Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Christoforos Ntantogian
@article{DBLP:journals/fgcs/BountakasNX22, author = {Panagiotis Bountakas and Christoforos Ntantogian and Christos Xenakis}, title = {EKnad: Exploit Kits' network activity detection}, journal = {Future Gener. Comput. Syst.}, volume = {134}, pages = {219--235}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.04.001}, doi = {10.1016/J.FUTURE.2022.04.001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BountakasNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LyvasNX22, author = {Christos Lyvas and Christoforos Ntantogian and Christos Xenakis}, title = {[m]allotROPism: a metamorphic engine for malicious software variation development}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {1}, pages = {61--78}, year = {2022}, url = {https://doi.org/10.1007/s10207-021-00541-y}, doi = {10.1007/S10207-021-00541-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LyvasNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VeroniNX22, author = {Eleni Veroni and Christoforos Ntantogian and Christos Xenakis}, title = {A large-scale analysis of Wi-Fi passwords}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103190}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103190}, doi = {10.1016/J.JISA.2022.103190}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VeroniNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iisa/LekaNKMV22, author = {Christian Leka and Christoforos Ntantogian and Stylianos Karagiannis and Emmanouil Magkos and Vassilios S. Verykios}, editor = {Nikolaos G. Bourbakis and George A. Tsihrintzis and Maria Virvou}, title = {A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities}, booktitle = {13th International Conference on Information, Intelligence, Systems {\&} Applications, {IISA} 2022, Corfu, Greece, July 18-20, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IISA56318.2022.9904382}, doi = {10.1109/IISA56318.2022.9904382}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iisa/LekaNKMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/KaragiannisNMRC21, author = {Stylianos Karagiannis and Christoforos Ntantogian and Emmanouil Magkos and Lu{\'{\i}}s L. Ribeiro and Lu{\'{\i}}s Campos}, title = {PocketCTF: {A} Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises}, journal = {Inf.}, volume = {12}, number = {8}, pages = {318}, year = {2021}, url = {https://doi.org/10.3390/info12080318}, doi = {10.3390/INFO12080318}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/KaragiannisNMRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/Ntantogian21, author = {Christoforos Ntantogian}, title = {Editorial for Special Issue Detecting Attack and Incident Zone System}, journal = {Inf.}, volume = {12}, number = {9}, pages = {382}, year = {2021}, url = {https://doi.org/10.3390/info12090382}, doi = {10.3390/INFO12090382}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/Ntantogian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NtantogianBAPX21, author = {Christoforos Ntantogian and Panagiotis Bountakas and Dimitris Antonaropoulos and Constantinos Patsakis and Christos Xenakis}, title = {NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102752}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102752}, doi = {10.1016/J.JISA.2021.102752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NtantogianBAPX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Koutroumpouchos21, author = {Nikolaos Koutroumpouchos and Christoforos Ntantogian and Christos Xenakis}, title = {Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone}, journal = {Sensors}, volume = {21}, number = {2}, pages = {520}, year = {2021}, url = {https://doi.org/10.3390/s21020520}, doi = {10.3390/S21020520}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Koutroumpouchos21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FaraoVNX21, author = {Aristeidis Farao and Eleni Veroni and Christoforos Ntantogian and Christos Xenakis}, title = {P4G2Go: {A} Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go}, journal = {Sensors}, volume = {21}, number = {8}, pages = {2686}, year = {2021}, url = {https://doi.org/10.3390/s21082686}, doi = {10.3390/S21082686}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FaraoVNX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/BolgourasNPX20, author = {Vaios Bolgouras and Christoforos Ntantogian and Emmanouil Panaousis and Christos Xenakis}, title = {Distributed Key Management in Microgrids}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {3}, pages = {2125--2133}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2941586}, doi = {10.1109/TII.2019.2941586}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/BolgourasNPX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KaragiannisMNR20, author = {Stylianos Karagiannis and Emmanouil Magkos and Christoforos Ntantogian and Lu{\'{\i}}s L. Ribeiro}, editor = {Ioana Boureanu and Constantin Catalin Dragan and Mark Manulis and Thanassis Giannetsos and Christoforos Dadoyan and Panagiotis Gouvas and Roger A. Hallman and Shujun Li and Victor Chang and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse}, title = {Sandboxing the Cyberspace for Cybersecurity Education and Learning}, booktitle = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12580}, pages = {181--196}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66504-3\_11}, doi = {10.1007/978-3-030-66504-3\_11}, timestamp = {Sun, 10 Dec 2023 06:07:27 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KaragiannisMNR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020detips, editor = {Ioana Boureanu and Constantin Catalin Dragan and Mark Manulis and Thanassis Giannetsos and Christoforos Dadoyan and Panagiotis Gouvas and Roger A. Hallman and Shujun Li and Victor Chang and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse}, title = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12580}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66504-3}, doi = {10.1007/978-3-030-66504-3}, isbn = {978-3-030-66503-6}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2020detips.