BibTeX records: Christoforos Ntantogian

download as .bib file

@article{DBLP:journals/fgcs/BountakasNX22,
  author       = {Panagiotis Bountakas and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {EKnad: Exploit Kits' network activity detection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {134},
  pages        = {219--235},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.04.001},
  doi          = {10.1016/J.FUTURE.2022.04.001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BountakasNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LyvasNX22,
  author       = {Christos Lyvas and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {[m]allotROPism: a metamorphic engine for malicious software variation
                  development},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {1},
  pages        = {61--78},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-021-00541-y},
  doi          = {10.1007/S10207-021-00541-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LyvasNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VeroniNX22,
  author       = {Eleni Veroni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {A large-scale analysis of Wi-Fi passwords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103190},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103190},
  doi          = {10.1016/J.JISA.2022.103190},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VeroniNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iisa/LekaNKMV22,
  author       = {Christian Leka and
                  Christoforos Ntantogian and
                  Stylianos Karagiannis and
                  Emmanouil Magkos and
                  Vassilios S. Verykios},
  editor       = {Nikolaos G. Bourbakis and
                  George A. Tsihrintzis and
                  Maria Virvou},
  title        = {A Comparative Analysis of VirusTotal and Desktop Antivirus Detection
                  Capabilities},
  booktitle    = {13th International Conference on Information, Intelligence, Systems
                  {\&} Applications, {IISA} 2022, Corfu, Greece, July 18-20, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IISA56318.2022.9904382},
  doi          = {10.1109/IISA56318.2022.9904382},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iisa/LekaNKMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/KaragiannisNMRC21,
  author       = {Stylianos Karagiannis and
                  Christoforos Ntantogian and
                  Emmanouil Magkos and
                  Lu{\'{\i}}s L. Ribeiro and
                  Lu{\'{\i}}s Campos},
  title        = {PocketCTF: {A} Fully Featured Approach for Hosting Portable Attack
                  and Defense Cybersecurity Exercises},
  journal      = {Inf.},
  volume       = {12},
  number       = {8},
  pages        = {318},
  year         = {2021},
  url          = {https://doi.org/10.3390/info12080318},
  doi          = {10.3390/INFO12080318},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/KaragiannisNMRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/Ntantogian21,
  author       = {Christoforos Ntantogian},
  title        = {Editorial for Special Issue Detecting Attack and Incident Zone System},
  journal      = {Inf.},
  volume       = {12},
  number       = {9},
  pages        = {382},
  year         = {2021},
  url          = {https://doi.org/10.3390/info12090382},
  doi          = {10.3390/INFO12090382},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/Ntantogian21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NtantogianBAPX21,
  author       = {Christoforos Ntantogian and
                  Panagiotis Bountakas and
                  Dimitris Antonaropoulos and
                  Constantinos Patsakis and
                  Christos Xenakis},
  title        = {NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection
                  and eXPloitation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102752},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102752},
  doi          = {10.1016/J.JISA.2021.102752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NtantogianBAPX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Koutroumpouchos21,
  author       = {Nikolaos Koutroumpouchos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Building Trust for Smart Connected Devices: The Challenges and Pitfalls
                  of TrustZone},
  journal      = {Sensors},
  volume       = {21},
  number       = {2},
  pages        = {520},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21020520},
  doi          = {10.3390/S21020520},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/Koutroumpouchos21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FaraoVNX21,
  author       = {Aristeidis Farao and
                  Eleni Veroni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {P4G2Go: {A} Privacy-Preserving Scheme for Roaming Energy Consumers
                  of the Smart Grid-to-Go},
  journal      = {Sensors},
  volume       = {21},
  number       = {8},
  pages        = {2686},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21082686},
  doi          = {10.3390/S21082686},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FaraoVNX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/BolgourasNPX20,
  author       = {Vaios Bolgouras and
                  Christoforos Ntantogian and
                  Emmanouil Panaousis and
                  Christos Xenakis},
  title        = {Distributed Key Management in Microgrids},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {3},
  pages        = {2125--2133},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2941586},
