Publications

  1. Grammatikakis, K. P., Ioannou, A., Shiaeles, S., & Kolokotronis, N. (2018, August). WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)* (pp. 730-735). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00127,arXiv:  https://arxiv.org/abs/1903.04793
  2. Bendiab, K., Kolokotronis, N., Shiaeles, S., & Boucherkha, S. (2018, August). WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)*(pp. 724-729). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00126, arXiv: https://arxiv.org/abs/1903.04767
  3. Ali., M., Shiaeles, S., Ghita, B., Papadaki, M., Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis, 2018 Global Information Infrastructure and Networking Symposium (GIIS), GIIS2018, IEEE DOI: https://doi.org/10.1109/GIIS.2018.8635598, arXiv: https://arxiv.org/abs/1904.02100
  4. Siracusano, M., Shiaeles, S., Ghita, B., Detection of LDDoS Attacks Based on TCP Connection Parameters, 2018 Global Information Infrastructure and Networking Symposium (GIIS), GIIS2018, IEEE DOI: https://doi.org/10.1109/GIIS.2018.8635701, arXiv: https://arxiv.org/abs/1904.01508
  5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.,Data Protection by Design for Cybersecurity Systems in a Smart Home Environment, In *2019 IEEE 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft)*, Paris,France, June 24-28,2019 IEEE.
    DOI: TBA. , arXiv: https://arxiv.org/abs/1903.10778
  6. Baptista, I., Shiaeles, S., Kolokotronis, N., A Novel Malware Detection System Based On Machine Learning and Binary Visualization, In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS)*, Shanghai,China, May 20-24,2019, IEEE, DOI: TBA, arXiv: https://arxiv.org/abs/1904.00859
  7. Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C., Blockchain Solutions for Forensic Evidence Preservation in IoT Environments, In * 2019 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), Paris, France, June 24-28,2019, IEEE, arXiv: https://arxiv.org/abs/1903.10770
  8. Vassilakis, C., Blockchain technologies for leveraging security and privacy, In * 2019 Homo Virtualis 2, no. 1, pp.7-Special issue “Blockchain and disruptive technologies: Interdisciplinary perspectives”, ISSN: 2585-3899, March 2019, Homo Virtualis, DOI: 10.12681/homvir.20188
  9.  Kolokotronis, N., Limniotis, K., Shiaeles, S., Griffiths, R., Secured by Blockchain: Safeguarding Internet of Things Devices, In *2019 IEEE Consumer Electronics Magazine, vol.8, N.3, pp.28-34, May, 2019,IEEE,
    DOI: https://doi.org/10.1109/MCE.2019.2892221 , arXiv: https://arxiv.org/abs/1903.04794
  10. Constantinides, C., Shiaeles, S., Ghita, B., & Kolokotronis, N., (2019), A Novel Online Incremental Learning Intrusion Prevention System, In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE. DOI: TBA., arXiv: TBA

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

The information provided on this website has been prepared exclusively for the purpose of providing information about the Cyber-Trust project and related activities. The Cyber-Trust consortium has tried to ensure that all information provided in this website is correct at the time it was included. By accessing this website, you agree that the Cyber-Trust consortium will not be liable for any direct or indirect damage or any consequential loss arising from the use of the information contained in this website or from your access to any other information on the internet via hyperlinks. The copyright in the material contained in this website belongs to the Cyber-Trust consortium. The Cyber-Trust consortium disclaims any liability that may be claimed for infringement or alleged infringement of patents. 

Archives