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/NtantogianVKX19, author = {Christoforos Ntantogian and Eleni Veroni and Georgios Karopoulos and Christos Xenakis}, title = {A survey of voice and communication protection solutions against wiretapping}, journal = {Comput. Electr. Eng.}, volume = {77}, pages = {163--178}, year = {2019}, url = {https://doi.org/10.1016/j.compeleceng.2019.05.008}, doi = {10.1016/J.COMPELECENG.2019.05.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/NtantogianVKX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianMX19, author = {Christoforos Ntantogian and Stefanos Malliaros and Christos Xenakis}, title = {Evaluation of password hashing schemes in open source web platforms}, journal = {Comput. Secur.}, volume = {84}, pages = {206--224}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.03.011}, doi = {10.1016/J.COSE.2019.03.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianMX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/NtantogianPKX19, author = {Christoforos Ntantogian and Georgios Poulios and Georgios Karopoulos and Christos Xenakis}, title = {Transforming malicious code to {ROP} gadgets for antivirus evasion}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {6}, pages = {570--578}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5386}, doi = {10.1049/IET-IFS.2018.5386}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/NtantogianPKX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/StasinopoulosNX19, author = {Anastasios Stasinopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications}, journal = {Int. J. Inf. Sec.}, volume = {18}, number = {1}, pages = {49--72}, year = {2019}, url = {https://doi.org/10.1007/s10207-018-0399-z}, doi = {10.1007/S10207-018-0399-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/StasinopoulosNX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FaraoRANX019, author = {Aristeidis Farao and Juan Enrique Rubio and Cristina Alcaraz and Christoforos Ntantogian and Christos Xenakis and Javier L{\'{o}}pez}, editor = {Simin Nadjm{-}Tehrani}, title = {SealedGRID: {A} Secure Interconnection of Technologies for Smart Grid Applications}, booktitle = {Critical Information Infrastructures Security - 14th International Conference, {CRITIS} 2019, Link{\"{o}}ping, Sweden, September 23-25, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11777}, pages = {169--175}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37670-3\_14}, doi = {10.1007/978-3-030-37670-3\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/FaraoRANX019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/Koutroumpouchos19, author = {Nikos Koutroumpouchos and Christoforos Ntantogian and Sofia{-}Anna Menesidou and Kaitai Liang and Panagiotis Gouvas and Christos Xenakis and Thanassis Giannetsos}, editor = {Christian Jacquenet and Filip De Turck and Prosper Chemouil and Flavio Esposito and Olivier Festor and Walter Cerroni and Stefano Secci}, title = {Secure Edge Computing with Lightweight Control-Flow Property-based Attestation}, booktitle = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019}, pages = {84--92}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NETSOFT.2019.8806658}, doi = {10.1109/NETSOFT.2019.8806658}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsoft/Koutroumpouchos19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/Koutroumpouchos19, author = {Nikolaos Koutroumpouchos and Georgios Lavdanis and Eleni Veroni and Christoforos Ntantogian and Christos Xenakis}, editor = {Yannis Manolopoulos and George Angelos Papadopoulos and Athena Stassopoulou and Ioanna Dionysiou and Ioannis Kyriakides and Nicolas Tsapatsoulis}, title = {ObjectMap: detecting insecure object deserialization}, booktitle = {Proceedings of the 23rd Pan-Hellenic Conference on Informatics, {PCI} 2019, Nicosia, Cyprus, November 28-30, 2019}, pages = {67--72}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368640.3368680}, doi = {10.1145/3368640.3368680}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/Koutroumpouchos19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/BampatsikosNXT19, author = {Michail Bampatsikos and Christoforos Ntantogian and Christos Xenakis and Stelios C. A. Thomopoulos}, editor = {Payam M. Barnaghi and Georg Gottlob and Dimitrios Katsaros and Yannis Manolopoulos and Rahul Pandey and Theodoros Tzouramanis and Athena Vakali}, title = {{BARRETT} BlockchAin Regulated REmote aTTestation}, booktitle = {2019 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume}, pages = {256--262}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3358695.3361752}, doi = {10.1145/3358695.3361752}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webi/BampatsikosNXT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/MohammadiPNKPX19, author = {Farnaz Mohammadi and Angeliki Panou and Christoforos Ntantogian and Eirini D. Karapistoli and Emmanouil Panaousis and Christos Xenakis}, editor = {Payam M. Barnaghi and Georg Gottlob and Dimitrios Katsaros and Yannis Manolopoulos and Rahul Pandey and Theodoros Tzouramanis and Athena Vakali}, title = {{CUREX:} seCUre and pRivate hEalth data eXchange}, booktitle = {2019 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume}, pages = {263--268}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3358695.3361753}, doi = {10.1145/3358695.3361753}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webi/MohammadiPNKPX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KaropoulosNX18, author = {Georgios Karopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {{MASKER:} Masking for privacy-preserving aggregation in the smart grid ecosystem}, journal = {Comput. Secur.