Dimitrios Damopoulos

According to our database1, Dimitrios Damopoulos authored at least 15 papers between 2011 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Automatic Localization of the Lumbar Vertebral Landmarks in CT Images with Context Features.
Proceedings of the Computational Methods and Clinical Applications in Musculoskeletal Imaging, 2017

Europe in the shadow of financial crisis: Policy Making via Stance Classification.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Introducing touchstroke: keystroke-based authentication system for smartphones.
Security and Communication Networks, 2016

Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics and Informatics, 2015

WYSISNWIV: What You Scan Is Not What I Visit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

2014
Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Networking and Applications, 2014

A cloud-based architecture to crowdsource mobile app privacy leaks.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
User privacy and modern mobile services: are they on the same path?
Personal and Ubiquitous Computing, 2013

A critical review of 7 years of Mobile Device Forensics.
Digital Investigation, 2013

From keyloggers to touchloggers: Take the rough with the smooth.
Computers & Security, 2013

2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Security and Communication Networks, 2012

MILC: A secure and privacy-preserving mobile instant locator with chatting.
Information Systems Frontiers, 2012

2011
iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011


  Loading...