Vassilis Prevelakis

Orcid: 0000-0001-6176-1637

According to our database1, Vassilis Prevelakis authored at least 53 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
REACT: Autonomous Intrusion Response System for Intelligent Vehicles.
CoRR, 2024

2023
SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation.
IEEE Internet Things J., February, 2023

Creating a Security Enforcement Environment for a Vehicular Platform.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023

Enhancing Cyber Threat Hunting: A Visual Approach with the Forensic Visualization Toolkit.
Proceedings of the IEEE International Conference on Big Data, 2023

2021
MMU-based Access Control for Libraries.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
Temporal-based intrusion detection for IoV.
it Inf. Technol., 2020

SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study.
Inf., 2020

Software System Exploration Using Library Call Analysis.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

2019
Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System.
Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019

Intrusion Response System for Vehicles: Challenges and Vision.
Proceedings of the Smart Cities, Green Technologies and Intelligent Transport Systems, 2019

Efficient Monitoring of Library Call Invocation.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

2018
ProSEV: Proxy-Based Secure and Efficient Vehicular Communication.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Prediction of abnormal temporal behavior in real-time systems.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

A Secure and Efficient File System Access Control Mechanism (FlexFS).
Proceedings of the Information and Operational Technology Security Systems, 2018

Attack-tree-based Threat Modeling of Medical Implants.
Proceedings of the PROOFS 2018, 2018

2017
Privacy Risks from Public Data Sources.
CoRR, 2017

A framework for policy based secure intra vehicle communication.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Secure APIs for Applications in Microkernel-based Systems.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Secure Hardware-Software Architectures for Robust Computing Systems - SHARCS.
Proceedings of the European Project Space on Networks, 2017

LS-ARP: A lightweight and secure ARP.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

Chaining trusted links by deploying secured physical identities.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

Using Ciphers for Failure-Recovery in ITS Systems.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2015
A Policy-based Communications Architecture for Vehicles.
Proceedings of the ICISSP 2015, 2015

Secure Hardware-Software Architectures for Robust Computing Systems.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
On the Development of Automated Forensic Analysis Methods for Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Privacy Risks from Public Data Sources.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2010
A market-based bandwidth charging framework.
ACM Trans. Internet Techn., 2010

On the General Applicability of Instruction-Set Randomization.
IEEE Trans. Dependable Secur. Comput., 2010

2008
Decentralized access control in distributed file systems.
ACM Comput. Surv., 2008

2007
Supporting a Security Laboratory.
login Usenix Mag., 2007

Bridging the Network Reservation Gap Using Overlays.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
Letter to the Editor.
login Usenix Mag., 2006

How to buy a network: trading of resources in the physical layer.
IEEE Commun. Mag., 2006

Preserving TCP Connections Across Host Address Changes.
Proceedings of the Information Security, 9th International Conference, 2006

Base line performance measurements of access controls for libraries and modules.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

2005
The Virtual Firewall.
login Usenix Mag., 2005

The Ethernet Speaker System.
Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, 2005

The Bandwidth Exchange Architecture.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

2003
Drop-in security for distributed and portable computing elements.
Internet Res., 2003

WebDAVA: An Administrator-Free Approach To Web File-Sharing.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Secure and Flexible Global File Sharing.
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003

TAPI: Transactions for Accessing Public Infrastructure.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

Characterizing the 'Security Vulnerability Likelihood' of Software Functions.
Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003), 2003

Demonstration of COSAK static analysis tools.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Countering code-injection attacks with instruction-set randomization.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Fileteller: Paying and Getting Paid for File Storage.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Sandboxing Applications.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001

1999
Managing large WWW sites.
Internet Res., 1999

A Secure Station for Network Monitoring and Control.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

Controlling the Dissemination of Electronic Documents.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
The reconfigurable electronic textbook.
Proceedings of the Sixth European Conference on Information Systems, 1998

1993
Perspectives on Software Development Environments
Proceedings of the Advanced Information Systems Engineering, 1993


  Loading...