Thanasis Petsas

According to our database1, Thanasis Petsas authored at least 10 papers between 2010 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Measurement, Modeling, and Analysis of the Mobile App Ecosystem.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2017

The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps.
Proceedings of the 26th International Conference on World Wide Web, 2017

2015
Two-factor authentication: is the world ready?: quantifying 2FA adoption.
Proceedings of the Eighth European Workshop on System Security, 2015

Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

MAD: A Middleware Framework for Multi-step Attack Detection.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
A Trusted Knowledge Management System for Multi-layer Threat Analysis.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Rage against the virtual machine: hindering dynamic analysis of Android malware.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
Rise of the planet of the apps: a systematic study of the mobile app ecosystem.
Proceedings of the 2013 Internet Measurement Conference, 2013

2010
Using social networks to harvest email addresses.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

A Systematic Characterization of IM Threats using Honeypots.
Proceedings of the Network and Distributed System Security Symposium, 2010


  Loading...