Publications

  1. Grammatikakis, K. P., Ioannou, A., Shiaeles, S., & Kolokotronis, N. (2018, August). WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)* (pp. 730-735). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00127,arXiv:  https://arxiv.org/abs/1903.04793
  2. Bendiab, K., Kolokotronis, N., Shiaeles, S., & Boucherkha, S. (2018, August). WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. In *2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)*(pp. 724-729). IEEE. DOI: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00126, arXiv: https://arxiv.org/abs/1903.04767
  3. Ali., M., Shiaeles, S., Ghita, B., Papadaki, M., Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis, 2018 Global Information Infrastructure and Networking Symposium (GIIS), GIIS2018, IEEE DOI: https://doi.org/10.1109/GIIS.2018.8635598, arXiv: https://arxiv.org/abs/1904.02100
  4. Siracusano, M., Shiaeles, S., Ghita, B., Detection of LDDoS Attacks Based on TCP Connection Parameters, 2018 Global Information Infrastructure and Networking Symposium (GIIS), GIIS2018, IEEE DOI: https://doi.org/10.1109/GIIS.2018.8635701, arXiv: https://arxiv.org/abs/1904.01508
  5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.,Data Protection by Design for Cybersecurity Systems in a Smart Home Environment, In *2019 IEEE 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft)*, Paris,France, June 24-28,2019 IEEE.
    DOI: TBA. , arXiv: https://arxiv.org/abs/1903.10778
  6. Baptista, I., Shiaeles, S., Kolokotronis, N., A Novel Malware Detection System Based On Machine Learning and Binary Visualization, In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS)*, Shanghai,China, May 20-24,2019, IEEE, DOI: TBA, arXiv: https://arxiv.org/abs/1904.00859
  7. Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C., Blockchain Solutions for Forensic Evidence Preservation in IoT Environments, In * 2019 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), Paris, France, June 24-28,2019, IEEE, arXiv: https://arxiv.org/abs/1903.10770
  8. Vassilakis, C., Blockchain technologies for leveraging security and privacy, In * 2019 Homo Virtualis 2, no. 1, pp.7-Special issue “Blockchain and disruptive technologies: Interdisciplinary perspectives”, ISSN: 2585-3899, March 2019, Homo Virtualis, DOI: 10.12681/homvir.20188
  9.  Kolokotronis, N., Limniotis, K., Shiaeles, S., Griffiths, R., Secured by Blockchain: Safeguarding Internet of Things Devices, In *2019 IEEE Consumer Electronics Magazine, vol.8, N.3, pp.28-34, May, 2019,IEEE,
    DOI: https://doi.org/10.1109/MCE.2019.2892221 , arXiv: https://arxiv.org/abs/1903.04794
  10. Constantinides, C., Shiaeles, S., Ghita, B., & Kolokotronis, N., (2019), A Novel Online Incremental Learning Intrusion Prevention System, In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE. DOI: TBA., arXiv: TBA
  11. Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis.Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation”. In : Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, Cham, 2019. p. 65-76. DOI https://doi.org/10.1007/978-3-030-30859-9_6
  12. Aimilia Panagiotou, Bogdan Ghita, Stavros Shiaeles, Keltoum Bendiab.  FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall. In : Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, Cham, 2019. p. 125-134. DOI https://doi.org/10.1007/978-3-030-30859-9_11 arXiv preprint arXiv:1910.14417 (2019).
  13. Stavros Shiaeles ; Nicholas Kolokotronis ; Emanuele Bellini. “IoT vulnerability data crawling and analysis. In : 2019 IEEE World Congress on Services (SERVICES)”. IEEE, 2019. p. 78-83. DOI: 10.1109/SERVICES.2019.00028.
  14. Nicholas Kolokotronis ; Sotirios Brotsis ; Georgios Germanos ; Costas Vassilakis ; Stavros Shiaeles. On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection. In : 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. p. 21-28. DOI: 10.1109/SERVICES.2019.00019
  15. Paris Koloveas ; Thanasis Chantzios ; Christos Tryfonopoulos ; Spiros Skiadopoulos. “A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence”. In : 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. p. 3-8. DOI: 10.1109/SERVICES.2019.00016.
  16. Thanasis Chantzios, Paris Koloveas, Spiros Skiadopoulos, Nicholas Kolokotronis, Christos Tryfonopoulos, Vassiliki-Georgia Bilali, Dimitris Kavallieros.  The quest for the appropriate cyber-threat intelligence sharing platform.
