Follow
Vasilis Katos
Title
Cited by
Cited by
Year
The Sphinx enigma in critical VoIP infrastructures: Human or botnet?
D Gritzalis, Y Soupionis, V Katos, I Psaroudakis, P Katsaros, A Mentis
IISA 2013, 1-6, 2013
2422013
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
A Nisioti, A Mylonas, PD Yoo, V Katos
IEEE Communications Surveys & Tutorials 20 (4), 3369-3388, 2018
2012018
A critical review of 7 years of Mobile Device Forensics
K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos
Digital Investigation 10 (4), 323-349, 2013
1392013
Real time DDoS detection using fuzzy estimators
SN Shiaeles, V Katos, AS Karakos, BK Papadopoulos
computers & security 31 (6), 782-790, 2012
1272012
Which IoT protocol? Comparing standardized approaches over a common M2M application
K Fysarakis, I Askoxylakis, O Soultatos, I Papaefstathiou, C Manifavas, ...
2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016
1042016
An architecture for blockchain over edge-enabled IoT for smart circular cities
A Damianou, CM Angelopoulos, V Katos
2019 15th International Conference on Distributed Computing in Sensor …, 2019
632019
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
V Katos
Information Sciences 177 (15), 3060-3073, 2007
582007
Encrypted and covert DNS queries for botnets: Challenges and countermeasures
C Patsakis, F Casino, V Katos
Computers & Security 88, 101614, 2020
572020
Interoperability challenges in the cybersecurity information sharing ecosystem
K Rantos, A Spyros, A Papanikolaou, A Kritsas, C Ilioudis, V Katos
Computers 9 (1), 18, 2020
532020
Towards a green blockchain: A review of consensus mechanisms and their energy consumption
AO Bada, A Damianou, CM Angelopoulos, V Katos
2021 17th international conference on distributed computing in sensor …, 2021
512021
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments
M Walshe, G Epiphaniou, H Al-Khateeb, M Hammoudeh, V Katos, ...
Ad Hoc Networks 95, 101988, 2019
502019
A cyber-crime investigation framework
V Katos, PM Bednar
Computer Standards & Interfaces 30 (4), 223-228, 2008
492008
Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19
J Deutrom, V Katos, R Ali
Behaviour & Information Technology 41 (14), 3161-3175, 2022
472022
DHP Framework: Digital Health Passports Using Blockchain--Use case on international tourism during the COVID-19 pandemic
CM Angelopoulos, A Damianou, V Katos
arXiv preprint arXiv:2005.08922, 2020
472020
A randomness test for block ciphers
V Katos
Applied mathematics and computation 162 (1), 29-35, 2005
462005
Blockchain-based electronic patient records for regulated circular healthcare jurisdictions
S Alexaki, G Alexandris, V Katos, NE Petroulakis
2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design …, 2018
452018
Blockchains as Enablers for Auditing Cooperative Circular Economy Networks
G Alexandris, V Katos, S Alexaki, G Hatzivasilis
2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design …, 2018
442018
Reengineering the user: privacy concerns about personal data on smartphones
M Tsavli, PS Efraimidis, V Katos, L Mitrou
Information & Computer Security 23 (4), 394-405, 2015
412015
Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes
K Ruan
IGI Global, 2012
352012
Exploring the protection of private browsing in desktop browsers
N Tsalis, A Mylonas, A Nisioti, D Gritzalis, V Katos
Computers & Security 67, 181-197, 2017
332017
The system can't perform the operation now. Try again later.
Articles 1–20