Alexios Mylonas

According to our database1, Alexios Mylonas authored at least 48 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks.
Sensors, November, 2023

Forensics for multi-stage cyber incidents: Survey and future directions.
Forensic Sci. Int. Digit. Investig., March, 2023

Technical Report relating to CVE-2022-46480, CVE-2023-26941, CVE-2023-26942, and CVE-2023-26943.
CoRR, 2023

2022
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks.
Sensors, 2022

Investigating machine learning attacks on financial time series models.
Comput. Secur., 2022

2021
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.
J. Cybersecur. Priv., April, 2021

A Comparative Analysis of Honeypots on Different Cloud Platforms.
Sensors, 2021

Towards Lightweight URL-Based Phishing Detection.
Future Internet, 2021

Integrated Design Framework for Facilitating Systems-Theoretic Process Analysis.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail.
Proceedings of the Critical Information Infrastructures Security, 2021

2020
R<sup>2</sup>BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification.
IEEE Trans. Cybern., 2020

Towards a Multi-Layered Phishing Detection.
Sensors, 2020

Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter.
Mach. Learn. Knowl. Extr., 2020

Known unknowns: Indeterminacy in authentication in IoT.
Future Gener. Comput. Syst., 2020

2019
A Location-Aware Authentication Model to Handle Uncertainty in IoT.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

A Usability Evaluation of Privacy Add-ons for Web Browsers.
Proceedings of the Design, User Experience, and Usability. Practice and Case Studies, 2019

Uncertainty-Aware Authentication Model for Fog Computing in IoT.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

Uncertainty-Aware Authentication Model for IoT.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Towards Indeterminacy-Tolerant Access Control in IoT.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
Exiting the Risk Assessment Maze: A Meta-Survey.
ACM Comput. Surv., 2018

From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods.
IEEE Commun. Surv. Tutorials, 2018

I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild.
IEEE Access, 2018

2017
Exploring the protection of private browsing in desktop browsers.
Comput. Secur., 2017

TRAWL: Protection against rogue sites for the masses.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

You can run but you cannot hide from memory: Extracting IM evidence of Android apps.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
A study on usability and security features of the Android pattern lock screen.
Inf. Comput. Secur., 2016

Human-Centered Specification Exemplars for Critical Infrastructure Environments.
Proceedings of the HCI 2016, 2016

2015
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.
Inf. Secur. J. A Glob. Perspect., 2015

Security Busters: Web browser security vs. rogue sites.
Comput. Secur., 2015

Exploring the Adoption of Physical Security Controls in Smartphones.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

An Intensive Analysis of Security and Privacy Browser Add-Ons.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
Mobile Devices - A Phisher's Paradise.
Proceedings of the SECRYPT 2014, 2014

Browser Blacklists: The Utopia of Phishing Protection.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2013
Smartphone sensor data as digital evidence.
Comput. Secur., 2013

Delegate the smartphone user? Security awareness in smartphone platforms.
Comput. Secur., 2013

A Qualitative Metrics Vector for the Awareness of Smartphone Security Users.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Evaluating the Manageability of Web Browsers Controls.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Assessing Privacy Risks in Android: A User-Centric Approach.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

2012
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
Comput. Secur., 2012

A Risk Assessment Method for Smartphones.
Proceedings of the Information Security and Privacy Research, 2012

Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition.
Proceedings of the Information Security and Privacy Research, 2012

2011
A Secure Smartphone Applications Roll-out Scheme.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Smartphone Security Evaluation - The Malware Attack Case .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Exploitation of auctions for outsourcing security-critical projects.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

On the Feasibility of Malware Attacks in Smartphone Platforms.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

2010
An Insider Threat Prediction Model.
Proceedings of the Trust, 2010


  Loading...