According to our database1, Dimitrios Damopoulos
Legend:Book In proceedings Article PhD thesis Other
Europe in the shadow of financial crisis: Policy Making via Stance Classification.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Introducing touchstroke: keystroke-based authentication system for smartphones.
Security and Communication Networks, 2016
Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics and Informatics, 2015
WYSISNWIV: What You Scan Is Not What I Visit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Networking and Applications, 2014
A cloud-based architecture to crowdsource mobile app privacy leaks.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014
User privacy and modern mobile services: are they on the same path?
Personal and Ubiquitous Computing, 2013
A critical review of 7 years of Mobile Device Forensics.
Digital Investigation, 2013
From keyloggers to touchloggers: Take the rough with the smooth.
Computers & Security, 2013
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Security and Communication Networks, 2012
MILC: A secure and privacy-preserving mobile instant locator with chatting.
Information Systems Frontiers, 2012
iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011