Dimitrios Damopoulos

According to our database1, Dimitrios Damopoulos
  • authored at least 15 papers between 2011 and 2017.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Automatic Localization of the Lumbar Vertebral Landmarks in CT Images with Context Features.
Proceedings of the Computational Methods and Clinical Applications in Musculoskeletal Imaging, 2017

Europe in the shadow of financial crisis: Policy Making via Stance Classification.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Introducing touchstroke: keystroke-based authentication system for smartphones.
Security and Communication Networks, 2016

Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics and Informatics, 2015

WYSISNWIV: What You Scan Is Not What I Visit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Networking and Applications, 2014

A cloud-based architecture to crowdsource mobile app privacy leaks.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014

User privacy and modern mobile services: are they on the same path?
Personal and Ubiquitous Computing, 2013

A critical review of 7 years of Mobile Device Forensics.
Digital Investigation, 2013

From keyloggers to touchloggers: Take the rough with the smooth.
Computers & Security, 2013

Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Security and Communication Networks, 2012

MILC: A secure and privacy-preserving mobile instant locator with chatting.
Information Systems Frontiers, 2012

iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011