Theodore Apostolopoulos
Theodore Apostolopoulos
Professor, Dept. of Informatics, Athens University of Economics & Business, Greece
Verifierad e-postadress på
Citeras av
Citeras av
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
N Virvilis, D Gritzalis, T Apostolopoulos
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
Information technology investment evaluation: investments in telecommunication infrastructure
TK Apostolopoulos, KC Pramataris
International Journal of Information Management 17 (4), 287-296, 1997
An open financial services architecture based on the use of intelligent mobile devices
A Kousaridas, G Parissis, T Apostolopoulos
Electronic Commerce Research and Applications 7 (2), 232-246, 2008
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
International Conference on Trust, Privacy and Security in Digital Business …, 2013
Queueing analysis of buffered CSMA/CD protocols
T Apostolopoulos, E Protonotarios
IEEE Transactions On Communications 34 (9), 898-905, 1986
The Compact Linear Collider (CLIC) - 2018 Summary Report
TK Charles, PJ Giansiracusa, TG Lucas, RP Rassool, M Volpi, C Balazs, ...
CERN Yellow Rep. Monogr., 1, 2018
A cyber attack evaluation methodology
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014
Parallel computation for streamflow prediction with distributed hydrologic models
TK Apostolopoulos, KP Georgakakos
Journal of Hydrology 197 (1-4), 1-24, 1997
Browser blacklists: the Utopia of phishing protection
N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis
International Conference on E-Business and Telecommunications, 278-293, 2014
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos
Computers & Security 74, 371-383, 2018
Queueing analysis of buffered slotted multiple access protocols
TK Apostolopoulos, EN Protonotarios
computer communications 8 (1), 9-21, 1985
Cyberoperations and international humanitarian law
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Information & Computer Security, 2016
An e-learning service management architecture
TK Apostolopoulos, A Kefala
Proceedings 3rd IEEE International Conference on Advanced Technologies, 140-144, 2003
Temporal network management model: Concepts and implementation issues
TK Apostolopoulos, VC Daskalou
Computer Communications 20 (8), 694-708, 1997
The inverse scattering problem for a rigid ellipsoid in linear elasticity
T Apostolopoulos, K Kiriaki, D Polyzos
Inverse problems 6 (1), 1, 1990
Analysis of a new retransmission control algorithm for slotted CSMA/CD LAN's
TK Apostolopoulos, ED Sykas, EN Protonotarios
IEEE Computer Architecture Letters 36 (06), 692-701, 1987
Cyber-Attacks Evaluation Using Simple Additive Weighting Method on the Basis of Schmitt's Analysis.
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, TK Apostolopoulos
MCIS, 41, 2016
DHTbd: A reliable block-based storage system for high performance clusters
G Parisis, G Xylomenos, T Apostolopoulos
2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2011
A demand-based approach to optimal resource allocation for network services with Quality of Service (QoS) requirements
AA Androutsos, TK Apostolopoulos
2006 IEEE First International Workshop on Bandwidth on Demand, 49-56, 2006
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
G Stergiopoulos, P Katsaros, D Gritzalis, TK Apostolopoulos
SECRYPT, 28-40, 2016
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20