  doi          = {10.1109/TII.2019.2941586},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/BolgourasNPX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KaragiannisMNR20,
  author       = {Stylianos Karagiannis and
                  Emmanouil Magkos and
                  Christoforos Ntantogian and
                  Lu{\'{\i}}s L. Ribeiro},
  editor       = {Ioana Boureanu and
                  Constantin Catalin Dragan and
                  Mark Manulis and
                  Thanassis Giannetsos and
                  Christoforos Dadoyan and
                  Panagiotis Gouvas and
                  Roger A. Hallman and
                  Shujun Li and
                  Victor Chang and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse},
  title        = {Sandboxing the Cyberspace for Cybersecurity Education and Learning},
  booktitle    = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS,
                  DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12580},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66504-3\_11},
  doi          = {10.1007/978-3-030-66504-3\_11},
  timestamp    = {Sun, 10 Dec 2023 06:07:27 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KaragiannisMNR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2020detips,
  editor       = {Ioana Boureanu and
                  Constantin Catalin Dragan and
                  Mark Manulis and
                  Thanassis Giannetsos and
                  Christoforos Dadoyan and
                  Panagiotis Gouvas and
                  Roger A. Hallman and
                  Shujun Li and
                  Victor Chang and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse},
  title        = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS,
                  DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12580},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66504-3},
  doi          = {10.1007/978-3-030-66504-3},
  isbn         = {978-3-030-66503-6},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2020detips.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/NtantogianVKX19,
  author       = {Christoforos Ntantogian and
                  Eleni Veroni and
                  Georgios Karopoulos and
                  Christos Xenakis},
  title        = {A survey of voice and communication protection solutions against wiretapping},
  journal      = {Comput. Electr. Eng.},
  volume       = {77},
  pages        = {163--178},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compeleceng.2019.05.008},
  doi          = {10.1016/J.COMPELECENG.2019.05.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/NtantogianVKX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianMX19,
  author       = {Christoforos Ntantogian and
                  Stefanos Malliaros and
                  Christos Xenakis},
  title        = {Evaluation of password hashing schemes in open source web platforms},
  journal      = {Comput. Secur.},
  volume       = {84},
  pages        = {206--224},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.03.011},
  doi          = {10.1016/J.COSE.2019.03.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianMX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/NtantogianPKX19,
  author       = {Christoforos Ntantogian and
                  Georgios Poulios and
                  Georgios Karopoulos and
                  Christos Xenakis},
  title        = {Transforming malicious code to {ROP} gadgets for antivirus evasion},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {570--578},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5386},
  doi          = {10.1049/IET-IFS.2018.5386},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/NtantogianPKX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/StasinopoulosNX19,
  author       = {Anastasios Stasinopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Commix: automating evaluation and exploitation of command injection
                  vulnerabilities in Web applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {18},
  number       = {1},
  pages        = {49--72},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10207-018-0399-z},
  doi          = {10.1007/S10207-018-0399-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/StasinopoulosNX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/FaraoRANX019,
  author       = {Aristeidis Farao and
                  Juan Enrique Rubio and
                  Cristina Alcaraz and
                  Christoforos Ntantogian and
                  Christos Xenakis and
                  Javier L{\'{o}}pez},
  editor       = {Simin Nadjm{-}Tehrani},
  title        = {SealedGRID: {A} Secure Interconnection of Technologies for Smart Grid
                  Applications},
  booktitle    = {Critical Information Infrastructures Security - 14th International
                  Conference, {CRITIS} 2019, Link{\"{o}}ping, Sweden, September
                  23-25, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11777},
  pages        = {169--175},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37670-3\_14},
  doi          = {10.1007/978-3-030-37670-3\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/FaraoRANX019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/Koutroumpouchos19,
  author       = {Nikos Koutroumpouchos and
                  Christoforos Ntantogian and
                  Sofia{-}Anna Menesidou and
                  Kaitai Liang and
                  Panagiotis Gouvas and
                  Christos Xenakis and
                  Thanassis Giannetsos},
  editor       = {Christian Jacquenet and
                  Filip De Turck and
                  Prosper Chemouil and
