Dimitrios Damopoulos

According to our database1, Dimitrios Damopoulos
  • authored at least 14 papers between 2011 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Europe in the shadow of financial crisis: Policy Making via Stance Classification.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Introducing touchstroke: keystroke-based authentication system for smartphones.
Security and Communication Networks, 2016

Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics and Informatics, 2015

WYSISNWIV: What You Scan Is Not What I Visit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

2014
Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Networking and Applications, 2014

A cloud-based architecture to crowdsource mobile app privacy leaks.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
User privacy and modern mobile services: are they on the same path?
Personal and Ubiquitous Computing, 2013

A critical review of 7 years of Mobile Device Forensics.
Digital Investigation, 2013

From keyloggers to touchloggers: Take the rough with the smooth.
Computers & Security, 2013

2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Security and Communication Networks, 2012

MILC: A secure and privacy-preserving mobile instant locator with chatting.
Information Systems Frontiers, 2012

2011
iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011


  Loading...