Miltiadis Kandias

According to our database1, Miltiadis Kandias authored at least 17 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter.
Mach. Learn. Knowl. Extr., 2020

2017
Profiling online social networks users: an omniopticon tool.
Int. J. Soc. Netw. Min., 2017

Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module.
Comput. Secur., 2017

2014
Business Process Modeling for Insider Threat Monitoring and Handling.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Insider Threat: Enhancing BPM through Social Media.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

2013
Metasploit the Penetration Tester's Guide.
Comput. Secur., 2013

Proactive insider threat detection through social media: the YouTube case.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Approaching Encryption through Complex Number Logarithms.
Proceedings of the SECRYPT 2013, 2013

Which Side Are You On? - A New Panopticon vs. Privacy.
Proceedings of the SECRYPT 2013, 2013

Insiders Trapped in the Mirror Reveal Themselves in Social Media.
Proceedings of the Network and System Security - 7th International Conference, 2013

Youtube User and Usage Profiling: Stories of Political Horror and Security Success.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

2012
Web Services Security Assessment: An Authentication-Focused Approach.
Proceedings of the Information Security and Privacy Research, 2012

2011
Exploitation of auctions for outsourcing security-critical projects.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Securing Transportation-Critical Infrastructures: Trends and Perspectives.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

The Insider Threat in Cloud Computing.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
An Insider Threat Prediction Model.
Proceedings of the Trust, 2010


  Loading...