Grammatikakis, K. P., Ioannou, A., Shiaeles, S., & Kolokotronis, N. (2018, August). WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)* (pp. 730-735). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00127,arXiv: https://arxiv.org/abs/1903.04793
Bendiab, K., Kolokotronis, N., Shiaeles, S., & Boucherkha, S. (2018, August). WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)*(pp. 724-729). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00126, arXiv: https://arxiv.org/abs/1903.04767
Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.,Data Protection by Design for Cybersecurity Systems in a Smart Home Environment, In *2019 IEEE 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft)*, Paris,France, June 24-28,2019 IEEE.
DOI: TBA. , arXiv: https://arxiv.org/abs/1903.10778
Baptista, I., Shiaeles, S., Kolokotronis, N., A Novel Malware Detection System Based On Machine Learning and Binary Visualization, In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS)*, Shanghai,China, May 20-24,2019, IEEE, DOI: TBA, arXiv: https://arxiv.org/abs/1904.00859
Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C., Blockchain Solutions for Forensic Evidence Preservation in IoT Environments, In * 2019 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), Paris, France, June 24-28,2019, IEEE, arXiv: https://arxiv.org/abs/1903.10770
Vassilakis, C., Blockchain technologies for leveraging security and privacy, In * 2019 Homo Virtualis 2, no. 1, pp.7-Special issue “Blockchain and disruptive technologies: Interdisciplinary perspectives”, ISSN: 2585-3899, March 2019, Homo Virtualis, DOI: 10.12681/homvir.20188
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.
The information provided on this website has been prepared exclusively for the purpose of providing information about the Cyber-Trust project and related activities. The Cyber-Trust consortium has tried to ensure that all information provided in this website is correct at the time it was included. By accessing this website, you agree that the Cyber-Trust consortium will not be liable for any direct or indirect damage or any consequential loss arising from the use of the information contained in this website or from your access to any other information on the internet via hyperlinks. The copyright in the material contained in this website belongs to the Cyber-Trust consortium. The Cyber-Trust consortium disclaims any liability that may be claimed for infringement or alleged infringement of patents.