default search action
Nikolaos Pitropakis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Marius Elmiger, Mouad Lemoudden, Nikolaos Pitropakis, William J. Buchanan:
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. Int. J. Inf. Sec. 23(1): 467-485 (2024) - [j30]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Nikolaos Pitropakis, Baraq Ghaleb, Amjad Ullah, Muhammad Attique Khan, William J. Buchanan:
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Trans. Consumer Electron. 70(4): 7087-7101 (2024) - [c32]Muhammad Shahbaz Khan, Jawad Ahmad, Muhammad Ali, Ahmed Al-Dubai, Nikolaos Pitropakis, William J. Buchanan:
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. ATSIP 2024: 376-381 - [c31]Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas, Craig Thomson, Baraq Ghaleb:
DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. CSR 2024: 866-871 - [c30]Vasileios Stamatis, Panagiotis I. Radoglou-Grammatikis, Antonios Sarigiannidis, Nikolaos Pitropakis, Thomas Lagkas, Vasileios Argyriou, Evangelos K. Markakis, Panagiotis G. Sarigiannidis:
Advancements in Federated Learning for Health Applications: A Concise Survey. DCOSS-IoT 2024: 503-508 - [c29]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Nikolaos Pitropakis, Maha Driss, William J. Buchanan:
A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. KES 2024: 4214-4223 - [c28]William Fraser, Matthew Broadbent, Nikolaos Pitropakis, Christos Chrysoulas:
Examining the Strength of Three Word Passwords. SEC 2024: 119-133 - [c27]Dimitrios Kasimatis, William J. Buchanan, Mwrwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel:
Transforming EU Governance: The Digital Integration Through EBSI and GLASS. SEC 2024: 250-263 - [c26]Matt Kenny, Nikolaos Pitropakis, Sarwar Sayeed, Christos Chrysoulas, Alexios Mylonas:
Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics. SEC 2024: 264-278 - [e1]Nikolaos Pitropakis, Sokratis K. Katsikas, Steven Furnell, Konstantinos Markantonakis:
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, Proceedings. IFIP Advances in Information and Communication Technology 710, Springer 2024, ISBN 978-3-031-65174-8 [contents] - [i25]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Baraq Ghaleb, Nikolaos Pitropakis, William J. Buchanan:
RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations. CoRR abs/2401.04707 (2024) - [i24]Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, Baraq Ghaleb:
DID: RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity. CoRR abs/2403.05271 (2024) - 2023
- [j29]Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos:
Explainable AI-Based DDOS Attack Identification Method for IoT Networks. Comput. 12(2): 32 (2023) - [j28]Abishek Manikandaraja, Peter Aaby, Nikolaos Pitropakis:
Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection. Comput. 12(10): 195 (2023) - [j27]Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden, William J. Buchanan:
Attacking Windows Hello for Business: Is It What We Were Promised? Cryptogr. 7(1): 9 (2023) - [j26]Sahar Badri, Sana Ullah Jan, Daniyal M. Alghazzawi, Sahar Aldhaheri, Nikolaos Pitropakis:
BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things. Comput. Syst. Sci. Eng. 46(3): 3667-3684 (2023) - [j25]Ben Hasselgren, Christos Chrysoulas, Nikolaos Pitropakis, William J. Buchanan:
Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet 15(1): 5 (2023) - [j24]Sameer Ali, Saw Chin Tan, Ching Kwang Lee, Zulfadzli Yusoff, Muhammad Reazul Haque, Alexios Mylonas, Nikolaos Pitropakis:
AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks. Sensors 23(21): 8922 (2023) - [c25]Sarwar Sayeed, Nikolaos Pitropakis, William J. Buchanan, Evangelos K. Markakis, Dimitra Papatsaroucha, Ilias Politis:
TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework. ARES 2023: 145:1-145:10 - [c24]Dávid Gábor Uzonyi, Nikolaos Pitropakis, Sean McKeown, Ilias Politis:
OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks. CAMAD 2023: 74-79 - [c23]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan:
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms. CAMAD 2023: 188-193 - [c22]Stuart Laing, Robert Ludwiniak, Brahim El Boudani, Christos Chrysoulas, George Ubakanma, Nikolaos Pitropakis:
Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System. DRCN 2023: 1-6 - [c21]Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis:
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. VTC Fall 2023: 1-6 - [i23]Pavlos Papadopoulos, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis:
Towards The Creation Of The Future Fish Farm. CoRR abs/2301.01618 (2023) - [i22]Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai, Baraq Ghaleb, William J. Buchanan:
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. CoRR abs/2308.10834 (2023) - [i21]Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis:
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. CoRR abs/2309.11476 (2023) - [i20]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan:
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms. CoRR abs/2311.02795 (2023) - 2022
- [j23]Adel R. Alharbi, Jawad Ahmad, Arshad Ali, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, William J. Buchanan:
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complex. 2022: 7047282:1-7047282:15 (2022) - [j22]Michael Gallagher, Nikolaos Pitropakis, Christos Chrysoulas, Pavlos Papadopoulos, Alexios Mylonas, Sokratis K. Katsikas:
Investigating machine learning attacks on financial time series models. Comput. Secur. 123: 102933 (2022) - [j21]Hisham Ali, Jawad Ahmad, Zakwan Jaroucheh, Pavlos Papadopoulos, Nikolaos Pitropakis, Owen Lo, Will Abramson, William J. Buchanan:
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy 24(10): 1379 (2022) - [j20]Jawad Ahmad, Syed Aziz Shah, Shahid Latif, Fawad Ahmed, Zhuo Zou, Nikolaos Pitropakis:
DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8112-8121 (2022) - [j19]Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan:
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors 22(3): 953 (2022) - [j18]Safi Ullah, Muazzam Ali Khan, Jawad Ahmad, Sajjad Shaukat Jamal, Zil E. Huma, Muhammad Tahir Hassan, Nikolaos Pitropakis, Arshad Ali, William J. Buchanan:
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors 22(4): 1340 (2022) - [j17]Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas:
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors 22(6): 2291 (2022) - [j16]Safi Ullah, Jawad Ahmad, Muazzam Ali Khan, Eman H. Alkhammash, Myriam Hadjouni, Yazeed Ghadi, Faisal Saeed, Nikolaos Pitropakis:
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors 22(10): 3607 (2022) - [c20]Jon Barton, William J. Buchanan, Nikolaos Pitropakis, Sarwar Sayeed, Will Abramson:
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. ICISSP 2022: 551-561 - [i19]Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan:
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. CoRR abs/2202.03276 (2022) - [i18]Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas:
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. CoRR abs/2203.08781 (2022) - [i17]Nikolaos Pitropakis, Christos Lyvas, Costas Lambrinoudakis:
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. CoRR abs/2206.09834 (2022) - [i16]William J. Buchanan, Mwrwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel:
The Future of Integrated Digital Governance in the EU: EBSI and GLASS. CoRR abs/2212.03218 (2022) - 2021
- [j15]Kris Hughes, Pavlos Papadopoulos, Nikolaos Pitropakis, Adrian Smales, Jawad Ahmad, William J. Buchanan:
Browsers' Private Mode: Is It What We Were Promised? Comput. 10(12): 165 (2021) - [j14]Andrei Butnaru, Alexios Mylonas, Nikolaos Pitropakis:
Towards Lightweight URL-Based Phishing Detection. Future Internet 13(6): 154 (2021) - [j13]Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. J. Cybersecur. Priv. 1(2): 252-273 (2021) - [j12]Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan:
Privacy and Trust Redefined in Federated Machine Learning. Mach. Learn. Knowl. Extr. 3(2): 333-356 (2021) - [j11]Christopher Kelly, Nikolaos Pitropakis, Alexios Mylonas, Sean McKeown, William J. Buchanan:
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors 21(7): 2433 (2021) - [j10]Muhammad Almas Khan, Muazzam Ali Khan, Sana Ullah Jan, Jawad Ahmad, Sajjad Shaukat Jamal, Awais Aziz Shah, Nikolaos Pitropakis, William J. Buchanan:
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors 21(21): 7016 (2021) - [j9]Will Abramson, Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan:
PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform. Softw. Impacts 9: 100101 (2021) - [c19]Christos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos I. Karacapilidis, Dimitris Tsakalidis, Dimitrios Tsolis:
GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 40-57 - [c18]Robert Sutton, Robert Ludwiniak, Nikolaos Pitropakis, Christos Chrysoulas, Tasos Dagiuklas:
Towards An SDN Assisted IDS. NTMS 2021: 1-5 - [c17]Will Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo:
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. SIN 2021: 1-8 - [c16]Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. SIN 2021: 1-6 - [c15]Bruno Marchand, Nikolaos Pitropakis, William J. Buchanan, Costas Lambrinoudakis:
Launching Adversarial Label Contamination Attacks Against Malicious URL Detection. TrustBus 2021: 69-82 - [i15]Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan:
Privacy and Trust Redefined in Federated Machine Learning. CoRR abs/2103.15753 (2021) - [i14]Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. CoRR abs/2104.12426 (2021) - [i13]Christos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos I. Karacapilidis, Dimitris Tsakalidis, Dimitrios Tsolis:
GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. CoRR abs/2109.08566 (2021) - [i12]Edward Henry Young, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, William J. Buchanan:
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. CoRR abs/2110.01970 (2021) - [i11]William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo:
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. CoRR abs/2112.02855 (2021) - [i10]Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. CoRR abs/2112.10092 (2021) - 2020
- [j8]Lisa Muller, Christos Chrysoulas, Nikolaos Pitropakis, Peter J. Barclay:
