Nikolaos Pitropakis
Nikolaos Pitropakis
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Cloud computing security: foundations and challenges
JR Vacca
CRC Press, 2016
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments
N Pitropakis, A Pikrakis, C Lambrinoudakis
International Journal of Information Security 14 (4), 299-305, 2015
Till all are one: Towards a unified cloud IDS
N Pitropakis, C Lambrinoudakis, D Geneiatakis
International Conference on Trust and Privacy in Digital Business, 136-149, 2015
A taxonomy and survey of attacks against machine learning
N Pitropakis, E Panaousis, T Giannetsos, E Anastasiadis, G Loukas
Computer Science Review 34, 100199, 2019
It's All in the Cloud: Reviewing Cloud Security
N Pitropakis, E Darra, N Vrakas, C Lambrinoudakis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
A Practical Steganographic Approach for Matroska Based High Quality Video Files
N Pitropakis, C Lambrinoudakis, D Geneiatakis, D Gritzalis
2013 27th International Conference on Advanced Information Networking and …, 2013
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments
N Pitropakis, D Anastasopoulou, A Pikrakis, C Lambrinoudakis
Journal of Cloud Computing 3 (1), 20, 2014
An enhanced cyber attack attribution framework
N Pitropakis, E Panaousis, A Giannakoulias, G Kalpakis, RD Rodriguez, ...
International Conference on Trust and Privacy in Digital Business, 213-228, 2018
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
N Pitropakis, C Lyvas, C Lambrinoudakis
London South Bank University, 2017
Towards an augmented authenticator in the Cloud
N Pitropakis, N Yfantopoulos, D Geneiatakis, C Lambrinoudakis
2014 IEEE International Symposium on Signal Processing and Information …, 2014
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier
AJ Hall, N Pitropakis, WJ Buchanan, N Moradpoor
2018 IEEE International Conference on Big Data (Big Data), 5034-5039, 2018
Detecting malicious insider threat in cloud computing environments
N Pitropakis
Πανεπιστήμιο Πειραιώς. Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών …, 2015
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
O Christou, N Pitropakis, P Papadopoulos, S McKeown, WJ Buchanan
arXiv preprint arXiv:2005.06599, 2020
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures
N Pitropakis, M Logothetis, G Andrienko, J Stefanatos, E Karapistoli, ...
Computer Security, 53-68, 2019
Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device
J Barton, WJ Buchanan, W Abramson, N Pitropakis
arXiv preprint arXiv:1912.12257, 2019
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture
C Christos, N Pitropakis
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 18 …, 2018
◾ Cloud Security, Privacy, and Trust Baselines
N Pitropakis, SK Katsikas, C Lambrinoudakis
Cloud Computing Security, 71-84, 2016
The far side of mobile application integrated development environments
C Lyvas, N Pitropakis, C Lambrinoudakis
International Conference on Trust and Privacy in Digital Business, 111-122, 2016
Testing And Hardening IoT Devices Against the Mirai Botnet
C Kelly, N Pitropakis, S McKeown, C Lambrinoudakis
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20