Dimitris Geneiatakis

Orcid: 0000-0001-6455-502X

According to our database1, Dimitris Geneiatakis authored at least 58 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
IntentAuth: Securing Android's Intent-based inter-process communication.
Int. J. Inf. Sec., 2022

2021
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation.
Wirel. Commun. Mob. Comput., 2021

On machine learning effectiveness for malware detection in Android OS using static analysis data.
J. Inf. Secur. Appl., 2021

On Android's activity hijacking prevention.
Comput. Secur., 2021

At Your Service 24/7 or Not? Denial of Service on ESInet Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response Headers.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

2020
Blockchain Performance Analysis for Supporting Cross-Border E-Government Services.
IEEE Trans. Engineering Management, 2020

Towards a Formal IoT Security Model.
Symmetry, 2020

Two Anatomists Are Better than One - Dual-Level Android Malware Detection.
Symmetry, 2020

A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks.
Symmetry, 2020

Not Quite Yourself Today: Behaviour-Based Continuous Authentication in IoT Environments.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies.
IEEE Secur. Priv., 2020

Dissecting contact tracing apps in the Android platform.
CoRR, 2020

2019
The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems.
IEEE Access, 2019

A Performance Evaluation on Distance Measures in KNN for Mobile Malware Detection.
Proceedings of the 6th International Conference on Control, 2019

2018
Dypermin: Dynamic permission mining framework for android platform.
Comput. Secur., 2018

Towards a Mobile Malware Detection Framework with the Support of Machine Learning.
Proceedings of the Security in Computer and Information Sciences, 2018

2017
On the efficiency of user identification: a system-based approach.
Int. J. Inf. Sec., 2017

A wireless propagation analysis for the frequency of the pseudonym changes to support privacy in VANETs.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Security and privacy issues for an IoT based smart home.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

2016
A privacy enforcing framework for Android applications.
Comput. Secur., 2016

Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
A Permission verification approach for android mobile applications.
Comput. Secur., 2015

An efficient and easily deployable method for dealing with DoS in SIP services.
Comput. Commun., 2015

Security and privacy in unified communications: Challenges and solutions.
Comput. Commun., 2015

Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Till All Are One: Towards a Unified Cloud IDS.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

On the Efficacy of Static Features to Detect Malicious Applications in Android.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?.
Proceedings of the SECRYPT 2015, 2015

Minimizing Databases Attack Surface Against SQL Injection Attacks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Obscuring users' identity in VoIP/IMS environments.
Comput. Secur., 2014

Towards an augmented authenticator in the Cloud.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

2013
Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments.
IEEE Commun. Surv. Tutorials, 2013

A lightweight countermeasure to cope with flooding attacks against session initiation protocol.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

A Practical Steganographic Approach for Matroska Based High Quality Video Files.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Adaptive defenses for commodity software through virtual application partitioning.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Towards a Forensic Analysis for Multimedia Communication Services.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Survey of network security systems to counter SIP-based denial-of-service attacks.
Comput. Secur., 2010

A Call Conference Room Interception Attack and Its Detection.
Proceedings of the Trust, 2010

2009
Utilizing bloom filters for detecting flooding attacks against SIP based services.
Comput. Secur., 2009

A Hierarchical Model for Cross-Domain Communication of Health Care Units.
Proceedings of the Third International Conference on Network and System Security, 2009

A First Order Logic Security Verification Model for SIP.
Proceedings of IEEE International Conference on Communications, 2009

2008
Πλαίσιο ανίχνευσης και αντιμετώπισης περιστατικών ασφαλείας σε συστήματα διαδικτυακής τηλεφωνίας
PhD thesis, 2008

An ontology-based policy for deploying secure SIP-based VoIP services.
Comput. Secur., 2008

Two layer Denial of Service prevention on SIP VoIP infrastructures.
Comput. Commun., 2008

A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony.
Proceedings of the Trust, 2008

A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks.
Proceedings of the 4th International ICST Mobile Multimedia Communications Conference, 2008

2007
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment.
Telecommun. Syst., 2007

An ontology description for SIP security flaws.
Comput. Commun., 2007

A framework for protecting a SIP-based infrastructure against malformed message attacks.
Comput. Networks, 2007

Detecting DNS Amplification Attacks.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Survey of security vulnerabilities in session initiation protocol.
IEEE Commun. Surv. Tutorials, 2006

Support of subscribers' certificates in a hybrid WLAN-3G environment.
Comput. Networks, 2006

PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies.
Proceedings of the Communications and Multimedia Security, 2006

2005
A framework for detecting malformed messages in SIP networks.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005


  Loading...