default search action
Stilianos Vidalis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Kieran Rendall, Alexios Mylonas, Stilianos Vidalis, Dimitris Gritzalis:
MIDAS: Multi-layered attack detection architecture with decision optimisation. Comput. Secur. 148: 104154 (2025) - 2024
- [j8]Ashley Allen, Alexios Mylonas, Stilianos Vidalis, Dimitris Gritzalis:
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks. Comput. Secur. 139: 103687 (2024) - [j7]Ashley Allen, Alexios Mylonas, Stilianos Vidalis, Dimitris Gritzalis:
Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices. Sensors 24(17): 5465 (2024) - 2023
- [j6]Gaurav Sharma, Stilianos Vidalis, Catherine Menon, Niharika Anand:
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases. Multim. Tools Appl. 82(11): 16951-16971 (2023) - [c9]Liang Chen, Stilianos Vidalis, Su Yang:
A Trust-Based Approach for Data Sharing in the MQTT Environment. PST 2023: 1-5 - [i1]Ashley Allen, Alexios Mylonas, Stilianos Vidalis:
Technical Report relating to CVE-2022-46480, CVE-2023-26941, CVE-2023-26942, and CVE-2023-26943. CoRR abs/2312.00021 (2023) - 2022
- [c8]Liang Chen, Cheng Zeng, Stilianos Vidalis:
An Incentive Mechanism for Managing Obligation Delegation. CRiSIS 2022: 191-206 - 2021
- [c7]Catherine Menon, Stilianos Vidalis:
Towards the Resolution of Safety and Security Conflicts. ICCST 2021: 1-6
2010 – 2019
- 2018
- [j5]Niharika Anand, Shirshu Varma, Gaurav Sharma, Stilianos Vidalis:
Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networks. Multim. Tools Appl. 77(13): 16927-16946 (2018) - 2016
- [c6]Andrew Jones, Stilianos Vidalis, Nasser S. Abouzakhar:
Information security and digital forensics in the world of cyber physical systems. ICDIM 2016: 10-14 - 2013
- [j4]Stilianos Vidalis, Olga Angelopoulou:
Deception and Maneuver Warfare Utilizing Cloud Resources. Inf. Secur. J. A Glob. Perspect. 22(4): 151-158 (2013) - 2012
- [c5]Tameem Chowdhury, Stilianos Vidalis:
Collecting Evidence from Large-Scale Heterogeneous Virtual Computing Infrastructures Using Website Capture. EIDWT 2012: 211-217 - [c4]Georgios Pierris, Stilianos Vidalis:
Forensically Classifying Files Using HSOM Algorithms. EIDWT 2012: 225-230 - [c3]Hamse Yuusuf, Stilianos Vidalis:
On the Road to Virtualized Environment. EIDWT 2012: 270-275
2000 – 2009
- 2009
- [c2]Stephen Biggs, Stilianos Vidalis:
Cloud Computing: The impact on digital forensic investigations. ICITST 2009: 1-6 - 2007
- [j3]Stilianos Vidalis, Zafar Kazmi:
Security Through Deception. Inf. Secur. J. A Glob. Perspect. 16(1): 34-41 (2007) - 2006
- [j2]Michael Pilgermann, Andrew Blyth, Stilianos Vidalis:
Inter-organisational intrusion detection using knowledge grid technology. Inf. Manag. Comput. Secur. 14(4): 327-342 (2006) - 2005
- [c1]Stilianos Vidalis, Andrew Jones:
Analyzing Threat Agents and Their Attributes. ECIW 2005: 369-380 - 2003
- [j1]Evangelos Morakis, Stilianos Vidalis, Andrew Blyth:
Measuring vulnerabilities and their exploitation cycle. Inf. Secur. Tech. Rep. 8(4): 45-55 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint