According to our database1, Dimitrios Damopoulos authored at least 15 papers between 2011 and 2017.
Legend:Book In proceedings Article PhD thesis Other
Automatic Localization of the Lumbar Vertebral Landmarks in CT Images with Context Features.
Proceedings of the Computational Methods and Clinical Applications in Musculoskeletal Imaging, 2017
Europe in the shadow of financial crisis: Policy Making via Stance Classification.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Introducing touchstroke: keystroke-based authentication system for smartphones.
Security and Communication Networks, 2016
Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics and Informatics, 2015
WYSISNWIV: What You Scan Is Not What I Visit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Networking and Applications, 2014
A cloud-based architecture to crowdsource mobile app privacy leaks.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014
User privacy and modern mobile services: are they on the same path?
Personal and Ubiquitous Computing, 2013
A critical review of 7 years of Mobile Device Forensics.
Digital Investigation, 2013
From keyloggers to touchloggers: Take the rough with the smooth.
Computers & Security, 2013
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Security and Communication Networks, 2012
MILC: A secure and privacy-preserving mobile instant locator with chatting.
Information Systems Frontiers, 2012
iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011