Apostolis Zarras

Orcid: 0000-0002-8480-6989

Affiliations:
  • Maastricht University, Department of Data Science and Knowledge Engineering, The Netherlands
  • TU Munich, Department of Informatics, Germany
  • Ruhr-University Bochum, Department of Electrical Engineering and Information Technology, Germany
  • Ruhr-University Bochum, Horst Görtz Institute for IT-Security, Germany
  • Foundation for Research and Technology Hellas (FORTH), Institute of Computer Science


According to our database1, Apostolis Zarras authored at least 41 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RAMA: a risk assessment solution for healthcare organizations.
Int. J. Inf. Sec., June, 2024

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain.
Int. J. Inf. Sec., February, 2024

2023
Defense strategies for Adversarial Machine Learning: A survey.
Comput. Sci. Rev., August, 2023

White paper on cybersecurity in the healthcare sector. The HEIR solution.
CoRR, 2023

Vacant holes for unsupervised detection of the outliers in compact latent representation.
Proceedings of the Uncertainty in Artificial Intelligence, 2023

Free Willy: Prune System Calls to Enhance Software Security.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Digital Forgetting Using Key Decay.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Label-Efficient and Robust Learning from Multiple Experts.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Do Bayesian variational autoencoders know what they don't know?
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Upside Down: Exploring the Ecosystem of Dark Web Data Markets.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

2021
hybrid-Flacon: Hybrid Pattern Malware Detection and Categorization with Network Traffic andProgram Code.
CoRR, 2021

Detecting and categorizing Android malware with graph neural networks.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic.
Proceedings of the Information Security - 24th International Conference, 2021

HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Falcon: Malware Detection and Categorization with Network Traffic Images.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

The Strategy Configuration Problem and How to Solve It.
Proceedings of the EuroPLoP'21: European Conference on Pattern Languages of Programs 2021, Graz, Austria, July 7, 2021

2020
MANIS: evading malware detection system on graph structure.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
Can Today's Machine Learning Pass Image-Based Turing Tests?
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Smashing the Stack Protector for Fun and Profit.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Learning on a Budget for User Authentication on Mobile Devices.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Combating Control Flow Linearization.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Towards Automated Classification of Firmware Images and Identification of Embedded Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Empowering convolutional networks for malware classification and analysis.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
Towards detection and prevention of malicious activities against web applications and internet services.
PhD thesis, 2016

Leveraging Internet Services to Evade Censorship.
Proceedings of the Information Security - 19th International Conference, 2016

SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing.
Proceedings of the Information Security - 19th International Conference, 2016

Adaptive Semantics-Aware Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Deep Learning for Classification of Malware System Call Sequences.
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016

2015
Revealing the relationship network behind link spam.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

2014
Automated generation of models for fast and precise detection of HTTP-based malware.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements.
Proceedings of the 2014 Internet Measurement Conference, 2014

The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
k-subscription: privacy-preserving microblogging browsing through obfuscation.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
B@bel: Leveraging Email Delivery for Spam Mitigation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Understanding fraudulent activities in online ad exchanges.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011


  Loading...