Search Results - "Anagnostopoulos, Marios"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set by Anagnostopoulos, Marios, Spathoulas, Georgios, Viaño, Brais, Augusto-Gonzalez, Javier

    Published in Sensors (Basel, Switzerland) (18-11-2020)
    “…Smart-home installations exponential growth has raised major security concerns. To this direction, the GHOST project, a European Union Horizon 2020 Research…”
    Get full text
    Journal Article
  2. 2

    Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews by Casino, Fran, Dasaklis, Thomas K., Spathoulas, Georgios P., Anagnostopoulos, Marios, Ghosal, Amrita, Borocz, Istvan, Solanas, Agusti, Conti, Mauro, Patsakis, Constantinos

    Published in IEEE access (2022)
    “…Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing…”
    Get full text
    Journal Article
  3. 3

    New facets of mobile botnet: architecture and evaluation by Anagnostopoulos, Marios, Kambourakis, Georgios, Gritzalis, Stefanos

    “…It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays,…”
    Get full text
    Journal Article
  4. 4

    Redefining Malware Sandboxing: Enhancing Analysis Through Sysmon and ELK Integration by Mahmoud, Rasmi-Vlad, Anagnostopoulos, Marios, Pastrana, Sergio, Pedersen, Jens Myrup

    Published in IEEE access (2024)
    “…In cybersecurity, adversaries employ a myriad of tactics to evade detection and breach defenses. Malware remains a formidable weapon in their arsenal. To…”
    Get full text
    Journal Article
  5. 5

    Another Step in the Ladder of DNS-Based Covert Channels: Hiding Ill-Disposed Information in DNSKEY RRs by Anagnostopoulos, Marios, Seem, John André

    Published in Information (Basel) (01-09-2019)
    “…Covert channel communications are of vital importance for the ill-motivated purposes of cyber-crooks. Through these channels, they are capable of communicating…”
    Get full text
    Journal Article
  6. 6
  7. 7

    Efficient Certification Path Discovery for MANET by Kambourakis, Georgios, Konstantinou, Elisavet, Douma, Anastasia, Anagnostopoulos, Marios, Fotiadis, Georgios

    “…A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of…”
    Get full text
    Journal Article
  8. 8

    Efficient Certification Path Discovery for MANET by Kambourakis, Georgios, Konstantinou, Elisavet, Douma, Anastasia, Anagnostopoulos, Marios, Fotiadis, Georgios

    “…A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of…”
    Get full text
    Journal Article
  9. 9

    DNS amplification attack revisited by Anagnostopoulos, Marios, Kambourakis, Georgios, Kopanos, Panagiotis, Louloudakis, Georgios, Gritzalis, Stefanos

    Published in Computers & security (01-11-2013)
    “…It is without doubt that the Domain Name System (DNS) is one of the most decisive elements of the Internet infrastructure; even a slight disruption to the…”
    Get full text
    Journal Article
  10. 10

    Large-scale empirical evaluation of DNS and SSDP amplification attacks by Anagnostopoulos, Marios, Lagos, Stavros, Kambourakis, Georgios

    “…Reflection-based volumetric distributed denial-of-service (DDoS) attacks take advantage of the available to all (open) services to flood and possibly overpower…”
    Get full text
    Journal Article
  11. 11

    Never say never: Authoritative TLD nameserver-powered DNS amplification by Anagnostopoulos, Marios, Kambourakis, Georgios, Gritzalis, Stefanos, Yau, David K. Y.

    “…DNS amplification attack is a significant and persistent threat to the Internet. Authoritative name servers (ANSes) of popular domains, especially the…”
    Get full text
    Conference Proceeding
  12. 12

    Research trends, challenges, and emerging topics of digital forensics: A review of reviews by Casino, Fran, Dasaklis, Tom, Spathoulas, Georgios, Anagnostopoulos, Marios, Ghosal, Amrita, Borocz, Istvan, Solanas, Agusti, Conti, Mauro, Patsakis, Constantinos

    Published 10-08-2021
    “…Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing…”
    Get full text
    Journal Article
  13. 13

    Detecting Cyber Attacks through Measurements: Learnings from a Cyber Range by Mahmoud, Rasmi-Vlad, Anagnostopoulos, Marios, Pedersen, Jens Myrup

    “…Nowadays, it is hard to see an organization without a digital presence, while our modern society relies on a wide range of activities like banking, government…”
    Get full text
    Magazine Article