Thanasis Petsas
Thanasis Petsas
Appthority
Bestätigte E-Mail-Adresse bei appthority.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Rage against the virtual machine: hindering dynamic analysis of android malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the Seventh European Workshop on System Security, 1-6, 2014
2192014
Rise of the planet of the apps: A systematic study of the mobile app ecosystem
T Petsas, A Papadogiannakis, M Polychronakis, EP Markatos, ...
Proceedings of the 2013 conference on Internet measurement conference, 277-290, 2013
1072013
Two-factor authentication: is the world ready? Quantifying 2FA adoption
T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis
Proceedings of the eighth european workshop on system security, 1-7, 2015
702015
Using social networks to harvest email addresses
I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010
602010
The long-standing privacy debate: Mobile websites vs mobile apps
EP Papadopoulos, M Diamantaris, P Papadopoulos, T Petsas, ...
Proceedings of the 26th International Conference on World Wide Web, 153-162, 2017
382017
A systematic characterization of IM threats using honeypots
S Antonatos, I Polakis, T Petsas, EP Markatos
ISOC Network and Distributed System Security Symposium (NDSS), 2010
232010
Powerslave: Analyzing the energy consumption of mobile antivirus software
I Polakis, M Diamantaris, T Petsas, F Maggi, S Ioannidis
International Conference on Detection of Intrusions and Malware, and …, 2015
192015
Measurement, modeling, and analysis of the mobile app ecosystem
T Petsas, A Papadogiannakis, M Polychronakis, EP Markatos, ...
ACM Transactions on Modeling and Performance Evaluation of Computing Systems …, 2017
132017
MAD: A Middleware Framework for Multi-Step Attack Detection
P Papadopoulos, T Petsas, G Christou, G Vasiliadis
2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015
22015
Analyzing the Energy Consumption of Mobile Antivirus Software
I Polakis, M Diamantaris, T Petsas, F Maggi, S Ioannidis
1
A Trusted Knowledge Management System for Multi-layer Threat Analysis
T Petsas, K Okada, H Tazaki, G Blanc, P Pawliński
International Conference on Trust and Trustworthy Computing, 214-215, 2014
2014
JSMPI: Building Parallel Applications in the Browser Environment
T Petsas, E Athanasopoulos, S Ioannidis
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–12