Nikolaos Pitropakis

Orcid: 0000-0002-3392-9970

According to our database1, Nikolaos Pitropakis authored at least 65 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.
Int. J. Inf. Sec., February, 2024

DID: RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity.
CoRR, 2024

RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations.
CoRR, 2024

2023
AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks.
Sensors, November, 2023

Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection.
Comput., September, 2023

Attacking Windows Hello for Business: Is It What We Were Promised?
Cryptogr., March, 2023

Explainable AI-Based DDOS Attack Identification Method for IoT Networks.
Comput., February, 2023

Using Social Media & Sentiment Analysis to Make Investment Decisions.
Future Internet, 2023

BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things.
Comput. Syst. Sci. Eng., 2023

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.
CoRR, 2023

Towards The Creation Of The Future Fish Farm.
CoRR, 2023

CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System.
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023

OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.
Sensors, 2022

Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
Sensors, 2022

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.
Sensors, 2022

DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.
J. King Saud Univ. Comput. Inf. Sci., 2022

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
Entropy, 2022

The Future of Integrated Digital Governance in the EU: EBSI and GLASS.
CoRR, 2022

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud.
CoRR, 2022

Investigating machine learning attacks on financial time series models.
Comput. Secur., 2022

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.
Complex., 2022

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.
J. Cybersecur. Priv., April, 2021

PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform.
Softw. Impacts, 2021

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.
Sensors, 2021

A Comparative Analysis of Honeypots on Different Cloud Platforms.
Sensors, 2021

Privacy and Trust Redefined in Federated Machine Learning.
Mach. Learn. Knowl. Extr., 2021

Towards Lightweight URL-Based Phishing Detection.
Future Internet, 2021

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.
CoRR, 2021

Browsers' Private Mode: Is It What We Were Promised?
Comput., 2021

Launching Adversarial Label Contamination Attacks Against Malicious URL Detection.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Towards An SDN Assisted IDS.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.
Sensors, 2020

Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter.
Mach. Learn. Knowl. Extr., 2020

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.
CoRR, 2020

Privacy-Preserving Passive DNS.
Comput., 2020

A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda.
Big Data Cogn. Comput., 2020

Microtargeting or Microphishing? Phishing Unveiled.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

A Distributed Trust Framework for Privacy-Preserving Machine Learning.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Privacy-preserving Surveillance Methods using Homomorphic Encryption.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Testing And Hardening IoT Devices Against the Mirai Botnet.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
A taxonomy and survey of attacks against machine learning.
Comput. Sci. Rev., 2019

Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device.
CoRR, 2019

Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018

An Enhanced Cyber Attack Attribution Framework.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
The Far Side of Mobile Application Integrated Development Environments.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

2015
Detecting malicious insider threat in cloud computing environments
PhD thesis, 2015

Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments.
Int. J. Inf. Sec., 2015

Till All Are One: Towards a Unified Cloud IDS.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

2014
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments.
J. Cloud Comput., 2014

Towards an augmented authenticator in the Cloud.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

2013
It's All in the Cloud: Reviewing Cloud Security.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Practical Steganographic Approach for Matroska Based High Quality Video Files.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013


  Loading...