default search action
Alexios Mylonas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Kieran Rendall, Alexios Mylonas, Stilianos Vidalis, Dimitris Gritzalis:
MIDAS: Multi-layered attack detection architecture with decision optimisation. Comput. Secur. 148: 104154 (2025) - 2024
- [j23]Ashley Allen, Alexios Mylonas, Stilianos Vidalis, Dimitris Gritzalis:
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks. Comput. Secur. 139: 103687 (2024) - [j22]Ashley Allen, Alexios Mylonas, Stilianos Vidalis, Dimitris Gritzalis:
Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices. Sensors 24(17): 5465 (2024) - [c26]Matt Kenny, Nikolaos Pitropakis, Sarwar Sayeed, Christos Chrysoulas, Alexios Mylonas:
Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics. SEC 2024: 264-278 - 2023
- [j21]Antonia Nisioti, George Loukas, Alexios Mylonas, Emmanouil Panaousis:
Forensics for multi-stage cyber incidents: Survey and future directions. Forensic Sci. Int. Digit. Investig. 44: 301480 (2023) - [j20]Sameer Ali, Saw Chin Tan, Ching Kwang Lee, Zulfadzli Yusoff, Muhammad Reazul Haque, Alexios Mylonas, Nikolaos Pitropakis:
AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks. Sensors 23(21): 8922 (2023) - [i2]Ashley Allen, Alexios Mylonas, Stilianos Vidalis:
Technical Report relating to CVE-2022-46480, CVE-2023-26941, CVE-2023-26942, and CVE-2023-26943. CoRR abs/2312.00021 (2023) - 2022
- [j19]Michael Gallagher, Nikolaos Pitropakis, Christos Chrysoulas, Pavlos Papadopoulos, Alexios Mylonas, Sokratis K. Katsikas:
Investigating machine learning attacks on financial time series models. Comput. Secur. 123: 102933 (2022) - [j18]Eric Chiejina, Hannan Xiao, Bruce Christianson, Alexios Mylonas, Chidinma Chiejina:
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks. Sensors 22(2): 571 (2022) - 2021
- [j17]Andrei Butnaru, Alexios Mylonas, Nikolaos Pitropakis:
Towards Lightweight URL-Based Phishing Detection. Future Internet 13(6): 154 (2021) - [j16]Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. J. Cybersecur. Priv. 1(2): 252-273 (2021) - [j15]Christopher Kelly, Nikolaos Pitropakis, Alexios Mylonas, Sean McKeown, William J. Buchanan:
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors 21(7): 2433 (2021) - [c25]Amna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron:
Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail. CRITIS 2021: 168-185 - [c24]Amna Altaf, Shamal Faily, Huseyin Dogan, Eylem Thron, Alexios Mylonas:
Integrated Design Framework for Facilitating Systems-Theoretic Process Analysis. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 58-73 - [i1]Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. CoRR abs/2104.12426 (2021) - 2020
- [j14]Mohammad Heydari, Alexios Mylonas, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa, Surjit Singh:
Known unknowns: Indeterminacy in authentication in IoT. Future Gener. Comput. Syst. 111: 278-287 (2020) - [j13]Nikolaos Pitropakis, Kamil Kokot, Dimitra Gkatzia, Robert Ludwiniak, Alexios Mylonas, Miltiadis Kandias:
Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter. Mach. Learn. Knowl. Extr. 2(3): 192-215 (2020) - [j12]Kieran Rendall, Antonia Nisioti, Alexios Mylonas:
Towards a Multi-Layered Phishing Detection. Sensors 20(16): 4540 (2020) - [j11]Ioannis Tsimperidis, Paul D. Yoo, Kamal Taha, Alexios Mylonas, Vasilis Katos:
R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification. IEEE Trans. Cybern. 50(2): 525-535 (2020)
2010 – 2019
- 2019
- [c23]Amna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron:
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 98-107 - [c22]Mohammad Heydari, Alexios Mylonas, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi:
Uncertainty-Aware Authentication Model for IoT. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 224-237 - [c21]Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
Uncertainty-Aware Authentication Model for Fog Computing in IoT. FMEC 2019: 52-59 - [c20]Matthew Corner, Huseyin Dogan, Alexios Mylonas, Francis Djabri:
A Usability Evaluation of Privacy Add-ons for Web Browsers. HCI (21) 2019: 442-458 - [c19]Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
A Location-Aware Authentication Model to Handle Uncertainty in IoT. IoTSMS 2019: 43-50 - [p1]Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis:
Towards Indeterminacy-Tolerant Access Control in IoT. Handbook of Big Data and IoT Security 2019: 53-71 - 2018
- [j10]Stefano Belloro, Alexios Mylonas:
I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild. IEEE Access 6: 52779-52792 (2018) - [j9]Antonia Nisioti, Alexios Mylonas, Paul D. Yoo, Vasilios Katos:
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods. IEEE Commun. Surv. Tutorials 20(4): 3369-3388 (2018) - [j8]Dimitris Gritzalis, Giulia Iseppi, Alexios Mylonas, Vasilis Stavrou:
Exiting the Risk Assessment Maze: A Meta-Survey. ACM Comput. Surv. 51(1): 11:1-11:30 (2018) - 2017
- [j7]Nikolaos Tsalis, Alexios Mylonas, Antonia Nisioti, Dimitris Gritzalis, Vasilios Katos:
Exploring the protection of private browsing in desktop browsers. Comput. Secur. 67: 181-197 (2017) - [c18]Jodie Ward, Huseyin Dogan, Edward Apeh, Alexios Mylonas, Vasilios Katos:
Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme. HCI (22) 2017: 396-413 - [c17]Antonia Nisioti, Alexios Mylonas, Vasilios Katos, Paul D. Yoo, Anargyros Chryssanthou:
You can run but you cannot hide from memory: Extracting IM evidence of Android apps. ISCC 2017: 457-464 - [c16]Antonia Nisioti, Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Vahid Heydari Fami Tafreshi:
TRAWL: Protection against rogue sites for the masses. RCIS 2017: 120-127 - 2016
- [j6]Panagiotis Andriotis, George C. Oikonomou, Alexios Mylonas, Theo Tryfonas:
A study on usability and security features of the Android pattern lock screen. Inf. Comput. Secur. 24(1): 53-72 (2016) - [c15]Shamal Faily, Georgia Lykou, Anton Partridge, Dimitris Gritzalis, Alexios Mylonas, Vasilios Katos:
Human-Centered Specification Exemplars for Critical Infrastructure Environments. BCS HCI 2016 - 2015
- [j5]Nikos Virvilis, Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis:
Security Busters: Web browser security vs. rogue sites. Comput. Secur. 52: 90-105 (2015) - [j4]Theodoros Spyridopoulos, Konstantinos Maraslis, Alexios Mylonas, Theo Tryfonas, George C. Oikonomou:
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. Inf. Secur. J. A Glob. Perspect. 24(4-6): 164-176 (2015) - [c14]Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis:
An Intensive Analysis of Security and Privacy Browser Add-Ons. CRiSIS 2015: 258-273 - [c13]Nasser O. Alshammari, Alexios Mylonas, Mohamed H. Sedky, Justin Champion, Carolin Bauer:
Exploring the Adoption of Physical Security Controls in Smartphones. HCI (22) 2015: 287-298 - 2014
- [c12]Nikolaos Tsalis, Nikos Virvilis, Alexios Mylonas, Theodore K. Apostolopoulos, Dimitris Gritzalis:
Browser Blacklists: The Utopia of Phishing Protection. ICETE (Selected Papers) 2014: 278-293 - [c11]Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis:
Mobile Devices - A Phisher's Paradise. SECRYPT 2014: 79-87 - 2013
- [j3]Alexios Mylonas, Anastasia Kastania, Dimitris Gritzalis:
Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34: 47-66 (2013) - [j2]Alexios Mylonas, Vasilis Meletiadis, Lilian Mitrou, Dimitris Gritzalis:
Smartphone sensor data as digital evidence. Comput. Secur. 38: 51-75 (2013) - [c10]Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis:
Assessing Privacy Risks in Android: A User-Centric Approach. RISK@ICTSS 2013: 21-37 - [c9]Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis:
Evaluating the Manageability of Web Browsers Controls. STM 2013: 82-98 - [c8]Alexios Mylonas, Dimitris Gritzalis, Bill Tsoumas, Theodore K. Apostolopoulos:
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users. TrustBus 2013: 173-184 - 2012
- [j1]Alexios Mylonas, Dimitris Gritzalis:
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. Comput. Secur. 31(6): 802-803 (2012) - [c7]Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis:
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. SEC 2012: 249-260 - [c6]Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis:
A Risk Assessment Method for Smartphones. SEC 2012: 443-456 - 2011
- [c5]Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:
On the Feasibility of Malware Attacks in Smartphone Platforms. ICETE (Selected Papers) 2011: 217-232 - [c4]Miltiadis Kandias, Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis:
Exploitation of auctions for outsourcing security-critical projects. ISCC 2011: 646-651 - [c3]Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:
Smartphone Security Evaluation - The Malware Attack Case . SECRYPT 2011: 25-36 - [c2]Alexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis:
A Secure Smartphone Applications Roll-out Scheme. TrustBus 2011: 49-61 - 2010
- [c1]Miltiadis Kandias, Alexios Mylonas, Nikos Virvilis, Marianthi Theoharidou, Dimitris Gritzalis:
An Insider Threat Prediction Model. TrustBus 2010: 26-37
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint