Two Anatomists Are Better than One—Dual-Level Android Malware Detection
Kouliaridis, Vasileios, Kambourakis, Georgios, Geneiatakis, Dimitris, Potha, Nektaria
Published in Symmetry (Basel) (01.07.2020)
Published in Symmetry (Basel) (01.07.2020)
Get full text
Journal Article
Security and privacy issues for an IoT based smart home
Geneiatakis, Dimitris, Kounelis, Ioannis, Neisse, Ricardo, Nai-Fovino, Igor, Steri, Gary, Baldini, Gianmarco
Published in 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01.05.2017)
Published in 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01.05.2017)
Get full text
Conference Proceeding
On Android’s activity hijacking prevention
Lyvas, Christos, Lambrinoudakis, Costas, Geneiatakis, Dimitris
Published in Computers & security (01.12.2021)
Published in Computers & security (01.12.2021)
Get full text
Journal Article
IntentAuth: Securing Android’s Intent-based inter-process communication
Lyvas, Christos, Lambrinoudakis, Costas, Geneiatakis, Dimitris
Published in International journal of information security (01.10.2022)
Published in International journal of information security (01.10.2022)
Get full text
Journal Article
Dypermin: Dynamic permission mining framework for android platform
Lyvas, Christos, Lambrinoudakis, Costas, Geneiatakis, Dimitris
Published in Computers & security (01.08.2018)
Published in Computers & security (01.08.2018)
Get full text
Journal Article
Survey of network security systems to counter SIP-based denial-of-service attacks
Ehlert, Sven, Geneiatakis, Dimitris, Magedanz, Thomas
Published in Computers & security (01.03.2010)
Published in Computers & security (01.03.2010)
Get full text
Journal Article
A Permission verification approach for android mobile applications
Geneiatakis, Dimitris, Fovino, Igor Nai, Kounelis, Ioannis, Stirparo, Pasquale
Published in Computers & security (01.03.2015)
Published in Computers & security (01.03.2015)
Get full text
Journal Article
On the efficiency of user identification: a system-based approach
Malatras, Apostolos, Geneiatakis, Dimitris, Vakalis, Ioannis
Published in International journal of information security (01.11.2017)
Published in International journal of information security (01.11.2017)
Get full text
Journal Article
Utilizing bloom filters for detecting flooding attacks against SIP based services
Geneiatakis, Dimitris, Vrakas, Nikos, Lambrinoudakis, Costas
Published in Computers & security (01.10.2009)
Published in Computers & security (01.10.2009)
Get full text
Journal Article
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation
Hernández-Ramos, José L., Karopoulos, Georgios, Geneiatakis, Dimitris, Martin, Tania, Kambourakis, Georgios, Fovino, Igor Nai
Published in Wireless communications and mobile computing (2021)
Published in Wireless communications and mobile computing (2021)
Get full text
Journal Article
Obscuring users' identity in VoIP/IMS environments
Vrakas, Nikos, Geneiatakis, Dimitris, Lambrinoudakis, Costas
Published in Computers & security (01.06.2014)
Published in Computers & security (01.06.2014)
Get full text
Journal Article
A privacy enforcing framework for Android applications
Neisse, Ricardo, Steri, Gary, Geneiatakis, Dimitris, Nai Fovino, Igor
Published in Computers & security (01.09.2016)
Published in Computers & security (01.09.2016)
Get full text
Journal Article
An efficient and easily deployable method for dealing with DoS in SIP services
Tsiatsikas, Zisis, Geneiatakis, Dimitris, Kambourakis, Georgios, Keromytis, Angelos D.
Published in Computer communications (15.02.2015)
Published in Computer communications (15.02.2015)
Get full text
Journal Article
A framework for protecting a SIP-based infrastructure against malformed message attacks
Geneiatakis, Dimitris, Kambourakis, Georgios, Lambrinoudakis, Costas, Dagiuklas, Tasos, Gritzalis, Stefanos
Published in Computer networks (Amsterdam, Netherlands : 1999) (11.07.2007)
Published in Computer networks (Amsterdam, Netherlands : 1999) (11.07.2007)
Get full text
Journal Article