}, volume = {73}, pages = {307--325}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.008}, doi = {10.1016/J.COSE.2017.11.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KaropoulosNX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/KitsakiANX18, author = {Theodoula{-}Ioanna Kitsaki and Anna Angelogianni and Christoforos Ntantogian and Christos Xenakis}, editor = {Nikitas N. Karanikolas and Basilis Mamalis and John Kontos and Grammati E. Pantziou and Stefanos Gritzalis and Christos Douligeris}, title = {A forensic investigation of Android mobile applications}, booktitle = {Proceedings of the 22nd Pan-Hellenic Conference on Informatics, {PCI} 2018, Athens, Greece, November 29 - December 01, 2018}, pages = {58--63}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3291533.3291573}, doi = {10.1145/3291533.3291573}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/KitsakiANX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PanosNMX17, author = {Christoforos Panos and Christoforos Ntantogian and Stefanos Malliaros and Christos Xenakis}, title = {Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks}, journal = {Comput. Networks}, volume = {113}, pages = {94--110}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2016.12.006}, doi = {10.1016/J.COMNET.2016.12.006}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PanosNMX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/PanouNX17, author = {Angeliki Panou and Christoforos Ntantogian and Christos Xenakis}, editor = {Vasileios Vlachos and Ilias K. Savvas and Cleo Sgouropoulou and Vassilis P. Plagianakos and Christos Douligeris and Ioannis Voyiatzis and Vassilis Tampakas and George Soultis}, title = {RiSKi: {A} Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance}, booktitle = {Proceedings of the 21st Pan-Hellenic Conference on Informatics, Larissa, Greece, September 28-30, 2017}, pages = {32:1--32:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139367.3139426}, doi = {10.1145/3139367.3139426}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/PanouNX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tiwdc/PanosMNPX17, author = {Christoforos Panos and Stefanos Malliaros and Christoforos Ntantogian and Angeliki Panou and Christos Xenakis}, editor = {Alessandro Piva and Ilenia Tinnirello and Simone Morosi}, title = {A Security Evaluation of FIDO's {UAF} Protocol in Mobile and Embedded Devices}, booktitle = {Digital Communication. Towards a Smart and Secure Future Internet - 28th International Tyrrhenian Workshop, {TIWDC} 2017, Palermo, Italy, September 18-20, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {766}, pages = {127--142}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67639-5\_11}, doi = {10.1007/978-3-319-67639-5\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tiwdc/PanosMNPX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XenakisNP16, author = {Christos Xenakis and Christoforos Ntantogian and Orestis Panos}, title = {(U)SimMonitor: {A} mobile application for security evaluation of cellular networks}, journal = {Comput. Secur.}, volume = {60}, pages = {62--78}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.03.005}, doi = {10.1016/J.COSE.2016.03.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XenakisNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Chatzikonstantinou16, author = {Alexia Chatzikonstantinou and Christoforos Ntantogian and Georgios Karopoulos and Christos Xenakis}, title = {Evaluation of Cryptography Usage in Android Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e4}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262471}, doi = {10.4108/EAI.3-12-2015.2262471}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Chatzikonstantinou16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MalliarosNX16, author = {Stefanos Malliaros and Christoforos Ntantogian and Christos Xenakis}, title = {Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {687--693}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.75}, doi = {10.1109/ARES.2016.75}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MalliarosNX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianMX15, author = {Christoforos Ntantogian and Stefanos Malliaros and Christos Xenakis}, title = {Gaithashing: {A} two-factor authentication scheme based on gait features}, journal = {Comput. Secur.}, volume = {52}, pages = {17--32}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.03.009}, doi = {10.1016/J.COSE.2015.03.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianMX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bionetics/Chatzikonstantinou15, author = {Alexia Chatzikonstantinou and Christoforos Ntantogian and Georgios Karopoulos and Christos Xenakis}, editor = {Junichi Suzuki and Tadashi Nakano and Henry Hess}, title = {Evaluation of Cryptography Usage in Android Applications}, booktitle = {{BICT} 2015, Proceedings of the 9th {EAI} International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), New York City, United States, December 3-5, 2015}, pages = {83--90}, publisher = {{ICST/ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2954820}, timestamp = {Fri, 03 Feb 2017 18:36:35 +0100}, biburl = {https://dblp.org/rec/conf/bionetics/Chatzikonstantinou15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/XenakisN15, author = {Christos Xenakis and Christoforos Ntantogian}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Attacking the baseband modem of mobile phones to breach the users' privacy and network security}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {231--244}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158480}, doi = {10.1109/CYCON.2015.7158480}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/XenakisN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/NtantogianVKLKX15, author = {Christoforos Ntantogian and Grigoris Valtas and Nikos Kapetanakis and Faidon Lalagiannis and Georgios Karopoulos and Christos Xenakis}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {Attacking {GSM} Networks as a Script Kiddie Using Commodity Hardware and Software}, booktitle = {Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9264}, pages = {73--86}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22906-5\_6}, doi = {10.1007/978-3-319-22906-5\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/NtantogianVKLKX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XenakisN14, author = {Christos Xenakis and Christoforos Ntantogian}, title = {An advanced persistent threat in 3G networks: Attacking the home network from roaming networks}, journal = {Comput. Secur.}, volume = {40}, pages = {84--94}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.11.006}, doi = {10.1016/J.COSE.2013.11.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XenakisN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianAMX14, author = {Christoforos Ntantogian and Dimitris Apostolopoulos and Giannis Marinakis and Christos Xenakis}, title = {Evaluating the privacy of Android mobile applications under forensic analysis}, journal = {Comput. Secur.}, volume = {42}, pages = {66--76}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.004}, doi = {10.1016/J.COSE.2014.01.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianAMX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/StasinopoulosNX14, author = {Anastasios Stasinopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {Bypassing {XSS} Auditor: Taking advantage of badly written {PHP} code}, booktitle = {2014 {IEEE} International Symposium on Signal Processing and Information Technology, {ISSPIT} 2014, Noida, India, December 15-17, 2014}, pages = {290--295}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISSPIT.2014.7300602}, doi = {10.1109/ISSPIT.2014.7300602}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/StasinopoulosNX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/ApostolopoulosMNX13, author = {Dimitris Apostolopoulos and Giannis Marinakis and Christoforos Ntantogian and Christos Xenakis}, editor = {Christos Douligeris and Nineta Polemi and Athanasios Karantjias and Winfried Lamersdorf}, title = {Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices}, booktitle = {Collaborative, Trusted and Privacy-Aware e/m-Services - 12th {IFIP} {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E} 2013, Athens, Greece, April 25-26, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {399}, pages = {178--185}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37437-1\_15}, doi = {10.1007/978-3-642-37437-1\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/ApostolopoulosMNX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/StasinopoulosNX13, author = {Anastasios Stasinopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {The weakest link on the network: Exploiting {ADSL} routers to perform cyber-attacks}, booktitle = {{IEEE} International Symposium on Signal Processing and Information Technology, Athens, Greece, December 12-15, 2013}, pages = {135--139}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISSPIT.2013.6781868}, doi = {10.1109/ISSPIT.2013.6781868}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/StasinopoulosNX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PetrouNX13, author = {Charalampos Petrou and Christoforos Ntantogian and Christos Xenakis}, editor = {Steven Furnell and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {A Better Time Approximation Scheme for e-Passports}, booktitle = {Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8058}, pages = {13--23}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40343-9\_2}, doi = {10.1007/978-3-642-40343-9\_2}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/PetrouNX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/NtantogianX12, author = {Christoforos Ntantogian and Christos Xenakis}, title = {Questioning the Feasibility of {UMTS-GSM} Interworking Attacks}, journal = {Wirel. Pers. Commun.