According to our database1, Emmanouil Magkos authored at least 53 papers between 2000 and 2022.
Legend:Book In proceedings Article PhD thesis Dataset Other
Proceedings of the 13th International Conference on Information, 2022
J. Data Intell., 2021
PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises.
Inf. Comput. Secur., 2021
A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020
An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools.
Proceedings of the Information Security Education. Information Security in Action, 2020
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Game-Based Information Security/Privacy Education and Awareness: Theory and Practice.
Proceedings of the Information Systems, 2020
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Proceedings of the Information Systems, 2017
Secur. Commun. Networks, 2016
Comput. Commun., 2016
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Proceedings of the 9th International Workshop on Semantic and Social Media Adaptation and Personalization, 2014
Proceedings of the Privacy in Statistical Databases, 2014
Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
Secur. Commun. Networks, 2013
T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
Int. J. Crit. Infrastructure Prot., 2012
Int. J. Ad Hoc Ubiquitous Comput., 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
J. Comput. Sci. Eng., 2011
Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey.
Int. J. Inf. Technol. Syst. Approach, 2011
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the Privacy in Statistical Databases, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Treating scalability and modelling human countermeasures against local preference worms via gradient models.
J. Comput. Virol., 2009
Secur. Commun. Networks, 2009
Data Knowl. Eng., 2009
Proceedings of the PCI 2009, 2009
Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2009
Int. J. Secur. Networks, 2008
Comput. Secur., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems.
Proceedings of the WEBIST 2008, 2008
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections.
Proceedings of the Privacy in Statistical Databases, 2008
J. Comput. Virol., 2007
Electron. Gov. an Int. J., 2007
Proceedings of the Critical Information Infrastructures Security, 2006
Proceedings of the 2005 International Conference on a World of Wireless, 2005
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
Proceedings of the Towards The E-Society: E-Commerce, 2001
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions.
Proceedings of the Electronic Commerce and Web Technologies, 2001
Proceedings of the Electronic Commerce and Web Technologies, 2000