Grammatikakis, K. P., Ioannou, A., Shiaeles, S., & Kolokotronis, N. (2018, August). WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)* (pp. 730-735). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00127,arXiv: https://arxiv.org/abs/1903.04793
Bendiab, K., Kolokotronis, N., Shiaeles, S., & Boucherkha, S. (2018, August). WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)*(pp. 724-729). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00126, arXiv: https://arxiv.org/abs/1903.04767
Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.,Data Protection by Design for Cybersecurity Systems in a Smart Home Environment, In *2019 IEEE 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft)*, Paris,France, June 24-28,2019 IEEE.
DOI: TBA. , arXiv: https://arxiv.org/abs/1903.10778
Baptista, I., Shiaeles, S., Kolokotronis, N., A Novel Malware Detection System Based On Machine Learning and Binary Visualization, In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS)*, Shanghai,China, May 20-24,2019, IEEE, DOI: TBA, arXiv: https://arxiv.org/abs/1904.00859
Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C., Blockchain Solutions for Forensic Evidence Preservation in IoT Environments, In * 2019 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), Paris, France, June 24-28,2019, IEEE, arXiv: https://arxiv.org/abs/1903.10770
Vassilakis, C., Blockchain technologies for leveraging security and privacy, In * 2019 Homo Virtualis 2, no. 1, pp.7-Special issue “Blockchain and disruptive technologies: Interdisciplinary perspectives”, ISSN: 2585-3899, March 2019, Homo Virtualis, DOI: 10.12681/homvir.20188
Constantinides, C., Shiaeles, S., Ghita, B., & Kolokotronis, N., (2019), A Novel Online Incremental Learning Intrusion Prevention System, In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE. DOI: TBA., arXiv: TBA
Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis. “Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation”. In : Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, Cham, 2019. p. 65-76. DOIhttps://doi.org/10.1007/978-3-030-30859-9_6
Aimilia Panagiotou, Bogdan Ghita, Stavros Shiaeles, Keltoum Bendiab. FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall. In : Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, Cham, 2019. p. 125-134. DOI https://doi.org/10.1007/978-3-030-30859-9_11 arXiv preprint arXiv:1910.14417 (2019).
Stavros Shiaeles ; Nicholas Kolokotronis ; Emanuele Bellini. “IoT vulnerability data crawling and analysis. In : 2019 IEEE World Congress on Services (SERVICES)”. IEEE, 2019. p. 78-83. DOI: 10.1109/SERVICES.2019.00028.
Nicholas Kolokotronis ; Sotirios Brotsis ; Georgios Germanos ; Costas Vassilakis ; Stavros Shiaeles. On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection. In : 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. p. 21-28. DOI: 10.1109/SERVICES.2019.00019
Paris Koloveas ; Thanasis Chantzios ; Christos Tryfonopoulos ; Spiros Skiadopoulos. “A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence”. In : 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. p. 3-8. DOI: 10.1109/SERVICES.2019.00016.
Thanasis Chantzios, Paris Koloveas, Spiros Skiadopoulos, Nicholas Kolokotronis, Christos Tryfonopoulos, Vassiliki-Georgia Bilali, Dimitris Kavallieros. The quest for the appropriate cyber-threat intelligence sharing platform.
Muhammad Ali , Stavros Shiaeles, Nathan Clarke, Dimitrios Kontogeorgis. A proactive malicious software identification approach for digital forensic examiners.Journal of Information Security and Applications, 2019, vol. 47, p. 139-155. DOI: https://doi.org/10.1016/j.jisa.2019.04.013.
Bellini, E., Bagnoli, F., Ganin, A. A., & Linkov, I. (2019, July). Cyber Resilience in IoT network: Methodology and example of assessment through epidemic spreading approach. In 2019 IEEE World Congress on Services (SERVICES) (Vol. 2642, pp. 72-77). IEEE. DOI:10.1109/SERVICES.2019.00027.
Sargsyan, G., Castellon, N., Binnendijk, R., & Cozijnsen, P. (2019, July). Blockchain Security by Design Framework for Trust and Adoption in IoT Environment. In 2019 IEEE World Congress on Services (SERVICES) (Vol. 2642, pp. 15-20). IEEE. DOI:10.1109/SERVICES.2019.00018.
Alsakran F., Bendiab G., Shiaeles S., Kolokotronis N. (2020) “Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study”. In: Thampi S., Martinez Perez G., Ko R., Rawat D. (eds) Security in 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21. Communications in Computer and Information Science, vol 1208. Springer, Singapore. DOI: https://doi.org/10.1007/978-981-15-4825-3_7.
Monogios S., Limniotis K., Kolokotronis N., Shiaeles S. (2020), “A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps”. In: Katsikas S., Zorkadis V. (eds) E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age. e-Democracy 2019. Communications in Computer and Information Science, vol 1111. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-37545-4_3.
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.
The information provided on this website has been prepared exclusively for the purpose of providing information about the Cyber-Trust project and related activities. The Cyber-Trust consortium has tried to ensure that all information provided in this website is correct at the time it was included. By accessing this website, you agree that the Cyber-Trust consortium will not be liable for any direct or indirect damage or any consequential loss arising from the use of the information contained in this website or from your access to any other information on the internet via hyperlinks. The copyright in the material contained in this website belongs to the Cyber-Trust consortium. The Cyber-Trust consortium disclaims any liability that may be claimed for infringement or alleged infringement of patents.
The Cyber-Trust website uses first-party cookies that aggregate usage and visibility statistics (powered by MATOMO) so as to fulfil our project’s contractual obligations. You can find more information about the cookies used on this website in our Data Protection Policy.
Do you agree with the usage of cookies for the generation of anonymized statistics? If yes, please click ACCEPT. If not, please click REFUSE. You can tinker your cookie settings at any time, either by clicking on ‘Privacy and Cookies Policy’ at the right bottom of our website or by altering your browser settings and installing the relevant add-ons.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.