Emmanouil Magkos

According to our database1, Emmanouil Magkos authored at least 53 papers between 2000 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities.
Proceedings of the 13th International Conference on Information, 2022

A Data Scope Management Service to Support Privacy by Design and GDPR Compliance.
J. Data Intell., 2021

PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises.
Inf., 2021

Adapting CTF challenges into virtual cybersecurity learning environments.
Inf. Comput. Secur., 2021

A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

A Digital Twin-Based Cyber Range for SOC Analysts.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Automated and On-Demand Cybersecurity Certification.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020

An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools.
Proceedings of the Information Security Education. Information Security in Action, 2020

DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Sandboxing the Cyberspace for Cybersecurity Education and Learning.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Game-Based Information Security/Privacy Education and Awareness: Theory and Practice.
Proceedings of the Information Systems, 2020


The Privacy Paradox in the Context of Online Health Data Disclosure by Users.
Proceedings of the Information Systems, 2017

SCN-SI-021 achieving privacy and access control in pervasive computing environments.
Secur. Commun. Networks, 2016

Lightweight private proximity testing for geospatial social networks.
Comput. Commun., 2016

Critical Infrastructure Protection: A Holistic Methodology for Greece.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

Automated CAPTCHA Solving: An Empirical Comparison of Selected Techniques.
Proceedings of the 9th International Workshop on Semantic and Social Media Adaptation and Personalization, 2014

Towards Secure and Practical Location Privacy through Private Equality Testing.
Proceedings of the Privacy in Statistical Databases, 2014

Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Toward early warning against Internet worms based on critical-sized networks.
Secur. Commun. Networks, 2013

T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

A Model for Hybrid Evidence Investigation.
Int. J. Digit. Crime Forensics, 2012

Modeling security in cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2012

Secure and privacy-preserving, timed vehicular communications.
Int. J. Ad Hoc Ubiquitous Comput., 2012

A Model for Hybrid Evidence Investigation.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Fair Anonymous Authentication for Location Based Services.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Uncertainty for Privacy and 2-Dimensional Range Query Distortion.
J. Comput. Sci. Eng., 2011

Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey.
Int. J. Inf. Technol. Syst. Approach, 2011

A distributed privacy-preserving scheme for location-based queries.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Uncertainty for Anonymity and 2-Dimensional Range Query Distortion.
Proceedings of the Privacy in Statistical Databases, 2010

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

Treating scalability and modelling human countermeasures against local preference worms via gradient models.
J. Comput. Virol., 2009

Secure and practical key establishment for distributed sensor networks.
Secur. Commun. Networks, 2009

Accurate and large-scale privacy-preserving data mining using the election paradigm.
Data Knowl. Eng., 2009

A Novel Stochastic Approach for Modeling Random Scanning Worms.
Proceedings of the PCI 2009, 2009

Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2009

Multilayer key establishment for large-scale sensor networks.
Int. J. Secur. Networks, 2008

Secure log management for privacy assurance in electronic communications.
Comput. Secur., 2008

Strengthening Privacy Protection in VANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems.
Proceedings of the WEBIST 2008, 2008

Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections.
Proceedings of the Privacy in Statistical Databases, 2008

A spatial stochastic model for worm propagation: scale effects.
J. Comput. Virol., 2007

Towards secure online elections: models, primitives and open issues.
Electron. Gov. an Int. J., 2007

A Framework for Secure and Verifiable Logging in Public Communication Networks.
Proceedings of the Critical Information Infrastructures Security, 2006

Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Uncoercible e-Bidding Games.
Electron. Commer. Res., 2004

Towards Secure and Practical E-Elections in the New Era.
Proceedings of the Secure Electronic Voting, 2003

Strong Forward Security.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Software-Based Receipt-Freeness in On-Line Elections.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

Receipt-Freeness in Large-Scale Elections without Untappable Channels.
Proceedings of the Towards The E-Society: E-Commerce, 2001

An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions.
Proceedings of the Electronic Commerce and Web Technologies, 2001

An Equitably Fair On-line Auction Scheme.
Proceedings of the Electronic Commerce and Web Technologies, 2000