gugulea, Sorin Teican, Bogdan Chifor, Christos Xenakis, Michael Sirivianos:
Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication. CoRR abs/1811.08360 (2018) - 2017
- [j22]Christoforos Panos, Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis
:
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Comput. Networks 113: 94-110 (2017) - [c28]Georgios Karopoulos, Christos Xenakis
, Stefano Tennina, Stefanos Evangelopoulos:
Towards trusted metering in the smart grid. CAMAD 2017: 1-5 - [c27]Angeliki Panou, Christoforos Ntantogian, Christos Xenakis
:
RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance. PCI 2017: 32:1-32:6 - [c26]Christoforos Panos, Stefanos Malliaros, Christoforos Ntantogian, Angeliki Panou, Christos Xenakis
:
A Security Evaluation of FIDO's UAF Protocol in Mobile and Embedded Devices. TIWDC 2017: 127-142 - 2016
- [j21]Christos Xenakis
, Christoforos Ntantogian, Orestis Panos:
(U)SimMonitor: A mobile application for security evaluation of cellular networks. Comput. Secur. 60: 62-78 (2016) - [j20]Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis
:
Evaluation of Cryptography Usage in Android Applications. EAI Endorsed Trans. Security Safety 3(9): e4 (2016) - [c25]Stefanos Malliaros, Christoforos Ntantogian, Christos Xenakis
:
Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks. ARES 2016: 687-693 - 2015
- [j19]Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis
:
Gaithashing: A two-factor authentication scheme based on gait features. Comput. Secur. 52: 17-32 (2015) - [c24]Foivos F. Demertzis, Georgios Karopoulos, Christos Xenakis
, Andrea Colarieti:
Self-organised Key Management for the Smart Grid. ADHOC-NOW 2015: 303-316 - [c23]Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis:
Evaluation of Cryptography Usage in Android Applications. BICT 2015: 83-90 - [c22]Christos Xenakis
, Christoforos Ntantogian:
Attacking the baseband modem of mobile phones to breach the users' privacy and network security. CyCon 2015: 231-244 - [c21]Christoforos Ntantogian, Grigoris Valtas, Nikos Kapetanakis, Faidon Lalagiannis, Georgios Karopoulos, Christos Xenakis
:
Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software. TrustBus 2015: 73-86 - 2014
- [j18]Christoforos Panos, Christos Xenakis
, Platon Kotzias, Ioannis Stavrakakis
:
A specification-based intrusion detection engine for infrastructure-less networks. Comput. Commun. 54: 67-83 (2014) - [j17]Christos Xenakis
, Christoforos Ntantogian:
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks. Comput. Secur. 40: 84-94 (2014) - [j16]Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis
:
Evaluating the privacy of Android mobile applications under forensic analysis. Comput. Secur. 42: 66-76 (2014) - [c20]Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis
:
Bypassing XSS Auditor: Taking advantage of badly written PHP code. ISSPIT 2014: 290-295 - 2013
- [j15]Foivos F. Demertzis, Christos Xenakis
:
SOMA-E: Self-organized mesh authentication - Extended. Math. Comput. Model. 57(7-8): 1606-1616 (2013) - [c19]Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis
:
Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices. I3E 2013: 178-185 - [c18]Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis
:
The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks. ISSPIT 2013: 135-139 - [c17]Charalampos Petrou, Christoforos Ntantogian, Christos Xenakis
:
A Better Time Approximation Scheme for e-Passports. TrustBus 2013: 13-23 - 2012
- [j14]Christoforos Ntantogian, Christos Xenakis
:
Questioning the Feasibility of UMTS-GSM Interworking Attacks. Wirel. Pers. Commun. 65(1): 157-163 (2012) - [c16]Dimitris Tsolkas, Nikos I. Passas, Christos Xenakis
, Vassilis Papataxiarhis, Vassileios Tsetsos:
Busfinder: A Personalized Multimodal Transportation Guide with Dynamic Routing. Panhellenic Conference on Informatics 2012: 25-30 - [c15]Christoforos Ntantogian, Christos Xenakis
, Ioannis Stavrakakis
:
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks. SEC 2012: 475-488 - [c14]Christoforos Panos, Platon Kotzias, Christos Xenakis
, Ioannis Stavrakakis
:
Securing the 802.11 MAC in MANETs: A specification-based intrusion detection engine. WONS 2012: 16-22 - 2011
- [j13]Christos Xenakis
, Christoforos Panos, Ioannis Stavrakakis
