Volgen
Christos Xenakis
Christos Xenakis
Professor, Department of Digital Systems, University of Piraeus
Geverifieerd e-mailadres voor unipi.gr - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
C Xenakis, N Laoutaris, L Merakos, I Stavrakakis
Computer Networks 50 (17), 3225-3241, 2006
952006
Security in third generation mobile networks
C Xenakis, L Merakos
Computer communications 27 (7), 638-650, 2004
932004
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
C Xenakis, C Panos, I Stavrakakis
Computers & Security 30 (1), 63-80, 2011
882011
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks
C Panos, C Ntantogian, S Malliaros, C Xenakis
Computer Networks 113, 94-110, 2017
802017
Evaluating the privacy of Android mobile applications under forensic analysis
C Ntantogian, D Apostolopoulos, G Marinakis, C Xenakis
Computers & Security 42, 66-76, 2014
612014
Evaluation of cryptography usage in android applications
A Chatzikonstantinou, C Ntantogian, G Karopoulos, C Xenakis
EAI Endorsed Transactions on Security and Safety 3 (9), 83-90, 2016
572016
One-pass EAP-AKA authentication in 3G-WLAN integrated networks
C Ntantogian, C Xenakis
Wireless personal communications 48, 569-584, 2009
412009
Evaluation of password hashing schemes in open source web platforms
C Ntantogian, S Malliaros, C Xenakis
Computers & Security 84, 206-224, 2019
402019
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
A Stasinopoulos, C Ntantogian, C Xenakis
International Journal of Information Security 18, 49-72, 2019
402019
Discovering authentication credentials in volatile memory of android mobile devices
D Apostolopoulos, G Marinakis, C Ntantogian, C Xenakis
Collaborative, Trusted and Privacy-Aware e/m-Services: 12th IFIP WG 6.11 …, 2013
392013
A specification-based intrusion detection engine for infrastructure-less networks
C Panos, C Xenakis, P Kotzias, I Stavrakakis
Computer Communications 54, 67-83, 2014
322014
Helphed: Hybrid ensemble learning phishing email detection
P Bountakas, C Xenakis
Journal of network and computer applications 210, 103545, 2023
312023
Malicious actions against the GPRS technology
C Xenakis
Journal in Computer Virology 2, 121-133, 2006
312006
MITRE ATT&CK-driven cyber risk assessment
M Ahmed, S Panda, C Xenakis, E Panaousis
Proceedings of the 17th International Conference on Availability …, 2022
302022
Gaithashing: a two-factor authentication scheme based on gait features
C Ntantogian, S Malliaros, C Xenakis
Computers & Security 52, 17-32, 2015
292015
A novel intrusion detection system for MANETs
C Panos, C Xenakis, I Stavrakakis
2010 International Conference on Security and Cryptography (SECRYPT), 1-10, 2010
292010
On demand network-wide VPN deployment in GPRS
C Xenakis, L Merakos
IEEE network 16 (6), 28-37, 2002
292002
Secure edge computing with lightweight control-flow property-based attestation
N Koutroumpouchos, C Ntantogian, SA Menesidou, K Liang, P Gouvas, ...
2019 IEEE Conference on Network Softwarization (NetSoft), 84-92, 2019
282019
Security Measures and Weaknesses of the GPRS Security Architecture.
C Xenakis
Int. J. Netw. Secur. 6 (2), 158-169, 2008
282008
P4G2Go: a privacy-preserving scheme for roaming energy consumers of the smart grid-to-go
A Farao, E Veroni, C Ntantogian, C Xenakis
Sensors 21 (8), 2686, 2021
252021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20