Följ
Nektarios Leontiadis
Nektarios Leontiadis
Meta
Verifierad e-postadress på meta.com - Startsida
Titel
Citeras av
Citeras av
År
Measuring and analyzing {Search-Redirection} attacks in the illicit online prescription drug trade
N Leontiadis, T Moore, N Christin
20th USENIX Security Symposium (USENIX Security 11), 2011
1422011
A nearly four-year longitudinal study of search-engine poisoning
N Leontiadis, T Moore, N Christin
Proceedings of the 21st ACM conference on Computer and Communications …, 2014
712014
Fashion crimes: trending-term exploitation on the web
T Moore, N Leontiadis, N Christin
Proceedings of the 18th ACM conference on Computer and communications …, 2011
692011
Pick your poison: pricing and inventories at unlicensed online pharmacies
N Leontiadis, T Moore, N Christin
Proceedings of the fourteenth ACM conference on Electronic commerce, 621-638, 2013
402013
Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform
N Kefalakis, N Leontiadis, J Soldatos, K Gama, D Donsez
Proceedings of the ACM/IFIP/USENIX Middleware'08 conference companion, 66-69, 2008
342008
Scripting the crime commission process in the illicit online prescription drug trade
N Leontiadis, A Hutchings
Journal of Cybersecurity 1 (1), 81-92, 2015
302015
Middleware building blocks for architecting rfid systems
N Kefalakis, N Leontiadis, J Soldatos, D Donsez
Mobile Lightweight Wireless Systems: First International ICST Conference …, 2009
302009
Measuring and mitigating oauth access token abuse by collusion networks
S Farooqi, F Zaffar, N Leontiadis, Z Shafiq
Proceedings of the 2017 Internet Measurement Conference, 355-368, 2017
282017
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser
LF DeKoven, S Savage, GM Voelker, N Leontiadis
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
242017
Empirically measuring WHOIS misuse
N Leontiadis, N Christin
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
132014
{SocialHEISTing}: Understanding Stolen Facebook Accounts
J Onaolapo, N Leontiadis, D Magka, G Stringhini
30th USENIX Security Symposium (USENIX Security 21), 4115-4132, 2021
102021
Structuring disincentives for online criminals
N Leontiadis
Carnegie Mellon University, 2014
82014
Following their footsteps: Characterizing account automation abuse and defenses
LF DeKoven, T Pottinger, S Savage, GM Voelker, N Leontiadis
Proceedings of the Internet Measurement Conference 2018, 43-55, 2018
72018
Bridging RFID systems and enterprise applications through virtualized connectors
N Leontiadis, N Kefalakis, J Soldatos
International Journal of Automated Identification Technology (IJAIT) 1 (2), 1-12, 2010
72010
{FirmSolo}: Enabling dynamic analysis of binary Linux-based {IoT} kernel modules
I Angelakopoulos, G Stringhini, M Egele
32nd USENIX Security Symposium (USENIX Security 23), 5021-5038, 2023
42023
A lookup service in an interconnected world of uniquely identified objects
E Polytarchos, N Leontiadis, S Eliakis, K Pramatari
2008 IEEE International Conference on Emerging Technologies and Factory …, 2008
42008
Stick It to The Man: Correcting for {Non-Cooperative} Behavior of Subjects in Experiments on Social Networks
K Clary, E Tosch, J Onaolapo, DD Jensen
31st USENIX Security Symposium (USENIX Security 22), 3771-3788, 2022
2022
FP7 Contract: ICT-215417-CP
J Soldatos, N Kefalakis, N Mitton, L Schmidt-INRIA, M David-AAU, ...
2009
Secure Network Management Using a Key Distribution Center
NN Leontiadis, VP Kemerlis, PA Frangoudis, GC Polyzos
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–19