Vasiliki Liagkou

Orcid: 0000-0002-6313-3914

According to our database1, Vasiliki Liagkou authored at least 33 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks.
Sensors, March, 2024

2023
Cloud services cost comparison: a clustering analysis framework.
Computing, October, 2023

Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape.
J. Cybersecur. Priv., September, 2023

Exploiting Security Issues in Human Activity Recognition Systems (HARSs).
Inf., 2023

Exploring Trade-Offs in Partial Snapshot Implementations.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023

On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
A pricing model for Container-as-a-Service, based on hedonic indices.
Simul. Model. Pract. Theory, 2022

How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem.
Cryptogr., 2022

Security and Privacy Vulnerabilities in Human Activity Recognition systems.
Proceedings of the 7th South-East Europe Design Automation, 2022

From Research to Privacy-Preserving Industry Applications - Workshop Summary.
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022

On the Undecidability of the Panopticon Detection Problem.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
Privacy-Preserving Identity Management and Applications to Academic Degree Verification.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021

Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2019
Attack Detection for Healthcare Monitoring Systems Using Mechanical Learning in Virtual Private Networks over Optical Transport Layer Architecture.
Comput., 2019

Handling Privacy and Concurrency in an Online Educational Evaluation System.
Balt. J. Mod. Comput., 2019

VR Training for Security Awareness in Industrial IoT.
Proceedings of the Collaborative Networks and Digital Transformation, 2019

Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
A Trustworthy and Privacy Preserving Model for Online Competence Evaluation System.
Proceedings of the Contemporary Complex Systems and Their Dependability, 2018

Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

2015
Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
User Acceptance of Privacy-ABCs: An Exploratory Study.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
A trustworthy architecture for managing cultural content.
Math. Comput. Model., 2013

2012
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2009
Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
Ασφαλή και έμπιστα πρωτόκολλα επικοινωνιών με χρήση κρυπτογραφίας και κρυπτανάλυσης
PhD thesis, 2008

A Security Model for Internet-Based Digital Asset Management Systems.
Proceedings of the Software Architecture, Second European Conference, 2008

2007
Agent-based Distributed Group Key Establishment in Wireless Sensor Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Trust in global computing systems as a limit property emerging from short range random interactions.
Proceedings of the The Second International Conference on Availability, 2007

2006
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

The Threshold Behaviour of the Fixed Radius Random Graph Model and Applications to the Key Management Problem of Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2006

2005
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience.
Proceedings of the Information Security, 8th International Conference, 2005

2004
Electronic National Lotteries.
Proceedings of the Financial Cryptography, 2004


  Loading...