Alexios Mylonas
Orcid: 0000-0001-8819-5831
According to our database1,
Alexios Mylonas
authored at least 52 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices.
Sensors, September, 2024
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks.
Comput. Secur., 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
2023
AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks.
Sensors, November, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
Technical Report relating to CVE-2022-46480, CVE-2023-26941, CVE-2023-26942, and CVE-2023-26943.
CoRR, 2023
2022
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks.
Sensors, 2022
Comput. Secur., 2022
2021
J. Cybersecur. Priv., April, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Proceedings of the Critical Information Infrastructures Security, 2021
2020
R<sup>2</sup>BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification.
IEEE Trans. Cybern., 2020
Mach. Learn. Knowl. Extr., 2020
Future Gener. Comput. Syst., 2020
2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the Design, User Experience, and Usability. Practice and Case Studies, 2019
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
2018
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods.
IEEE Commun. Surv. Tutorials, 2018
IEEE Access, 2018
2017
Comput. Secur., 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Inf. Comput. Secur., 2016
Proceedings of the HCI 2016, 2016
2015
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.
Inf. Secur. J. A Glob. Perspect., 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
2013
Comput. Secur., 2013
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013
2012
Comput. Secur., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Information Security and Privacy Research, 2012
2011
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Smartphone Security Evaluation - The Malware Attack Case .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
2010