Nikolaos Pitropakis

According to our database1, Nikolaos Pitropakis authored at least 43 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.
Sensors, 2022

Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
Sensors, 2022

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.
Sensors, 2022

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud.
CoRR, 2022

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform.
Softw. Impacts, 2021

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.
Sensors, 2021

A Comparative Analysis of Honeypots on Different Cloud Platforms.
Sensors, 2021

Privacy and Trust Redefined in Federated Machine Learning.
Mach. Learn. Knowl. Extr., 2021

Towards Lightweight URL-Based Phishing Detection.
Future Internet, 2021

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.
CoRR, 2021

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.
CoRR, 2021

Browsers' Private Mode: Is It What We Were Promised?
Comput., 2021

Launching Adversarial Label Contamination Attacks Against Malicious URL Detection.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Towards An SDN Assisted IDS.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.
Sensors, 2020

Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter.
Mach. Learn. Knowl. Extr., 2020

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.
CoRR, 2020

Privacy-Preserving Passive DNS.
Comput., 2020

A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda.
Big Data Cogn. Comput., 2020

Microtargeting or Microphishing? Phishing Unveiled.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

A Distributed Trust Framework for Privacy-Preserving Machine Learning.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Privacy-preserving Surveillance Methods using Homomorphic Encryption.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Testing And Hardening IoT Devices Against the Mirai Botnet.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
A taxonomy and survey of attacks against machine learning.
Comput. Sci. Rev., 2019

Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device.
CoRR, 2019

Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018

An Enhanced Cyber Attack Attribution Framework.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
The Far Side of Mobile Application Integrated Development Environments.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

2015
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments.
Int. J. Inf. Sec., 2015

Till All Are One: Towards a Unified Cloud IDS.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

2014
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments.
J. Cloud Comput., 2014

Towards an augmented authenticator in the Cloud.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

2013
It's All in the Cloud: Reviewing Cloud Security.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Practical Steganographic Approach for Matroska Based High Quality Video Files.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013


  Loading...