Christos Ilioudis

Orcid: 0000-0002-8084-4339

Affiliations:
  • International Hellenic University, Greece


According to our database1, Christos Ilioudis authored at least 33 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An autoML network traffic analyzer for cyber threat detection.
Int. J. Inf. Sec., October, 2023

A Cyber Threat Intelligence Management Platform for Industrial Environments.
CoRR, 2023

Cyber-pi: Intelligent cyberthreat detection and supervised response.
Proceedings of the Workshop on Research Projects Track @ RCIS 2023 co-located with RCIS 2023, 2023

Introducing responsibly self-healing into the incident management lifecycle.
Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 2023

2020
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem.
Comput., 2020

An Innovative Self-Healing Approach with STIX Data Utilisation.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem.
Secur. Commun. Networks, 2019

Actionable threat intelligence for digital forensics readiness.
Inf. Comput. Secur., 2019

Improving Forensic Triage Efficiency through Cyber Threat Intelligence.
Future Internet, 2019

A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2014
A global-local approach for estimating the Internet's threat level.
J. Commun. Networks, 2014

A formal framework to support dynamic authorisation in collaborative environments.
Int. J. Comput. Sci. Eng., 2014

Measuring the Internet's threat level: A global-local approach.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
A framework for teaching network security in academic environments.
Inf. Manag. Comput. Secur., 2013

Geometrical facial feature selection for person identification.
Proceedings of the 16th International Conference on Information Fusion, 2013

2012
Real-time network data analysis using time series models.
Simul. Model. Pract. Theory, 2012

A Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments.
Inf. Secur. J. A Glob. Perspect., 2012

Analyzing the selection and dynamic composition of web services in e-commerce transactions.
Proceedings of the Balkan Conference in Informatics, 2012, 2012

Insider threats in corporate environments: a case study for data leakage prevention.
Proceedings of the Balkan Conference in Informatics, 2012, 2012

2011
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis.
Int. J. Digit. Crime Forensics, 2011

Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

A Hacker's Perspective on Educating Future Security Experts.
Proceedings of the 15th Panhellenic Conference on Informatics, 2011

On the Evolution of Malware Species.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
The Importance of Corporate Forensic Readiness in the Information Security Framework.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

2009
Data Hiding in the SWF Format and Spreading through Social Network Services.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

Using Nature and Bio-inspired Technologies for Building Innovative Proactive Security Mechanisms.
Proceedings of the PCI 2009, 2009

2008
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time.
Int. J. Inf. Comput. Secur., 2008

The importance of biometric sensor continuous secure monitoring.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

2007
Securing Healthgrid Environments.
Proceedings of the SECRYPT 2007, 2007

2001
Ασφάλεια διαδικτυακών πληροφοριακών συστημάτων
PhD thesis, 2001

Security Model for XML Data.
Proceedings of the International Conference on Internet Computing, 2001


  Loading...