                  Flavio Esposito and
                  Olivier Festor and
                  Walter Cerroni and
                  Stefano Secci},
  title        = {Secure Edge Computing with Lightweight Control-Flow Property-based
                  Attestation},
  booktitle    = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris,
                  France, June 24-28, 2019},
  pages        = {84--92},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NETSOFT.2019.8806658},
  doi          = {10.1109/NETSOFT.2019.8806658},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsoft/Koutroumpouchos19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/Koutroumpouchos19,
  author       = {Nikolaos Koutroumpouchos and
                  Georgios Lavdanis and
                  Eleni Veroni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Yannis Manolopoulos and
                  George Angelos Papadopoulos and
                  Athena Stassopoulou and
                  Ioanna Dionysiou and
                  Ioannis Kyriakides and
                  Nicolas Tsapatsoulis},
  title        = {ObjectMap: detecting insecure object deserialization},
  booktitle    = {Proceedings of the 23rd Pan-Hellenic Conference on Informatics, {PCI}
                  2019, Nicosia, Cyprus, November 28-30, 2019},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368640.3368680},
  doi          = {10.1145/3368640.3368680},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/Koutroumpouchos19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/BampatsikosNXT19,
  author       = {Michail Bampatsikos and
                  Christoforos Ntantogian and
                  Christos Xenakis and
                  Stelios C. A. Thomopoulos},
  editor       = {Payam M. Barnaghi and
                  Georg Gottlob and
                  Dimitrios Katsaros and
                  Yannis Manolopoulos and
                  Rahul Pandey and
                  Theodoros Tzouramanis and
                  Athena Vakali},
  title        = {{BARRETT} BlockchAin Regulated REmote aTTestation},
  booktitle    = {2019 {IEEE/WIC/ACM} International Conference on Web Intelligence,
                  {WI} 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume},
  pages        = {256--262},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3358695.3361752},
  doi          = {10.1145/3358695.3361752},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/webi/BampatsikosNXT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/MohammadiPNKPX19,
  author       = {Farnaz Mohammadi and
                  Angeliki Panou and
                  Christoforos Ntantogian and
                  Eirini D. Karapistoli and
                  Emmanouil Panaousis and
                  Christos Xenakis},
  editor       = {Payam M. Barnaghi and
                  Georg Gottlob and
                  Dimitrios Katsaros and
                  Yannis Manolopoulos and
                  Rahul Pandey and
                  Theodoros Tzouramanis and
                  Athena Vakali},
  title        = {{CUREX:} seCUre and pRivate hEalth data eXchange},
  booktitle    = {2019 {IEEE/WIC/ACM} International Conference on Web Intelligence,
                  {WI} 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume},
  pages        = {263--268},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3358695.3361753},
  doi          = {10.1145/3358695.3361753},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/webi/MohammadiPNKPX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KaropoulosNX18,
  author       = {Georgios Karopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {{MASKER:} Masking for privacy-preserving aggregation in the smart
                  grid ecosystem},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {307--325},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.008},
  doi          = {10.1016/J.COSE.2017.11.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KaropoulosNX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/KitsakiANX18,
  author       = {Theodoula{-}Ioanna Kitsaki and
                  Anna Angelogianni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Nikitas N. Karanikolas and
                  Basilis Mamalis and
                  John Kontos and
                  Grammati E. Pantziou and
                  Stefanos Gritzalis and
                  Christos Douligeris},
  title        = {A forensic investigation of Android mobile applications},
  booktitle    = {Proceedings of the 22nd Pan-Hellenic Conference on Informatics, {PCI}
                  2018, Athens, Greece, November 29 - December 01, 2018},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3291533.3291573},
  doi          = {10.1145/3291533.3291573},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/KitsakiANX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PanosNMX17,
  author       = {Christoforos Panos and
                  Christoforos Ntantogian and
                  Stefanos Malliaros and
                  Christos Xenakis},
  title        = {Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less
                  networks},
  journal      = {Comput. Networks},
  volume       = {113},
  pages        = {94--110},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2016.12.006},
  doi          = {10.1016/J.COMNET.2016.12.006},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PanosNMX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/PanouNX17,
  author       = {Angeliki Panou and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Vasileios Vlachos and
                  Ilias K. Savvas and
                  Cleo Sgouropoulou and
                  Vassilis P. Plagianakos and
