Georgios Kambourakis

According to our database1, Georgios Kambourakis authored at least 104 papers between 2002 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




Security, Privacy, and Trust on Internet of Things.
Wireless Communications and Mobile Computing, 2019

Hands-Free one-Time and continuous authentication using glass wearable devices.
J. Inf. Sec. Appl., 2019

A comprehensive cybersecurity learning platform for elementary education.
Information Security Journal: A Global Perspective, 2019

Screening Out Social Bots Interference: Are There Any Silver Bullets?
IEEE Communications Magazine, 2019

The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems.
IEEE Access, 2019

Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems.
IEEE Access, 2019

Security and Privacy in Wireless and Mobile Networks.
Future Internet, 2018

Dendron : Genetic trees driven rule induction for network intrusion detection systems.
Future Generation Comp. Syst., 2018

Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks.
IEEE Communications Surveys and Tutorials, 2018

Cybertrust in the IoT Age.
IEEE Computer, 2018

Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral Patterns.
Proceedings of the 2018 IEEE SmartWorld, 2018

Never say never: Authoritative TLD nameserver-powered DNS amplification.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

OnionSIP: Preserving Privacy in SIP with Onion Routing.
J. UCS, 2017

TermID: a distributed swarm intelligence-based approach for wireless intrusion detection.
Int. J. Inf. Sec., 2017

Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset.
Future Internet, 2017

Cryptographic Key Management in Delay Tolerant Networks: A Survey.
Future Internet, 2017

DDoS in the IoT: Mirai and Other Botnets.
IEEE Computer, 2017

Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Lightweight algorithm for protecting SDN controller against DDoS attacks.
Proceedings of the 10th IFIP Wireless and Mobile Networking Conference, 2017

The Mirai botnet and the IoT Zombie Armies.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Introducing touchstroke: keystroke-based authentication system for smartphones.
Security and Communication Networks, 2016

New facets of mobile botnet: architecture and evaluation.
Int. J. Inf. Sec., 2016

Security Education and Awareness for K-6 Going Mobile.
iJIM, 2016

Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Communications Surveys and Tutorials, 2016

SnoopyBot: An Android spyware to bridge the mixes in Tor.
Proceedings of the 24th International Conference on Software, 2016

Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade.
Proceedings of the Network and System Security - 10th International Conference, 2016

Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics and Informatics, 2015

Special issue on Security, Privacy and Trust in network-based Big Data.
Inf. Sci., 2015

Editorial: special issue on advances in security and privacy for future mobile communications.
Electronic Commerce Research, 2015

An efficient and easily deployable method for dealing with DoS in SIP services.
Computer Communications, 2015

Security and privacy in unified communications: Challenges and solutions.
Computer Communications, 2015

Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?.
Proceedings of the SECRYPT 2015, 2015

Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Networking and Applications, 2014

Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
MONET, 2014

Anonymity and closely related terms in the cyberspace: An analysis by example.
J. Inf. Sec. Appl., 2014

Secure mobility in future communication systems under standardization.
Computer Standards & Interfaces, 2014

Mobile Application Security.
IEEE Computer, 2014

A cloud-based architecture to crowdsource mobile app privacy leaks.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Android forensics: Correlation analysis.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014

Complete SIP Message Obfuscation: PrivaSIP over Tor.
Proceedings of the Ninth International Conference on Availability, 2014

A Client-Side Privacy Framework for Web Personalization.
Proceedings of the Semantic Hyper/Multimedia Adaptation - Schemes and Applications, 2013

User privacy and modern mobile services: are they on the same path?
Personal and Ubiquitous Computing, 2013

KAMU: providing advanced user privacy in Kerberos multi-domain scenarios.
Int. J. Inf. Sec., 2013

A critical review of 7 years of Mobile Device Forensics.
Digital Investigation, 2013

Attacks and Countermeasures on 802.16: Analysis and Assessment.
IEEE Communications Surveys and Tutorials, 2013

From keyloggers to touchloggers: Take the rough with the smooth.
Computers & Security, 2013

DNS amplification attack revisited.
Computers & Security, 2013

A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

SIPA: generic and secure accounting for SIP.
Security and Communication Networks, 2012

Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Security and Communication Networks, 2012

