Nikolaos Tsalis

According to our database1, Nikolaos Tsalis authored at least 14 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Avoiding Network and Host Detection using Packet Bit-masking.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Using side channel TCP features for real-time detection of malware connections.
J. Comput. Secur., 2019

2018
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Exposing security and privacy liabilities in modern browsers
PhD thesis, 2017

Exploring the protection of private browsing in desktop browsers.
Comput. Secur., 2017

2015
Security Busters: Web browser security vs. rogue sites.
Comput. Secur., 2015

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015).
Comput. Secur., 2015

An Intensive Analysis of Security and Privacy Browser Add-Ons.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
Securing cloud and mobility: A practitioner's guide.
Comput. Secur., 2014

Mobile Devices - A Phisher's Paradise.
Proceedings of the SECRYPT 2014, 2014

Browser Blacklists: The Utopia of Phishing Protection.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2013
Evaluating the Manageability of Web Browsers Controls.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

In Cloud We Trust: Risk-Assessment-as-a-Service.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Return on Security Investment for Cloud Platforms.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013


  Loading...