Iosif Polenakis

Orcid: 0000-0002-6427-5519

According to our database1, Iosif Polenakis authored at least 25 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Detection and classification of malicious software utilizing Max-Flows between system-call groups.
J. Comput. Virol. Hacking Tech., March, 2023

A Code-Based Multiple Watermarking Scheme for the Preservation of Authenticity of Forensic Images.
Proceedings of the 14th International Conference on Information, 2023

Tamper Detection and Localization in Forensic Images.
Proceedings of the 24th International Conference on Computer Systems and Technologies, 2023

2022
Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs.
J. Comput. Virol. Hacking Tech., 2022

An integrated simulation framework for the prevention and mitigation of pandemics caused by airborne pathogens.
Netw. Model. Anal. Health Informatics Bioinform., 2022

A Multiple Watermarking Scheme for Digital Audio Signals.
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022

Digital Image Watermarking using Self Inverting Permutations - A Comparative Study.
Proceedings of the 13th International Conference on Information, 2022

A Repetitive Watermarking Scheme for Digital Images based on Self-Inverting Permutations.
Proceedings of the 13th International Conference on Information, 2022

A Synonym-based Approach for the Semantic Indexing of Texts.
Proceedings of the CompSysTech '22: International Conference on Computer Systems and Technologies 2022, University of Ruse, Ruse, Bulgaria, June 17, 2022

2021
A graph-based framework for malicious software detection and classification utilizing temporal-graphs.
J. Comput. Secur., 2021

A Stochastic Graph-based Model for the Simulation of SARS-CoV-2 Transmission.
CoRR, 2021

SARiSsa - A Mobile Application for the Proactive Control of SARS-CoV-2 Spread.
CoRR, 2021

Detection and Classification of Malicious Software based on Regional Matching of Temporal Graphs.
Proceedings of the CompSysTech '21: International Conference on Computer Systems and Technologies '21, 2021

2020
An Algorithmic Framework for Malicious Software Detection Exploring Structural Characteristics of Behavioral Graphs.
Proceedings of the International Conference on Computer Systems and Technologies 2020, 2020

2019
Algorithmic techniques for detection and classification of digital objects
PhD thesis, 2019

Malicious Software Detection utilizing Temporal-Graphs.
Proceedings of the 20th International Conference on Computer Systems and Technologies, 2019

2018
Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations.
CoRR, 2018

A Graph-based Model for Malicious Software Detection Exploiting Domination Relations between System-call Groups.
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018

2017
A graph-based model for malware detection and classification using system-call groups.
J. Comput. Virol. Hacking Tech., 2017

Preventing malware pandemics in mobile devices by establishing response-time bounds.
J. Inf. Secur. Appl., 2017

Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

2016
A Model for Establishing Response-time Bounds to Prevent Malware Pandemics in Mobile Devices.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

2015
Malicious software classification based on relations of system-call groups.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

A graph-based model for malicious code detection exploiting dependencies of system-call groups.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

2014
Detecting Malicious Code by Exploiting Dependencies of System-call Groups.
CoRR, 2014


  Loading...