Nikolaos Pitropakis
Nikolaos Pitropakis
Dirección de correo verificada de napier.ac.uk
Título
Citado por
Citado por
Año
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
692017
Cloud computing security: foundations and challenges
JR Vacca
CRC Press, 2016
232016
A taxonomy and survey of attacks against machine learning
N Pitropakis, E Panaousis, T Giannetsos, E Anastasiadis, G Loukas
Computer Science Review 34, 100199, 2019
162019
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments
N Pitropakis, A Pikrakis, C Lambrinoudakis
International Journal of Information Security 14 (4), 299-305, 2015
152015
Till all are one: Towards a unified cloud IDS
N Pitropakis, C Lambrinoudakis, D Geneiatakis
International Conference on Trust and Privacy in Digital Business, 136-149, 2015
132015
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments
N Pitropakis, D Anastasopoulou, A Pikrakis, C Lambrinoudakis
Journal of Cloud Computing 3 (1), 20, 2014
102014
A Practical Steganographic Approach for Matroska Based High Quality Video Files
N Pitropakis, C Lambrinoudakis, D Geneiatakis, D Gritzalis
2013 27th International Conference on Advanced Information Networking and …, 2013
102013
It's All in the Cloud: Reviewing Cloud Security
N Pitropakis, E Darra, N Vrakas, C Lambrinoudakis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
92013
An enhanced cyber attack attribution framework
N Pitropakis, E Panaousis, A Giannakoulias, G Kalpakis, RD Rodriguez, ...
International Conference on Trust and Privacy in Digital Business, 213-228, 2018
72018
Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier
AJ Hall, N Pitropakis, WJ Buchanan, N Moradpoor
2018 IEEE International Conference on Big Data (Big Data), 5034-5039, 2018
52018
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
N Pitropakis, C Lyvas, C Lambrinoudakis
London South Bank University, 2017
32017
Towards an augmented authenticator in the Cloud
N Pitropakis, N Yfantopoulos, D Geneiatakis, C Lambrinoudakis
2014 IEEE International Symposium on Signal Processing and Information …, 2014
32014
Detecting malicious insider threat in cloud computing environments
N Pitropakis
Πανεπιστήμιο Πειραιώς. Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών …, 2015
22015
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
O Christou, N Pitropakis, P Papadopoulos, S McKeown, WJ Buchanan
arXiv preprint arXiv:2005.06599, 2020
12020
Cloud Security, Privacy and Trust Baselines
N Pitropakis, S Katsikas, C Lambrinoudakis
Cloud Computing Security: Foundations and Challenges, 45, 2020
2020
Microtargeting or Microphishing? Phishing Unveiled
B Khursheed, N Pitropakis, S McKeown, C Lambrinoudakis
International Conference on Trust and Privacy in Digital Business, 89-105, 2020
2020
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing
WJ Buchanan, MA Imran, M Ur-Rehman, L Zhang, QH Abbasi, ...
arXiv preprint arXiv:2009.05126, 2020
2020
Privacy-Preserving Passive DNS
P Papadopoulos, N Pitropakis, WJ Buchanan, O Lo, S Katsikas
Computers 9 (3), 64, 2020
2020
Monitoring Users’ Behavior: Anti-Immigration Speech Detection on Twitter
N Pitropakis, K Kokot, D Gkatzia, R Ludwiniak, A Mylonas, M Kandias
Machine Learning and Knowledge Extraction 2 (3), 192-215, 2020
2020
Testing And Hardening IoT Devices Against the Mirai Botnet
C Kelly, N Pitropakis, S McKeown, C Lambrinoudakis
2020 International Conference on Cyber Security and Protection of Digital …, 2020
2020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20