Dimitrios Damopoulos

Orcid: 0000-0002-6664-0700

Affiliations:
  • Stevens Institute of Technology, NJ, USA


According to our database1, Dimitrios Damopoulos authored at least 21 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Machine Learning Classification of Obfuscation using Image Visualization.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2019
Hands-Free one-Time and continuous authentication using glass wearable devices.
J. Inf. Secur. Appl., 2019

Segmentation of the proximal femur in radial MR scans using a random forest classifier and deformable model registration.
Int. J. Comput. Assist. Radiol. Surg., 2019

Introducing Research into the Undergraduate Curriculum in Cybersecurity.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

2018
Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices.
CoRR, 2018

Automated Grading of Modic Changes Using CNNs - Improving the Performance with Mixup.
Proceedings of the Computational Methods and Clinical Applications for Spine Imaging, 2018

2017
Automatic Localization of the Lumbar Vertebral Landmarks in CT Images with Context Features.
Proceedings of the Computational Methods and Clinical Applications in Musculoskeletal Imaging, 2017

Europe in the shadow of financial crisis: Policy Making via Stance Classification.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Introducing touchstroke: keystroke-based authentication system for smartphones.
Secur. Commun. Networks, 2016

Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics Informatics, 2015

WYSISNWIV: What You Scan Is Not What I Visit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

2014
Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Netw. Appl., 2014

A cloud-based architecture to crowdsource mobile app privacy leaks.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
User privacy and modern mobile services: are they on the same path?
Pers. Ubiquitous Comput., 2013

A critical review of 7 years of Mobile Device Forensics.
Digit. Investig., 2013

From keyloggers to touchloggers: Take the rough with the smooth.
Comput. Secur., 2013

2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012

MILC: A secure and privacy-preserving mobile instant locator with chatting.
Inf. Syst. Frontiers, 2012

2011
iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011


  Loading...