                  Christos Douligeris and
                  Ioannis Voyiatzis and
                  Vassilis Tampakas and
                  George Soultis},
  title        = {RiSKi: {A} Framework for Modeling Cyber Threats to Estimate Risk for
                  Data Breach Insurance},
  booktitle    = {Proceedings of the 21st Pan-Hellenic Conference on Informatics, Larissa,
                  Greece, September 28-30, 2017},
  pages        = {32:1--32:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139367.3139426},
  doi          = {10.1145/3139367.3139426},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/PanouNX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tiwdc/PanosMNPX17,
  author       = {Christoforos Panos and
                  Stefanos Malliaros and
                  Christoforos Ntantogian and
                  Angeliki Panou and
                  Christos Xenakis},
  editor       = {Alessandro Piva and
                  Ilenia Tinnirello and
                  Simone Morosi},
  title        = {A Security Evaluation of FIDO's {UAF} Protocol in Mobile and Embedded
                  Devices},
  booktitle    = {Digital Communication. Towards a Smart and Secure Future Internet
                  - 28th International Tyrrhenian Workshop, {TIWDC} 2017, Palermo, Italy,
                  September 18-20, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {766},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67639-5\_11},
  doi          = {10.1007/978-3-319-67639-5\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tiwdc/PanosMNPX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XenakisNP16,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian and
                  Orestis Panos},
  title        = {(U)SimMonitor: {A} mobile application for security evaluation of cellular
                  networks},
  journal      = {Comput. Secur.},
  volume       = {60},
  pages        = {62--78},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.03.005},
  doi          = {10.1016/J.COSE.2016.03.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XenakisNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Chatzikonstantinou16,
  author       = {Alexia Chatzikonstantinou and
                  Christoforos Ntantogian and
                  Georgios Karopoulos and
                  Christos Xenakis},
  title        = {Evaluation of Cryptography Usage in Android Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e4},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262471},
  doi          = {10.4108/EAI.3-12-2015.2262471},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Chatzikonstantinou16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MalliarosNX16,
  author       = {Stefanos Malliaros and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Protecting Sensitive Information in the Volatile Memory from Disclosure
                  Attacks},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {687--693},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.75},
  doi          = {10.1109/ARES.2016.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MalliarosNX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianMX15,
  author       = {Christoforos Ntantogian and
                  Stefanos Malliaros and
                  Christos Xenakis},
  title        = {Gaithashing: {A} two-factor authentication scheme based on gait features},
  journal      = {Comput. Secur.},
  volume       = {52},
  pages        = {17--32},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.03.009},
  doi          = {10.1016/J.COSE.2015.03.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianMX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bionetics/Chatzikonstantinou15,
  author       = {Alexia Chatzikonstantinou and
                  Christoforos Ntantogian and
                  Georgios Karopoulos and
                  Christos Xenakis},
  editor       = {Junichi Suzuki and
                  Tadashi Nakano and
                  Henry Hess},
  title        = {Evaluation of Cryptography Usage in Android Applications},
  booktitle    = {{BICT} 2015, Proceedings of the 9th {EAI} International Conference
                  on Bio-inspired Information and Communications Technologies (formerly
                  BIONETICS), New York City, United States, December 3-5, 2015},
  pages        = {83--90},
  publisher    = {{ICST/ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2954820},
  timestamp    = {Fri, 03 Feb 2017 18:36:35 +0100},
  biburl       = {https://dblp.org/rec/conf/bionetics/Chatzikonstantinou15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/XenakisN15,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian},
  editor       = {Markus Maybaum and
                  Anna{-}Maria Osula and
                  Lauri Lindstr{\"{o}}m},
  title        = {Attacking the baseband modem of mobile phones to breach the users'
                  privacy and network security},
  booktitle    = {7th International Conference on Cyber Conflict: Architectures in Cyberspace,
                  CyCon 2015, Tallinn, Estonia, May 26-29, 2015},
  pages        = {231--244},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CYCON.2015.7158480},
  doi          = {10.1109/CYCON.2015.7158480},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/XenakisN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/NtantogianVKLKX15,
  author       = {Christoforos Ntantogian and
                  Grigoris Valtas and
                  Nikos Kapetanakis and
                  Faidon Lalagiannis and
                  Georgios Karopoulos and
                  Christos Xenakis},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {Attacking {GSM} Networks as a Script Kiddie Using Commodity Hardware
                  and Software},
  booktitle    = {Trust, Privacy and Security in Digital Business - 12th International
                  Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9264},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22906-5\_6},
  doi          = {10.1007/978-3-319-22906-5\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/NtantogianVKLKX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XenakisN14,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian},
  title        = {An advanced persistent threat in 3G networks: Attacking the home network
                  from roaming networks},
  journal      = {Comput. Secur.},
  volume       = {40},
  pages        = {84--94},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.11.006},
  doi          = {10.1016/J.COSE.2013.11.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XenakisN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianAMX14,
  author       = {Christoforos Ntantogian and
                  Dimitris Apostolopoulos and
                  Giannis Marinakis and
                  Christos Xenakis},
  title        = {Evaluating the privacy of Android mobile applications under forensic
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {66--76},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.004},
  doi          = {10.1016/J.COSE.2014.01.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianAMX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/StasinopoulosNX14,
  author       = {Anastasios Stasinopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Bypassing {XSS} Auditor: Taking advantage of badly written {PHP} code},
  booktitle    = {2014 {IEEE} International Symposium on Signal Processing and Information
                  Technology, {ISSPIT} 2014, Noida, India, December 15-17, 2014},
  pages        = {290--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSPIT.2014.7300602},
  doi          = {10.1109/ISSPIT.2014.7300602},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/StasinopoulosNX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/ApostolopoulosMNX13,
  author       = {Dimitris Apostolopoulos and
                  Giannis Marinakis and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Christos Douligeris and
                  Nineta Polemi and
                  Athanasios Karantjias and
                  Winfried Lamersdorf},
  title        = {Discovering Authentication Credentials in Volatile Memory of Android
                  Mobile Devices},
  booktitle    = {Collaborative, Trusted and Privacy-Aware e/m-Services - 12th {IFIP}
                  {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E}
                  2013, Athens, Greece, April 25-26, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {399},
  pages        = {178--185},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37437-1\_15},
  doi          = {10.1007/978-3-642-37437-1\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/ApostolopoulosMNX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/StasinopoulosNX13,
  author       = {Anastasios Stasinopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {The weakest link on the network: Exploiting {ADSL} routers to perform
                  cyber-attacks},
  booktitle    = {{IEEE} International Symposium on Signal Processing and Information
                  Technology, Athens, Greece, December 12-15, 2013},
  pages        = {135--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSPIT.2013.6781868},
  doi          = {10.1109/ISSPIT.2013.6781868},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/StasinopoulosNX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PetrouNX13,
  author       = {Charalampos Petrou and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {A Better Time Approximation Scheme for e-Passports},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 10th International
                  Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8058},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40343-9\_2},
  doi          = {10.1007/978-3-642-40343-9\_2},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/PetrouNX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/NtantogianX12,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Questioning the Feasibility of {UMTS-GSM} Interworking Attacks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {65},
  number       = {1},
  pages        = {157--163},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11277-011-0233-7},
  doi          = {10.1007/S11277-011-0233-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/NtantogianX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NtantogianXS12,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated
                  Networks},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {475--488},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_39},
  doi          = {10.1007/978-3-642-30436-1\_39},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NtantogianXS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/NtantogianXS11,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  title        = {Reducing False Synchronizations in 3G-WLAN Integrated Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {10},
  number       = {11},
  pages        = {3765--3773},
  year         = {2011},
  url          = {https://doi.org/10.1109/TWC.2011.080611.101824},
  doi          = {10.1109/TWC.2011.080611.101824},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/NtantogianXS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/DarraNXK11,
  author       = {Eleni Darra and
