Vasilios Katos
Vasilios Katos
Dirección de correo verificada de bournemouth.ac.uk - Página principal
Título
Citado por
Citado por
Año
The Sphinx enigma in critical VoIP infrastructures: Human or botnet?
D Gritzalis, Y Soupionis, V Katos, I Psaroudakis, P Katsaros, A Mentis
IISA 2013, 1-6, 2013
2392013
A critical review of 7 years of Mobile Device Forensics
K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos
Digital Investigation 10 (4), 323-349, 2013
1102013
Real time DDoS detection using fuzzy estimators
SN Shiaeles, V Katos, AS Karakos, BK Papadopoulos
computers & security 31 (6), 782-790, 2012
942012
Which IoT protocol? Comparing standardized approaches over a common M2M application
K Fysarakis, I Askoxylakis, O Soultatos, I Papaefstathiou, C Manifavas, ...
2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016
692016
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
A Nisioti, A Mylonas, PD Yoo, V Katos
IEEE Communications Surveys & Tutorials 20 (4), 3369-3388, 2018
652018
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
V Katos
Information Sciences 177 (15), 3060-3073, 2007
512007
A cyber-crime investigation framework
V Katos, PM Bednar
Computer Standards & Interfaces 30 (4), 223-228, 2008
462008
A randomness test for block ciphers
V Katos
Applied mathematics and computation 162 (1), 29-35, 2005
412005
Reengineering the user: privacy concerns about personal data on smartphones
M Tsavli, PS Efraimidis, V Katos, L Mitrou
Information & Computer Security, 2015
252015
Modelling corporate wireless security and privacy
V Katos, C Adams
The Journal of Strategic Information Systems 14 (3), 307-321, 2005
252005
Differential malware forensics
A Provataki, V Katos
Digital Investigation 10 (4), 311-322, 2013
242013
Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes
K Ruan
IGI Global, 2012
242012
Information assurance and forensic readiness
G Pangalos, V Katos
International conference on e-democracy, 181-188, 2009
232009
Big data security analysis approach using computational intelligence techniques in R for desktop users
N Naik, P Jenkins, N Savage, V Katos
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
222016
A partial equilibrium view on security and privacy
V Katos, A Patel
Information Management & Computer Security, 2008
212008
Exploring the protection of private browsing in desktop browsers
N Tsalis, A Mylonas, A Nisioti, D Gritzalis, V Katos
Computers & Security 67, 181-197, 2017
182017
Age detection through keystroke dynamics from user authentication failures
I Tsimperidis, S Rostami, V Katos
International Journal of Digital Crime and Forensics (IJDCF) 9 (1), 1-16, 2017
182017
Requirements for a forensically ready cloud storage service
T Spyridopoulos, V Katos
International Journal of Digital Crime and Forensics (IJDCF) 3 (3), 19-36, 2011
182011
An integrated model for online transactions: illuminating the black box
V Katos
Information Management & Computer Security, 2012
172012
On-scene triage open source forensic tool chests: Are they effective?
S Shiaeles, A Chryssanthou, V Katos
Digital Investigation 10 (2), 99-115, 2013
162013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20