A RAkEL-based methodology to estimate software vulnerability characteristics & score-an application to EU project ECHO G Aivatoglou, M Anastasiadis, G Spanos, A Voulgaridis, K Votis, ... Multimedia Tools and Applications 81 (7), 9459-9479, 2022 | 8 | 2022 |
A tree-based machine learning methodology to automatically classify software vulnerabilities G Aivatoglou, M Anastasiadis, G Spanos, A Voulgaridis, K Votis, ... 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 8 | 2021 |
Birthday type attacks to the Naccache–Stern knapsack cryptosystem M Anastasiadis, N Chatzis, KA Draziotis Information Processing Letters 138, 39-43, 2018 | 2 | 2018 |
A Novel High-Interaction Honeypot Network for Internet of Vehicles M Anastasiadis, K Moschou, K Livitckaia, K Votis, D Tzovaras 2023 31st Mediterranean Conference on Control and Automation (MED), 281-286, 2023 | 1 | 2023 |
Combining text analysis techniques with unsupervised machine learning methodologies for improved software vulnerability management M Anastasiadis, G Aivatoglou, G Spanos, A Voulgaridis, K Votis 2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022 | 1 | 2022 |
The (R)LWE problem on cryptography M Anastasiadis http://ikee.lib.auth.gr/record/300429?ln=el, 2018 | | 2018 |