Vasileios Vlachos

According to our database1, Vasileios Vlachos authored at least 29 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation.
J. Cybersecur. Priv., January, 2023

2022
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats.
Int. J. Inf. Sec., 2022

2021
LIDS - An easy to use and lightweight, infectious disease simaulator.
Proceedings of the 6th South-East Europe Design Automation, 2021

ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

Modelling Cyber-Risk in an Economic Perspective.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
The Insider Threat: Reasons, Effects and Mitigation Techniques.
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

2019
GRATIS: A GRaph Tool for Information Systems Scientists.
Proceedings of the 4th South-East Europe Design Automation, 2019

2017
Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Enabling Crowd-sourcing-based Privacy Risk Assessment in EU: the Privacy Flag Project.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

2016
Topology Experimentation in a Zigbee Wireless Sensor Network.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

Epidemic model for malware targeting telephony networks.
Proceedings of the 23rd International Conference on Telecommunications, 2016

2015
An LTE reconfigurable SOVA/log-MAP turbo decoder for uncorrelated Rayleigh fading.
Proceedings of the International Conference on Computer, 2015

2014
A global-local approach for estimating the Internet's threat level.
J. Commun. Networks, 2014

Measuring the Internet's threat level: A global-local approach.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
A framework for teaching network security in academic environments.
Inf. Manag. Comput. Secur., 2013

On intrusion detection in opportunistic networks.
Proceedings of the 17th Panhellenic Conference on Informatics, 2013

Legal and Social Aspects of Cyber Crime in Greece.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

FIMESS: filtering mobile external SMS spam.
Proceedings of the Balkan Conference in Informatics, 2013

2011
The Landscape of Cybercrime in Greece.
Inf. Manag. Comput. Secur., 2011

A Hacker's Perspective on Educating Future Security Experts.
Proceedings of the 15th Panhellenic Conference on Informatics, 2011

On the Evolution of Malware Species.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security Data.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Blueprints for a Large-Scale Early Warning System.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2009
Biological Aspects of Computer Virology.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
Power laws in software.
ACM Trans. Softw. Eng. Methodol., 2008

2007
A PRoactive malware identification system based on the computer hygiene principles.
Inf. Manag. Comput. Secur., 2007

2006
The MoR-Trust Distributed Trust Management System: Design and Simulation Results.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

2005
NGCE - Network Graphs for Computer Epidemiologists.
Proceedings of the Advances in Informatics, 2005

2004
Security applications of peer-to-peer networks.
Comput. Networks, 2004


  Loading...