  17. Muhammad Ali , Stavros Shiaeles, Nathan Clarke, Dimitrios Kontogeorgis. A proactive malicious software identification approach for digital forensic examiners. Journal of Information Security and Applications, 2019, vol. 47, p. 139-155. DOI: https://doi.org/10.1016/j.jisa.2019.04.013.
  18. Bellini, E., Bagnoli, F., Ganin, A. A., & Linkov, I. (2019, July). Cyber Resilience in IoT network: Methodology and example of assessment through epidemic spreading approach. In 2019 IEEE World Congress on Services (SERVICES) (Vol. 2642, pp. 72-77). IEEE. DOI: 10.1109/SERVICES.2019.00027.
  19. Sargsyan, G., Castellon, N., Binnendijk, R., & Cozijnsen, P. (2019, July). Blockchain Security by Design Framework for Trust and Adoption in IoT Environment. In 2019 IEEE World Congress on Services (SERVICES) (Vol. 2642, pp. 15-20). IEEE. DOI: 10.1109/SERVICES.2019.00018.
  20. Alsakran F., Bendiab G., Shiaeles S., Kolokotronis N. (2020) “Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study”. In: Thampi S., Martinez Perez G., Ko R., Rawat D. (eds) Security in 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21. Communications in Computer and Information Science, vol 1208. Springer, Singapore. DOI:  https://doi.org/10.1007/978-981-15-4825-3_7. https://arxiv.org/abs/2101.06519
  21. Monogios S., Limniotis K., Kolokotronis N., Shiaeles S. (2020), “A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps”. In: Katsikas S., Zorkadis V. (eds) E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age. e-Democracy 2019. Communications in Computer and Information Science, vol 1111. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-37545-4_3.
  22. Bendiab, Gueltoum and Grammatikakis, Konstantinos-Panagiotis and Koufos, Ioannis and Kolokotronis, Nicholas and Shiaeles, Stavros. (2020, August). Advanced metering infrastructures: security risks and mitigation. In Proceedings of the 15th International Conference on Availability, Reliability and Security (pp. 1-8). DOI: https://doi.org/10.1145/3407023.3409312
  23. Bendiab, Gueltoum and Shiaeles, Stavros and Alruban, Abdulrahman and Kolokotronis, Nicholas. (2020, June). IoT Malware Network Traffic Classification using Visual Representation and Deep Learning. In 2020 6th IEEE Conference on Network Softwarization (NetSoft) (pp. 444-449). IEEE. DOI: 10.1109/NetSoft48620.2020.9165337 arXiv : https://arxiv.org/abs/2010.01712
  24. Koutsouvelis, Vasileios and Shiaeles, Stavros and Ghita, Bogdan and Bendiab, Gueltoum. (2020, June). Detection of Insider Threats using Artificial Intelligence and Visualisation. In 2020 6th IEEE Conference on Network Softwarization (NetSoft) (pp. 437-443). IEEE. DOI: 10.1109/NetSoft48620.2020.9165337
  25. Braker C., Shiaeles S., Bendiab G., Savage N., Limniotis K. (2020) BotSpot: Deep Learning Classification of Bot Accounts Within Twitter. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2020, ruSMART 2020. Lecture Notes in Computer Science, vol 12525. Springer, Cham. https://doi.org/10.1007/978-3-030-65726-0_1.
  26. Shi Y., Bendiab G., Shiaeles S., Savage N. (2020) SoMIAP: Social Media Images Analysis and Prediction Framework. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2020, ruSMART 2020. Lecture Notes in Computer Science, vol 12525. Springer, Cham. https://doi.org/10.1007/978-3-030-65726-0_1.
  27. Brown R., Bendiab G., Shiaeles S., Ghita B. (2021): A Novel Multimodal Biometric Authentication System Using Machine Learning and Blockchain. In: Ghita B., Shiaeles S. (eds) Selected Papers from the 12th International Networking Conference. INC 2020. Lecture Notes in Networks and Systems, vol 180. Springer, Cham. https://doi.org/10.1007/978-3-030-64758-2._
  28. S. Brotsis, N. Kolokotronis, K. Limniotis, G. Bendiab and S. Shiaeles, “On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues,” 2020 IEEE World Congress on Services (SERVICES), Beijing, China, 2020, pp. 197-204, doi: 10.1109/SERVICES48979.2020.00049.
  29. L. Barlow, G. Bendiab, S. Shiaeles and N. Savage, “A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning,” 2020 IEEE World Congress on Services (SERVICES), Beijing, China, 2020, pp. 177-182, doi: 10.1109/SERVICES48979.2020.00046.

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

Legal Notice

Archives