Seguir
Dimitris Geneiatakis
Dimitris Geneiatakis
European Commission Directorate General for Informatics
Dirección de correo verificada de ec.europa.eu
Título
Citado por
Citado por
Año
Survey of security vulnerabilities in session initiation protocol
D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ...
IEEE Communications Surveys & Tutorials 8 (3), 68-81, 2006
2642006
Security and privacy issues for an IoT based smart home
D Geneiatakis, I Kounelis, R Neisse, I Nai-Fovino, G Steri, G Baldini
2017 40th international convention on information and communication …, 2017
2012017
Detecting DNS amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
Critical Information Infrastructures Security: Second International Workshop …, 2008
1712008
Survey of network security systems to counter SIP-based denial-of-service attacks
S Ehlert, D Geneiatakis, T Magedanz
computers & security 29 (2), 225-243, 2010
1592010
A Permission verification approach for android mobile applications
D Geneiatakis, IN Fovino, I Kounelis, P Stirparo
Computers & Security 49, 192-205, 2015
952015
A framework for protecting a SIP-based infrastructure against malformed message attacks
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Computer Networks 51 (10), 2580-2593, 2007
952007
A fair solution to dns amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
Second International Workshop on Digital Forensics and Incident Analysis …, 2007
882007
Fostering consumers' energy market through smart contracts
I Kounelis, G Steri, R Giuliani, D Geneiatakis, R Neisse, I Nai-Fovino
2017 international conference in energy and sustainability in small …, 2017
872017
Utilizing bloom filters for detecting flooding attacks against SIP based services
D Geneiatakis, N Vrakas, C Lambrinoudakis
computers & security 28 (7), 578-591, 2009
872009
SIP Security Mechanisms: A state-of-the-art review
D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ...
Proceedings of the Fifth International Network Conference (INC 2005), 147-155, 2005
872005
An ontology description for SIP security flaws
D Geneiatakis, C Lambrinoudakis
Computer Communications 30 (6), 1367-1374, 2007
732007
Blockchain performance analysis for supporting cross-border E-government services
D Geneiatakis, Y Soupionis, G Steri, I Kounelis, R Neisse, I Nai-Fovino
IEEE Transactions on Engineering Management 67 (4), 1310-1322, 2020
722020
Two layer Denial of Service prevention on SIP VoIP infrastructures
S Ehlert, G Zhang, D Geneiatakis, G Kambourakis, T Dagiuklas, J Markl, ...
Computer Communications 31 (10), 2443-2456, 2008
642008
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
D Geneiatakis, C Lambrinoudakis
Telecommunication Systems 36, 153-159, 2007
632007
A framework for detecting malformed messages in SIP networks
D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ...
2005 14th IEEE Workshop on Local & Metropolitan Area Networks, 5 pp.-5, 2005
532005
SIP message tampering: The SQL code injection attack
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Proceedings of 13th International Conference on Software, Telecommunications …, 2005
512005
On machine learning effectiveness for malware detection in Android OS using static analysis data
V Syrris, D Geneiatakis
Journal of information security and applications 59, 102794, 2021
462021
Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation
JL Hernández-Ramos, G Karopoulos, D Geneiatakis, T Martin, ...
Wireless Communications and Mobile Computing 2021, 1-12, 2021
442021
Two anatomists are better than one—dual-level android malware detection
V Kouliaridis, G Kambourakis, D Geneiatakis, N Potha
Symmetry 12 (7), 1128, 2020
392020
A performance evaluation on distance measures in KNN for mobile malware detection
G Baldini, D Geneiatakis
2019 6th international conference on control, decision and information …, 2019
362019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20