Search Results - "Katos, Vasilios"
-
1
Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS
Published in IEEE access (2020)“…The current landscape of the core Internet technologies shows considerable centralisation with the big tech companies controlling the vast majority of traffic…”
Get full text
Journal Article -
2
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem
Published in Computers (Basel) (01-03-2020)“…Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital…”
Get full text
Journal Article -
3
Improving Forensic Triage Efficiency through Cyber Threat Intelligence
Published in Future internet (01-07-2019)“…The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the…”
Get full text
Journal Article -
4
Cryptographic Key Management in Delay Tolerant Networks: A Survey
Published in Future internet (27-06-2017)“…Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a…”
Get full text
Journal Article -
5
Encrypted and covert DNS queries for botnets: Challenges and countermeasures
Published in Computers & security (01-01-2020)“…•Security mechanisms against DGAs highly depend on the unencrypted nature of DNS queries.•We showcase that modern malware can efficiently and covertly perform…”
Get full text
Journal Article -
6
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods
Published in IEEE Communications surveys and tutorials (01-01-2018)“…Over the last five years there has been an increase in the frequency and diversity of network attacks. This holds true, as more and more organizations admit…”
Get full text
Journal Article -
7
Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application
Published in 2016 IEEE Global Communications Conference (GLOBECOM) (01-12-2016)“…Computing devices already permeate working and living environments, while researchers and engineers aim to exploit the potential of pervasive systems in order…”
Get full text
Conference Proceeding -
8
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
Published in International journal of information security (01-08-2024)“…The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber security…”
Get full text
Journal Article -
9
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments
Published in Ad hoc networks (01-12-2019)“…Current authentication protocols seek to establish authenticated sessions over insecure channels while maintaining a small footprint considering the energy…”
Get full text
Journal Article -
10
Unearthing malicious campaigns and actors from the blockchain DNS ecosystem
Published in Computer communications (01-11-2021)“…Blockchain DNS has emerged as an alternative solution to traditional DNS to address many of its inherent drawbacks. In this regard, a blockchain DNS approach…”
Get full text
Journal Article -
11
A framework for designing cloud forensic-enabled services (CFeS)
Published in Requirements engineering (01-09-2019)“…Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between…”
Get full text
Journal Article -
12
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks
Published in Future generation computer systems (01-03-2021)“…Dynamic malware analysis involves the debugging of the associated binary files and the monitoring of changes in sandboxed environments. This allows the…”
Get full text
Journal Article -
13
Exploring the protection of private browsing in desktop browsers
Published in Computers & security (01-06-2017)“…Desktop browsers have introduced private browsing mode, a security control which aims to protect users' data that are generated during a private browsing…”
Get full text
Journal Article -
14
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
Published in Information sciences (01-08-2007)“…This paper evaluates the statistical methodologies of cluster analysis, discriminant analysis, and Logit analysis used in the examination of intrusion…”
Get full text
Journal Article -
15
Automated key exchange protocol evaluation in delay tolerant networks
Published in Computers & security (01-06-2016)“…Cryptographic key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in deep space environments. The difficulties…”
Get full text
Journal Article -
16
Real time DDoS detection using fuzzy estimators
Published in Computers & security (01-09-2012)“…We propose a method for DDoS detection by constructing a fuzzy estimator on the mean packet inter arrival times. We divided the problem into two challenges,…”
Get full text
Journal Article -
17
An architecture for resilient intrusion detection in ad-hoc networks
Published in Journal of information security and applications (01-08-2020)“…We study efficient and lightweight Intrusion Detection Systems (IDS) for ad-hoc networks via the prism of IPv6-enabled Wireless Sensor Actuator Networks. These…”
Get full text
Journal Article -
18
Actionable threat intelligence for digital forensics readiness
Published in Information and computer security (12-06-2019)Get full text
Journal Article -
19
A partial equilibrium view on security and privacy
Published in Information management & computer security (21-03-2008)“…Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro)…”
Get full text
Journal Article -
20
Language-independent gender identification through keystroke analysis
Published in Information and computer security (01-01-2015)“…Purpose - The purpose of this paper is to investigate the feasibility of identifying the gender of an author by measuring the keystroke duration when typing a…”
Get full text
Journal Article