MILC: A secure and privacy-preserving mobile instant locator with chatting.
Information Systems Frontiers, 2012

Privacy preserving context transfer schemes for 4G networks.
Wireless Communications and Mobile Computing, 2011

PrivaSIP: Ad-hoc identity privacy in SIP.
Computer Standards & Interfaces, 2011

A Survey on Cluster-Based Group Key Agreement Protocols for WSNs.
IEEE Communications Surveys and Tutorials, 2011

PrivaKERB: A user privacy framework for Kerberos.
Computers & Security, 2011

Swarm intelligence in intrusion detection: A survey.
Computers & Security, 2011

DoS attacks exploiting signaling in UMTS and IMS.
Computer Communications, 2011

iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web.
Personal and Ubiquitous Computing, 2010

A framework for identity privacy in SIP.
J. Network and Computer Applications, 2010

Device Authentication In Wireless And Pervasive Environments.
Intelligent Automation & Soft Computing, 2010

Efficient Certification Path Discovery for MANET.
EURASIP J. Wireless Comm. and Networking, 2010

Privacy-enhanced fast re-authentication for EAP-based next generation network.
Computer Communications, 2010

Revisiting WiMAX MBS security.
Computers & Mathematics with Applications, 2010

Pandora: An SMS-oriented m-informational system for educational realms.
J. Network and Computer Applications, 2009

A generic accounting scheme for next generation networks.
Computer Networks, 2009

A Cluster-Based Framework for the Security of Medical Sensor Environments.
Proceedings of the Trust, 2009

Signaling-Oriented DoS Attacks in UMTS Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

A First Order Logic Security Verification Model for SIP.
Proceedings of IEEE International Conference on Communications, 2009

Enabling the provision of secure web based m-health services utilizing XML based security models.
Security and Communication Networks, 2008

An ontology-based policy for deploying secure SIP-based VoIP services.
Computers & Security, 2008

Two layer Denial of Service prevention on SIP VoIP infrastructures.
Computer Communications, 2008

A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony.
Proceedings of the Trust, 2008

Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles.
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008

A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization.
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008

A new Accounting Mechanism for Modern and Future AAA Services.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A pervasive wiki application based on VoiceXML.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008

Privacy Protection in Context Transfer Protocol.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

Caller identity privacy in SIP heterogeneous realms: A practical solution.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

PANOPTIS: A System for Intelligent Monitoring of the Hellenic Broadcast Sector.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

Clustering Oriented Architectures in Medical Sensor Environments.
Proceedings of the The Third International Conference on Availability, 2008

Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks.
IEEE Communications Surveys and Tutorials, 2007

A framework for protecting a SIP-based infrastructure against malformed message attacks.
Computer Networks, 2007

A PKI approach for deploying modern secure distributed e-learning and m-learning environments.
Computers & Education, 2007

On Device Authentication in Wireless Networks: Present Issues and Future Challenges.
Proceedings of the Trust, 2007

Towards effective Wireless Intrusion Detection in IEEE 802.11i.
Proceedings of the Third International Workshop on Security, 2007

On RSN-Oriented Wireless Intrusion Detection.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Two privacy enhanced context transfer schemes.
Proceedings of the Q2SWinet'07, 2007

Detecting DNS Amplification Attacks.
Proceedings of the Critical Information Infrastructures Security, 2007

Securing Medical Sensor Environments: The CodeBlue Framework Case.
Proceedings of the The Second International Conference on Availability, 2007

Survey of security vulnerabilities in session initiation protocol.
IEEE Communications Surveys and Tutorials, 2006

Support of subscribers' certificates in a hybrid WLAN-3G environment.
Computer Networks, 2006

A framework for detecting malformed messages in SIP networks.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005

Evaluation of digital certificates acquisition in large-scale 802.11-3GPP hybrid environments.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005

Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks.
Wireless Personal Communications, 2004

Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems.
EURASIP J. Wireless Comm. and Networking, 2004

Delivering Attribute Certificates over GPRS.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems.
Proceedings of the NETWORKING 2004, 2004

Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks.
Proceedings of the Public Key Infrastructure, 2004

Introducing PKI to Enhance Security in Future Mobile Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Using SSL/TLS in authentication and key agreement procedures of future mobile networks.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002