}, volume = {65}, number = {1}, pages = {157--163}, year = {2012}, url = {https://doi.org/10.1007/s11277-011-0233-7}, doi = {10.1007/S11277-011-0233-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/NtantogianX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NtantogianXS12, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {475--488}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_39}, doi = {10.1007/978-3-642-30436-1\_39}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NtantogianXS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/NtantogianXS11, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, title = {Reducing False Synchronizations in 3G-WLAN Integrated Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {10}, number = {11}, pages = {3765--3773}, year = {2011}, url = {https://doi.org/10.1109/TWC.2011.080611.101824}, doi = {10.1109/TWC.2011.080611.101824}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/NtantogianXS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/DarraNXK11, author = {Eleni Darra and Christoforos Ntantogian and Christos Xenakis and Sokratis K. Katsikas}, editor = {Steven Furnell and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks}, booktitle = {Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6863}, pages = {138--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22890-2\_12}, doi = {10.1007/978-3-642-22890-2\_12}, timestamp = {Mon, 03 Jan 2022 22:15:13 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/DarraNXK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianXS10, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, title = {A generic mechanism for efficient authentication in {B3G} networks}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {460--475}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.001}, doi = {10.1016/J.COSE.2009.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/gr/Ntantogian09, author = {Christoforos Ntantogian}, title = {{\(M\)}{\(\epsilon\)}{\(\lambda\)}{\(\acute{\epsilon}\)}{\(\tau\)}{\(\eta\)} {\(\kappa\)}{\(\alpha\)}{\(\iota\)} {\(\sigma\)}{\(\chi\)}{\(\epsilon\)}{\(\delta\)}{\(\iota\)}{\(\alpha\)}{\(\sigma\)}{\(\mu\)}{\'{o}}{\(\varsigma\)} {\(\mu\)}{\(\eta\)}{\(\chi\)}{\(\alpha\)}{\(\nu\)}{\(\iota\)}{\(\sigma\)}{\(\mu\)}{\(o\)}{\(\acute{\upsilon}\)} {\(\delta\)}{\(\rho\)}{\(o\)}{\(\mu\)}{\(o\)}{\(\lambda\)}{\'{o}}{\(\gamma\)}{\(\eta\)}{\(\sigma\)}{\(\eta\)}{\(\varsigma\)} {\(\gamma\)}{\(\iota\)}{\(\alpha\)} {\(\delta\)}{\(\acute{\iota}\)}{\(\kappa\)}{\(\tau\)}{\(\upsilon\)}{\(\alpha\)} {\(\alpha\)}{\(\iota\)}{\(\sigma\)}{\texttheta}{\(\eta\)}{\(\tau\)}{\(\acute{\eta}\)}{\(\rho\)}{\(\omega\)}{\(\nu\)}}, school = {National and Kapodistrian University of Athens, Greece}, year = {2009}, url = {http://hdl.handle.net/10442/hedi/0204}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/gr/Ntantogian09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/NtantogianX09, author = {Christoforos Ntantogian and Christos Xenakis}, title = {One-Pass {EAP-AKA} Authentication in 3G-WLAN Integrated Networks}, journal = {Wirel. Pers. Commun.}, volume = {48}, number = {4}, pages = {569--584}, year = {2009}, url = {https://doi.org/10.1007/s11277-008-9548-4}, doi = {10.1007/S11277-008-9548-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/NtantogianX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/XenakisNS08, author = {Christos Xenakis and Christoforos Ntantogian and Ioannis Stavrakakis}, title = {A network-assisted mobile {VPN} for securing users data in {UMTS}}, journal = {Comput. Commun.}, volume = {31}, number = {14}, pages = {3315--3327}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2008.05.018}, doi = {10.1016/J.COMCOM.2008.05.018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/XenakisNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/XenakisN07, author = {Christos Xenakis and Christoforos Ntantogian}, title = {Security architectures for {B3G} mobile networks}, journal = {Telecommun. Syst.}, volume = {35}, number = {3-4}, pages = {123--139}, year = {2007}, url = {https://doi.org/10.1007/s11235-007-9044-2}, doi = {10.1007/S11235-007-9044-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/XenakisN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bionetics/NtantogianXS07, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, editor = {Falko Dressler}, title = {Efficient Authentication for Users Autonomy in Next Generation All-IP Networks}, booktitle = {2nd International {ICST} Conference on Bio-Inspired Models of Network, Information, and Computing Systems, {BIONETICS} 2007, Budapest, Hungary, December 10-13, 2007}, pages = {295--300}, publisher = {{ICST} / {IEEE}}, year = {2007}, url = {https://doi.org/10.4108/ICST.BIONETICS2007.2372}, doi = {10.4108/ICST.BIONETICS2007.2372}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bionetics/NtantogianXS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/NtantogianX07, author = {Christoforos Ntantogian and Christos Xenakis}, title = {A Security Protocol for Mutual Authentication and Mobile {VPN} Deployment in {B3G} Networks}, booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September 2007, Athens, Greece}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/PIMRC.2007.4394363}, doi = {10.1109/PIMRC.2007.4394363}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/NtantogianX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/NtantogianX07a, author = {Christoforos Ntantogian and Christos Xenakis}, title = {Reducing Authentication Traffic in 3G-WLAN Integrated Networks}, booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September 2007, Athens, Greece}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/PIMRC.2007.4394508}, doi = {10.1109/PIMRC.2007.4394508}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/NtantogianX07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.