:
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Comput. Secur. 30(1): 63-80 (2011) - [j12]Christoforos Ntantogian, Christos Xenakis
, Ioannis Stavrakakis
:
Reducing False Synchronizations in 3G-WLAN Integrated Networks. IEEE Trans. Wirel. Commun. 10(11): 3765-3773 (2011) - [c13]Eleni Darra, Christoforos Ntantogian, Christos Xenakis
, Sokratis K. Katsikas
:
A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks. TrustBus 2011: 138-149 - [c12]Christoforos Panos, Christos Xenakis
, Ioannis Stavrakakis
:
An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks. TrustBus 2011: 150-160 - [e1]Christos Xenakis
, Stephen D. Wolthusen:
Critical Information Infrastructures Security - 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers. Lecture Notes in Computer Science 6712, Springer 2011, ISBN 978-3-642-21693-0 [contents] - 2010
- [j11]Christoforos Ntantogian, Christos Xenakis
, Ioannis Stavrakakis
:
A generic mechanism for efficient authentication in B3G networks. Comput. Secur. 29(4): 460-475 (2010) - [c11]Nikos Vavoulas, Christos Xenakis
:
A Quantitative Risk Analysis Approach for Deliberate Threats. CRITIS 2010: 13-25 - [c10]Foivos F. Demertzis, Christos Xenakis
:
SOMA: Self-Organised Mesh Authentication. EuroPKI 2010: 31-44 - [c9]Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis:
A Novel Intrusion Detection System for MANETs. SECRYPT 2010: 25-34
2000 – 2009
- 2009
- [j10]Christoforos Ntantogian, Christos Xenakis
:
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks. Wirel. Pers. Commun. 48(4): 569-584 (2009) - 2008
- [j9]Christos Xenakis
, Christoforos Ntantogian, Ioannis Stavrakakis
:
A network-assisted mobile VPN for securing users data in UMTS. Comput. Commun. 31(14): 3315-3327 (2008) - [j8]Christos Xenakis:
Security Measures and Weaknesses of the GPRS Security Architecture. Int. J. Netw. Secur. 6(2): 158-169 (2008) - [c8]Christos Xenakis
, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis
:
A Qualitative Risk Analysis for the GPRS Technology. EUC (2) 2008: 61-68 - [c7]D. Ztoupis, K. Zarifis, Ioannis Stavrakakis
, Christos Xenakis
:
Towards a security framework for an established autonomous network. ISWPC 2008: 749-754 - 2007
- [j7]Christos Xenakis
, Christoforos Ntantogian:
Security architectures for B3G mobile networks. Telecommun. Syst. 35(3-4): 123-139 (2007) - [c6]Christoforos Ntantogian, Christos Xenakis
, Ioannis Stavrakakis
:
Efficient Authentication for Users Autonomy in Next Generation All-IP Networks. BIONETICS 2007: 295-300 - [c5]Christoforos Ntantogian, Christos Xenakis
:
A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks. PIMRC 2007: 1-5 - [c4]Christoforos Ntantogian, Christos Xenakis
:
Reducing Authentication Traffic in 3G-WLAN Integrated Networks. PIMRC 2007: 1-5 - 2006
- [j6]Christos Xenakis
, Nikolaos Laoutaris
, Lazaros F. Merakos
, Ioannis Stavrakakis
:
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms. Comput. Networks 50(17): 3225-3241 (2006) - [j5]Christos Xenakis
:
Malicious actions against the GPRS technology. J. Comput. Virol. 2(2): 121-133 (2006) - [j4]Christos Xenakis
, Lazaros F. Merakos
:
Alternative Schemes for Dynamic Secure VPN Deployment in UMTS. Wirel. Pers. Commun. 36(2): 163-194 (2006) - [c3]Christos Xenakis
, Lazaros F. Merakos
:
Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. CRITIS 2006: 262-272 - 2004
- [b1]Christos Xenakis:
Αρχιτεκτονικές ασφάλειας εικονικών ιδιωτικών δικτύων σε κινητά 3ης γενιάς. National and Kapodistrian University of Athens, Greece, 2004 - [j3]Christos Xenakis
, Lazaros F. Merakos
:
Security in third Generation Mobile Networks. Comput. Commun. 27(7): 638-650 (2004) - [j2]Christos Xenakis
, Lazaros F. Merakos
:
IPsec-based end-to-end VPN deployment over UMTS. Comput. Commun. 27(17): 1693-1708 (2004) - 2002
- [j1]Christos Xenakis
, Lazaros F. Merakos
:
On demand network-wide VPN deployment in GPRS. IEEE Netw. 16(6): 28-37 (2002) - [c2]Christos Xenakis
, Lazaros F. Merakos
:
Dynamic network-based secure VPN deployment in GPRS. PIMRC 2002: 1260-1265
1990 – 1999
- 1998
- [c1]Nikolaos H. Loukas, Christos K. Xenakis, Lazaros F. Merakos, Iakovos S. Venieris:
Signaling and mobility control for wireless intelligent ATM CPNs. PIMRC 1998: 738-743
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint