Christoforos Ntantogian

Orcid: 0000-0002-1575-4572

Affiliations:
  • Ionian University, Department of Informatics, Corfu, Greece
  • National and Kapodistrian University of Athens, Greece (PhD 2009)


According to our database1, Christoforos Ntantogian authored at least 53 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mastering data privacy: leveraging K-anonymity for robust health data sharing.
Int. J. Inf. Sec., June, 2024

Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams.
J. Netw. Syst. Manag., April, 2024

AI-Powered Penetration Testing using Shennina: From Simulation to Validation.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

NITRO: an Interconnected 5G-IoT Cyber Range.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2022
A large-scale analysis of Wi-Fi passwords.
J. Inf. Secur. Appl., 2022

[m]allotROPism: a metamorphic engine for malicious software variation development.
Int. J. Inf. Sec., 2022

EKnad: Exploit Kits' network activity detection.
Future Gener. Comput. Syst., 2022

A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities.
Proceedings of the 13th International Conference on Information, 2022

2021
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone.
Sensors, 2021

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go.
Sensors, 2021

NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation.
J. Inf. Secur. Appl., 2021

Editorial for Special Issue Detecting Attack and Incident Zone System.
Inf., 2021

PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises.
Inf., 2021

2020
Distributed Key Management in Microgrids.
IEEE Trans. Ind. Informatics, 2020

Sandboxing the Cyberspace for Cybersecurity Education and Learning.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications.
Int. J. Inf. Sec., 2019

Transforming malicious code to ROP gadgets for antivirus evasion.
IET Inf. Secur., 2019

Evaluation of password hashing schemes in open source web platforms.
Comput. Secur., 2019

A survey of voice and communication protection solutions against wiretapping.
Comput. Electr. Eng., 2019

CUREX: seCUre and pRivate hEalth data eXchange.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

BARRETT BlockchAin Regulated REmote aTTestation.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

ObjectMap: detecting insecure object deserialization.
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications.
Proceedings of the Critical Information Infrastructures Security, 2019

2018
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem.
Comput. Secur., 2018

A forensic investigation of Android mobile applications.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

2017
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks.
Comput. Networks, 2017

A Security Evaluation of FIDO's UAF Protocol in Mobile and Embedded Devices.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

2016
Evaluation of Cryptography Usage in Android Applications.
EAI Endorsed Trans. Security Safety, 2016

(U)SimMonitor: A mobile application for security evaluation of cellular networks.
Comput. Secur., 2016

Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Gaithashing: A two-factor authentication scheme based on gait features.
Comput. Secur., 2015

Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Attacking the baseband modem of mobile phones to breach the users' privacy and network security.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

2014
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks.
Comput. Secur., 2014

Evaluating the privacy of Android mobile applications under forensic analysis.
Comput. Secur., 2014

Bypassing XSS Auditor: Taking advantage of badly written PHP code.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

2013
A Better Time Approximation Scheme for e-Passports.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

2012
Questioning the Feasibility of UMTS-GSM Interworking Attacks.
Wirel. Pers. Commun., 2012

Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks.
Proceedings of the Information Security and Privacy Research, 2012

2011
Reducing False Synchronizations in 3G-WLAN Integrated Networks.
IEEE Trans. Wirel. Commun., 2011

A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2010
A generic mechanism for efficient authentication in B3G networks.
Comput. Secur., 2010

2009
Μελέτη και σχεδιασμός μηχανισμού δρομολόγησης για δίκτυα αισθητήρων
PhD thesis, 2009

One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks.
Wirel. Pers. Commun., 2009

2008
A network-assisted mobile VPN for securing users data in UMTS.
Comput. Commun., 2008

2007
Security architectures for B3G mobile networks.
Telecommun. Syst., 2007

Reducing Authentication Traffic in 3G-WLAN Integrated Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Efficient Authentication for Users Autonomy in Next Generation All-IP Networks.
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007


  Loading...