                  Christoforos Ntantogian and
                  Christos Xenakis and
                  Sokratis K. Katsikas},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {A Mobility and Energy-Aware Hierarchical Intrusion Detection System
                  for Mobile Ad Hoc Networks},
  booktitle    = {Trust, Privacy and Security in Digital Business - 8th International
                  Conference, TrustBus 2011, Toulouse, France, August 29 - September
                  2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6863},
  pages        = {138--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22890-2\_12},
  doi          = {10.1007/978-3-642-22890-2\_12},
  timestamp    = {Mon, 03 Jan 2022 22:15:13 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/DarraNXK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianXS10,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  title        = {A generic mechanism for efficient authentication in {B3G} networks},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {460--475},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.001},
  doi          = {10.1016/J.COSE.2009.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/gr/Ntantogian09,
  author       = {Christoforos Ntantogian},
  title        = {{\(M\)}{\(\epsilon\)}{\(\lambda\)}{\(\acute{\epsilon}\)}{\(\tau\)}{\(\eta\)}
                  {\(\kappa\)}{\(\alpha\)}{\(\iota\)} {\(\sigma\)}{\(\chi\)}{\(\epsilon\)}{\(\delta\)}{\(\iota\)}{\(\alpha\)}{\(\sigma\)}{\(\mu\)}{\'{o}}{\(\varsigma\)}
                  {\(\mu\)}{\(\eta\)}{\(\chi\)}{\(\alpha\)}{\(\nu\)}{\(\iota\)}{\(\sigma\)}{\(\mu\)}{\(o\)}{\(\acute{\upsilon}\)}
                  {\(\delta\)}{\(\rho\)}{\(o\)}{\(\mu\)}{\(o\)}{\(\lambda\)}{\'{o}}{\(\gamma\)}{\(\eta\)}{\(\sigma\)}{\(\eta\)}{\(\varsigma\)}
                  {\(\gamma\)}{\(\iota\)}{\(\alpha\)} {\(\delta\)}{\(\acute{\iota}\)}{\(\kappa\)}{\(\tau\)}{\(\upsilon\)}{\(\alpha\)}
                  {\(\alpha\)}{\(\iota\)}{\(\sigma\)}{\texttheta}{\(\eta\)}{\(\tau\)}{\(\acute{\eta}\)}{\(\rho\)}{\(\omega\)}{\(\nu\)}},
  school       = {National and Kapodistrian University of Athens, Greece},
  year         = {2009},
  url          = {http://hdl.handle.net/10442/hedi/0204},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/gr/Ntantogian09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/NtantogianX09,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {One-Pass {EAP-AKA} Authentication in 3G-WLAN Integrated Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {48},
  number       = {4},
  pages        = {569--584},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11277-008-9548-4},
  doi          = {10.1007/S11277-008-9548-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/NtantogianX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/XenakisNS08,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian and
                  Ioannis Stavrakakis},
  title        = {A network-assisted mobile {VPN} for securing users data in {UMTS}},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {14},
  pages        = {3315--3327},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2008.05.018},
  doi          = {10.1016/J.COMCOM.2008.05.018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/XenakisNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/XenakisN07,
  author       = {Christos Xenakis and
                  Christoforos Ntantogian},
  title        = {Security architectures for {B3G} mobile networks},
  journal      = {Telecommun. Syst.},
  volume       = {35},
  number       = {3-4},
  pages        = {123--139},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11235-007-9044-2},
  doi          = {10.1007/S11235-007-9044-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/XenakisN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bionetics/NtantogianXS07,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  editor       = {Falko Dressler},
  title        = {Efficient Authentication for Users Autonomy in Next Generation All-IP
                  Networks},
  booktitle    = {2nd International {ICST} Conference on Bio-Inspired Models of Network,
                  Information, and Computing Systems, {BIONETICS} 2007, Budapest, Hungary,
                  December 10-13, 2007},
  pages        = {295--300},
  publisher    = {{ICST} / {IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.4108/ICST.BIONETICS2007.2372},
  doi          = {10.4108/ICST.BIONETICS2007.2372},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bionetics/NtantogianXS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/NtantogianX07,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {A Security Protocol for Mutual Authentication and Mobile {VPN} Deployment
                  in {B3G} Networks},
  booktitle    = {Proceedings of the {IEEE} 18th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
                  2007, Athens, Greece},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/PIMRC.2007.4394363},
  doi          = {10.1109/PIMRC.2007.4394363},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/NtantogianX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/NtantogianX07a,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {Reducing Authentication Traffic in 3G-WLAN Integrated Networks},
  booktitle    = {Proceedings of the {IEEE} 18th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
                  2007, Athens, Greece},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/PIMRC.2007.4394508},
  doi          = {10.1109/PIMRC.2007.4394508},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/NtantogianX07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics