Alexios Mylonas

According to our database1, Alexios Mylonas authored at least 48 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks.
Sensors, November, 2023

Forensics for multi-stage cyber incidents: Survey and future directions.
Forensic Sci. Int. Digit. Investig., March, 2023

Technical Report relating to CVE-2022-46480, CVE-2023-26941, CVE-2023-26942, and CVE-2023-26943.
CoRR, 2023

A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks.
Sensors, 2022

Investigating machine learning attacks on financial time series models.
Comput. Secur., 2022

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.
J. Cybersecur. Priv., April, 2021

A Comparative Analysis of Honeypots on Different Cloud Platforms.
Sensors, 2021

Towards Lightweight URL-Based Phishing Detection.
Future Internet, 2021

Integrated Design Framework for Facilitating Systems-Theoretic Process Analysis.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail.
Proceedings of the Critical Information Infrastructures Security, 2021

R<sup>2</sup>BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification.
IEEE Trans. Cybern., 2020

Towards a Multi-Layered Phishing Detection.
Sensors, 2020

Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter.
Mach. Learn. Knowl. Extr., 2020

Known unknowns: Indeterminacy in authentication in IoT.
Future Gener. Comput. Syst., 2020

A Location-Aware Authentication Model to Handle Uncertainty in IoT.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

A Usability Evaluation of Privacy Add-ons for Web Browsers.
Proceedings of the Design, User Experience, and Usability. Practice and Case Studies, 2019

Uncertainty-Aware Authentication Model for Fog Computing in IoT.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

Uncertainty-Aware Authentication Model for IoT.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Towards Indeterminacy-Tolerant Access Control in IoT.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Exiting the Risk Assessment Maze: A Meta-Survey.
ACM Comput. Surv., 2018

From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods.
IEEE Commun. Surv. Tutorials, 2018

I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild.
IEEE Access, 2018

Exploring the protection of private browsing in desktop browsers.
Comput. Secur., 2017

TRAWL: Protection against rogue sites for the masses.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

You can run but you cannot hide from memory: Extracting IM evidence of Android apps.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

A study on usability and security features of the Android pattern lock screen.
Inf. Comput. Secur., 2016

Human-Centered Specification Exemplars for Critical Infrastructure Environments.
Proceedings of the HCI 2016, 2016

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.
Inf. Secur. J. A Glob. Perspect., 2015

Security Busters: Web browser security vs. rogue sites.
Comput. Secur., 2015

Exploring the Adoption of Physical Security Controls in Smartphones.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

An Intensive Analysis of Security and Privacy Browser Add-Ons.
Proceedings of the Risks and Security of Internet and Systems, 2015

Mobile Devices - A Phisher's Paradise.
Proceedings of the SECRYPT 2014, 2014

Browser Blacklists: The Utopia of Phishing Protection.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Smartphone sensor data as digital evidence.
Comput. Secur., 2013

Delegate the smartphone user? Security awareness in smartphone platforms.
Comput. Secur., 2013

A Qualitative Metrics Vector for the Awareness of Smartphone Security Users.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Evaluating the Manageability of Web Browsers Controls.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Assessing Privacy Risks in Android: A User-Centric Approach.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
Comput. Secur., 2012

A Risk Assessment Method for Smartphones.
Proceedings of the Information Security and Privacy Research, 2012

Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition.
Proceedings of the Information Security and Privacy Research, 2012

A Secure Smartphone Applications Roll-out Scheme.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Smartphone Security Evaluation - The Malware Attack Case .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Exploitation of auctions for outsourcing security-critical projects.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

On the Feasibility of Malware Attacks in Smartphone Platforms.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

An Insider Threat Prediction Model.
Proceedings of the Trust, 2010