Georgios Kambourakis
University of the Aegean
H-index: 45
Europe-Greece
Top articles of Georgios Kambourakis
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Keep your memory dump shut: Unveiling data leaks in password managers | arXiv preprint arXiv:2404.00423 | Efstratios Chatzoglou Vyron Kampourakis Zisis Tsiatsikas Georgios Karopoulos Georgios Kambourakis | 2024/3/30 |
Detecting Lateral Movement: A Systematic Survey | Heliyon | Christos Smiliotopoulos Georgios Kambourakis Constantinos Kolias | 2024/2 |
Assessing the Security and Privacy of Android Official ID Wallet Apps | Information | Vasileios Kouliaridis Georgios Karopoulos Georgios Kambourakis | 2023/8/13 |
Bypassing antivirus detection: old-school malware, new tricks | Efstratios Chatzoglou Georgios Karopoulos Georgios Kambourakis Zisis Tsiatsikas | 2023/8 | |
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs | International Journal of Information Security | Christos Smiliotopoulos Georgios Kambourakis Konstantia Barbatsalou | 2023/7 |
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond | IT Professional | José L Hernández-Ramos Paolo Bellavista Georgios Kambourakis Jason RC Nurse J Morris Chang | 2023/11/3 |
Bl0ck: Paralyzing 802.11 connections through block ack frames | Efstratios Chatzoglou Vyron Kampourakis Georgios Kambourakis | 2023/6/14 | |
TLEF: Two-Layer Evolutionary Framework for t-Closeness Anonymization | Mingshan You Yong-Feng Ge Kate Wang Hua Wang Jinli Cao | 2023/10/21 | |
Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study | Efstratios Chatzoglou Vasileios Kouliaridis Georgios Karopoulos Georgios Kambourakis | 2023/4 | |
Intrusion Detection based on Federated Learning: a systematic review | Jose L Hernandez-Ramos Georgios Karopoulos Efstratios Chatzoglou Vasileios Kouliaridis Enrique Marmol | 2023/8/18 | |
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset | Computers & Security | Efstratios Chatzoglou Vasileios Kouliaridis Georgios Kambourakis Georgios Karopoulos Stefanos Gritzalis | 2023/2/1 |
Best of both worlds: Detecting application layer attacks through 802.11 and non-802.11 features | Sensors | Efstratios Chatzoglou Georgios Kambourakis Christos Smiliotopoulos Constantinos Kolias | 2022/7/28 |
A closer look at machine learning effectiveness in Android malware detection | Information | Filippos Giannakas Vasileios Kouliaridis Georgios Kambourakis | 2022/12/21 |
Revisiting man-in-the-middle attacks against HTTPS | Network Security | Vyron Kampourakis Georgios Kambourakis Efstratios Chatzoglou Christos Zaroliagis | 2022/3 |
Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems | IEEE Access | Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias Christos Smiliotopoulos | 2022/6/16 |
Wpaxfuzz: sniffing out vulnerabilities in wi-fi implementations | Cryptography | Vyron Kampourakis Efstratios Chatzoglou Georgios Kambourakis Apostolos Dolmes Christos Zaroliagis | 2022/10/20 |
Your wap is at risk: a vulnerability analysis on wireless access point web-based management interfaces | Security and Communication Networks | Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias | 2022/2/12 |
Encrypted DNS: The good, the bad and the moot | Computer Fraud & Security | Georgios Kambourakis Georgios Karopoulos | 2022/5 |
The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP | Zisis Tsiatsikas Georgios Karopoulos Georgios Kambourakis | 2022/9/26 | |
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE | Journal of Information Security and Applications | Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias | 2022/2/1 |