Stilianos Vidalis

According to our database1, Stilianos Vidalis authored at least 16 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases.
Multim. Tools Appl., May, 2023

Technical Report relating to CVE-2022-46480, CVE-2023-26941, CVE-2023-26942, and CVE-2023-26943.
CoRR, 2023

A Trust-Based Approach for Data Sharing in the MQTT Environment.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

2022
An Incentive Mechanism for Managing Obligation Delegation.
Proceedings of the Risks and Security of Internet and Systems, 2022

2021
Towards the Resolution of Safety and Security Conflicts.
Proceedings of the 2021 International Carnahan Conference on Security Technology, 2021

2018
Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networks.
Multim. Tools Appl., 2018

2016
Information security and digital forensics in the world of cyber physical systems.
Proceedings of the Eleventh International Conference on Digital Information Management, 2016

2013
Deception and Maneuver Warfare Utilizing Cloud Resources.
Inf. Secur. J. A Glob. Perspect., 2013

2012
On the Road to Virtualized Environment.
Proceedings of the 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 2012

Forensically Classifying Files Using HSOM Algorithms.
Proceedings of the 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 2012

Collecting Evidence from Large-Scale Heterogeneous Virtual Computing Infrastructures Using Website Capture.
Proceedings of the 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 2012

2009
Cloud Computing: The impact on digital forensic investigations.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2007
Security Through Deception.
Inf. Secur. J. A Glob. Perspect., 2007

2006
Inter-organisational intrusion detection using knowledge grid technology.
Inf. Manag. Comput. Secur., 2006

2005
Analyzing Threat Agents and Their Attributes.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

2003
Measuring vulnerabilities and their exploitation cycle.
Inf. Secur. Tech. Rep., 2003


  Loading...