A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda. Big Data Cogn. Comput. 4(4): 38 (2020) - [j7]Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, Sokratis K. Katsikas:
Privacy-Preserving Passive DNS. Comput. 9(3): 64 (2020) - [j6]Nikolaos Pitropakis, Kamil Kokot, Dimitra Gkatzia, Robert Ludwiniak, Alexios Mylonas, Miltiadis Kandias:
Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter. Mach. Learn. Knowl. Extr. 2(3): 192-215 (2020) - [j5]Charalampos S. Stamatellis, Pavlos Papadopoulos, Nikolaos Pitropakis, Sokratis K. Katsikas, William J. Buchanan:
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors 20(22): 6587 (2020) - [c14]Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Testing And Hardening IoT Devices Against the Mirai Botnet. Cyber Security 2020: 1-8 - [c13]William Bowditch, Will Abramson, William J. Buchanan, Nikolaos Pitropakis, Adam J. Hall:
Privacy-preserving Surveillance Methods using Homomorphic Encryption. ICISSP 2020: 240-248 - [c12]Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. ICISSP 2020: 289-298 - [c11]Bridget Khursheed, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Microtargeting or Microphishing? Phishing Unveiled. TrustBus 2020: 89-105 - [c10]Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan:
A Distributed Trust Framework for Privacy-Preserving Machine Learning. TrustBus 2020: 205-220 - [i9]Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. CoRR abs/2005.06599 (2020) - [i8]Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan:
A Distributed Trust Framework for Privacy-Preserving Machine Learning. CoRR abs/2006.02456 (2020) - [i7]Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Testing And Hardening IoT Devices Against the Mirai Botnet. CoRR abs/2007.13410 (2020) - [i6]Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, Sokratis K. Katsikas:
Privacy Preserving Passive DNS. CoRR abs/2008.06430 (2020) - [i5]William J. Buchanan, Muhammad Ali Imran, Masood Ur Rehman, Lei Zhang, Qammer H. Abbasi, Christos Chrysoulas, David Haynes, Nikolaos Pitropakis, Pavlos Papadopoulos:
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. CoRR abs/2009.05126 (2020) - [i4]Charalampos S. Stamatellis, Pavlos Papadopoulos, Nikolaos Pitropakis, Sokratis K. Katsikas, William J. Buchanan:
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. CoRR abs/2011.09260 (2020)
2010 – 2019
- 2019
- [j4]Nikolaos Pitropakis, Emmanouil Panaousis, Thanassis Giannetsos, Eleftherios Anastasiadis, George Loukas:
A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34 (2019) - [c9]Nikolaos Pitropakis, Marios Logothetis, Gennady L. Andrienko, Jason Stefanatos, Eirini Karapistoli, Costas Lambrinoudakis:
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 53-68 - [i3]Adam James Hall, Nikolaos Pitropakis, William J. Buchanan, Naghmeh Moradpoor:
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. CoRR abs/1907.10272 (2019) - [i2]Jon Barton, William J. Buchanan, Will Abramson, Nikolaos Pitropakis:
Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device. CoRR abs/1912.12257 (2019) - 2018
- [j3]Christos Chrysoulas, Nikolaos Pitropakis:
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Trans. Ind. Networks Intell. Syst. 4(12): e4 (2018) - [c8]Adam James Hall, Nikolaos Pitropakis, William J. Buchanan, Naghmeh Moradpoor:
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. IEEE BigData 2018: 5034-5039 - [c7]Nikolaos Pitropakis, Emmanouil Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis:
An Enhanced Cyber Attack Attribution Framework. TrustBus 2018: 213-228 - 2017
- [c6]Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis:
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. CCS 2017: 569-586 - [i1]Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis:
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. CoRR abs/1708.08519 (2017) - 2016
- [c5]Christos Lyvas, Nikolaos Pitropakis, Costas Lambrinoudakis:
The Far Side of Mobile Application Integrated Development Environments. TrustBus 2016: 111-122 - 2015
- [b1]Nikolaos Pitropakis:
Detecting malicious insider threat in cloud computing environments. University of Piraeus, Greece, 2015 - [j2]Nikolaos Pitropakis, Aggelos Pikrakis, Costas Lambrinoudakis:
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments. Int. J. Inf. Sec. 14(4): 299-305 (2015) - [c4]Nikolaos Pitropakis, Costas Lambrinoudakis, Dimitris Geneiatakis:
Till All Are One: Towards a Unified Cloud IDS. TrustBus 2015: 136-149 - 2014
- [j1]Nikolaos Pitropakis, Dimitra Anastasopoulou, Aggelos Pikrakis, Costas Lambrinoudakis:
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. J. Cloud Comput. 3: 20 (2014) - [c3]Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis:
Towards an augmented authenticator in the Cloud. ISSPIT 2014: 296-300 - 2013
- [c2]Nikolaos Pitropakis, Costas Lambrinoudakis, Dimitris Geneiatakis, Dimitris Gritzalis:
A Practical Steganographic Approach for Matroska Based High Quality Video Files. AINA Workshops 2013: 684-688 - [c1]Nikolaos Pitropakis, Eleni Darra, Nikos Vrakas, Costas Lambrinoudakis:
It's All in the Cloud: Reviewing Cloud Security. UIC/ATC 2013: 355-362
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint