Publications

  1. Grammatikakis, K. P., Ioannou, A., Shiaeles, S., & Kolokotronis, N. (2018, August). WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)* (pp. 730-735). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00127,arXiv:  https://arxiv.org/abs/1903.04793
  2. Bendiab, K., Kolokotronis, N., Shiaeles, S., & Boucherkha, S. (2018, August). WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)*(pp. 724-729). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00126, arXiv: https://arxiv.org/abs/1903.04767
  3. Ali., M., Shiaeles, S., Ghita, B., Papadaki, M., Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis, 2018 Global Information Infrastructure and Networking Symposium (GIIS), GIIS2018, IEEE DOI: https://doi.org/10.1109/GIIS.2018.8635598, arXiv: https://arxiv.org/abs/1904.02100
  4. Siracusano, M., Shiaeles, S., Ghita, B., Detection of LDDoS Attacks Based on TCP Connection Parameters, 2018 Global Information Infrastructure and Networking Symposium (GIIS), GIIS2018, IEEE DOI: https://doi.org/10.1109/GIIS.2018.8635701, arXiv: https://arxiv.org/abs/1904.01508
  5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.,Data Protection by Design for Cybersecurity Systems in a Smart Home Environment, In *2019 IEEE 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft)*, Paris,France, June 24-28,2019 IEEE.
    DOI: TBA. , arXiv: https://arxiv.org/abs/1903.10778
  6. Baptista, I., Shiaeles, S., Kolokotronis, N., A Novel Malware Detection System Based On Machine Learning and Binary Visualization, In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS)*, Shanghai,China, May 20-24,2019, IEEE, DOI: TBA, arXiv: https://arxiv.org/abs/1904.00859
  7. Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C., Blockchain Solutions for Forensic Evidence Preservation in IoT Environments, In * 2019 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), Paris, France, June 24-28,2019, IEEE, arXiv: https://arxiv.org/abs/1903.10770
  8. Vassilakis, C., Blockchain technologies for leveraging security and privacy, In * 2019 Homo Virtualis 2, no. 1, pp.7-Special issue “Blockchain and disruptive technologies: Interdisciplinary perspectives”, ISSN: 2585-3899, March 2019, Homo Virtualis, DOI: 10.12681/homvir.20188
  9.  Kolokotronis, N., Limniotis, K., Shiaeles, S., Griffiths, R., Secured by Blockchain: Safeguarding Internet of Things Devices, In *2019 IEEE Consumer Electronics Magazine, vol.8, N.3, pp.28-34, May, 2019,IEEE,
    DOI: https://doi.org/10.1109/MCE.2019.2892221 , arXiv: https://arxiv.org/abs/1903.04794
  10. Constantinides, C., Shiaeles, S., Ghita, B., & Kolokotronis, N., (2019), A Novel Online Incremental Learning Intrusion Prevention System, In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE. DOI: TBA., arXiv: TBA
  11. Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis.Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation”. In : Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, Cham, 2019. p. 65-76. DOI https://doi.org/10.1007/978-3-030-30859-9_6
  12. Aimilia Panagiotou, Bogdan Ghita, Stavros Shiaeles, Keltoum Bendiab.  FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall. In : Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, Cham, 2019. p. 125-134. DOI https://doi.org/10.1007/978-3-030-30859-9_11
  13. Stavros Shiaeles ; Nicholas Kolokotronis ; Emanuele Bellini. “IoT vulnerability data crawling and analysis. In : 2019 IEEE World Congress on Services (SERVICES)”. IEEE, 2019. p. 78-83. DOI: 10.1109/SERVICES.2019.00028.
  14. Nicholas Kolokotronis ; Sotirios Brotsis ; Georgios Germanos ; Costas Vassilakis ; Stavros Shiaeles. On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection. In : 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. p. 21-28. DOI: 10.1109/SERVICES.2019.00019
  15. Paris Koloveas ; Thanasis Chantzios ; Christos Tryfonopoulos ; Spiros Skiadopoulos. “A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence”. In : 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. p. 3-8. DOI: 10.1109/SERVICES.2019.00016.
  16. Thanasis Chantzios, Paris Koloveas, Spiros Skiadopoulos, Nicholas Kolokotronis, Christos Tryfonopoulos, Vassiliki-Georgia Bilali, Dimitris Kavallieros.  The quest for the appropriate cyber-threat intelligence sharing platform.
  17. Muhammad Ali , Stavros Shiaeles, Nathan Clarke, Dimitrios Kontogeorgis. A proactive malicious software identification approach for digital forensic examiners. Journal of Information Security and Applications, 2019, vol. 47, p. 139-155. DOI: https://doi.org/10.1016/j.jisa.2019.04.013.

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

The information provided on this website has been prepared exclusively for the purpose of providing information about the Cyber-Trust project and related activities. The Cyber-Trust consortium has tried to ensure that all information provided in this website is correct at the time it was included. By accessing this website, you agree that the Cyber-Trust consortium will not be liable for any direct or indirect damage or any consequential loss arising from the use of the information contained in this website or from your access to any other information on the internet via hyperlinks. The copyright in the material contained in this website belongs to the Cyber-Trust consortium. The Cyber-Trust consortium disclaims any liability that may be claimed for infringement or alleged infringement of patents. 

Archives