Christos Xenakis

Orcid: 0000-0001-6718-122X

According to our database1, Christos Xenakis authored at least 116 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
How many FIDO protocols are needed? Analysing the technology, security and compliance.
ACM Comput. Surv., August, 2024

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain.
Int. J. Inf. Sec., February, 2024

Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space Networks.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

NITRO: an Interconnected 5G-IoT Cyber Range.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Defense strategies for Adversarial Machine Learning: A survey.
Comput. Sci. Rev., August, 2023

HELPHED: Hybrid Ensemble Learning PHishing Email Detection.
J. Netw. Comput. Appl., 2023

RETINA: Distributed and Secure Trust Management for Smart Grid Applications and Energy Trading.
CoRR, 2023


Enhancing 3GPP CAPIF Authentication and Authorization Across Mobile Operators Using OpenID Connect and Single Sign-On.
Proceedings of the IEEE International Conference on Communications, 2023

Towards building a Self-Sovereign Identity Framework for Healthcare.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

A Bring Your Own Device security awareness survey among professionals.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023


Securing the Flow: Security and Privacy Tools for Flow-based Programming.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform.
Sensors, 2022

Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

A large-scale analysis of Wi-Fi passwords.
J. Inf. Secur. Appl., 2022

A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool.
J. Inf. Secur. Appl., 2022

[m]allotROPism: a metamorphic engine for malicious software variation development.
Int. J. Inf. Sec., 2022

EKnad: Exploit Kits' network activity detection.
Future Gener. Comput. Syst., 2022

A Digital Twin for the 5G Era: the SPIDER Cyber Range.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

Facilitating DoS Attack Detection using Unsupervised Anomaly Detection.
Proceedings of the SSDBM 2022: 34th International Conference on Scientific and Statistical Database Management, Copenhagen, Denmark, July 6, 2022

BRIDGE: BRIDGing the gap bEtween CTI production and consumption.
Proceedings of the 14th International Conference on Communications, 2022


Secret sharing a key in a distributed way, Lagrange vs Newton.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Improving Network, Data and Application Security for SMEs.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Trusted and Secure Self-Sovereign Identity framework.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

MITRE ATT&CK-driven Cyber Risk Assessment.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
SealedGRID: Secure and Interoperable Platform for Smart GRID Applications.
Sensors, 2021

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone.
Sensors, 2021

Automated Cyber and Privacy Risk Management Toolkit.
Sensors, 2021

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go.
Sensors, 2021

NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation.
J. Inf. Secur. Appl., 2021

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements.
Inf., 2021

How many FIDO protocols are needed? Surveying the design, security and market perspectives.
CoRR, 2021

On an innovative architecture for digital immunity passports and vaccination certificates.
CoRR, 2021

Contract-Less Mobile Data Access Beyond 5G: Fully-Decentralized, High-Throughput and Anonymous Asset Trading Over the Blockchain.
IEEE Access, 2021

A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations.
Proceedings of the Italian Conference on Cybersecurity, 2021

Unveiling the user requirements of a cyber range for 5G security testing and training.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

A web tool for analyzing FIDO2/WebAuthn Requests and Responses.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Solving the cold start problem in Trust Management in IoT.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Distributed Key Management in Microgrids.
IEEE Trans. Ind. Informatics, 2020

Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication.
IEEE Trans. Inf. Forensics Secur., 2020

Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems".
J. Inf. Secur. Appl., 2020

On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats.
IEEE Access, 2020

SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

FI-WARE authorization in a Smart Grid scenario.
Proceedings of the 2020 Global Internet of Things Summit, 2020

ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM).
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Calculation of the Hubble Universe Expansion Constant by Analyzing Observational Data: An Exploratory Teaching Proposal based on STEM Epistemology.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020

2019
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications.
Int. J. Inf. Sec., 2019

Transforming malicious code to ROP gadgets for antivirus evasion.
IET Inf. Secur., 2019

Evaluation of password hashing schemes in open source web platforms.
Comput. Secur., 2019

A survey of voice and communication protection solutions against wiretapping.
Comput. Electr. Eng., 2019

CUREX: seCUre and pRivate hEalth data eXchange.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

BARRETT BlockchAin Regulated REmote aTTestation.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

ObjectMap: detecting insecure object deserialization.
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications.
Proceedings of the Critical Information Infrastructures Security, 2019

2018
Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication.
CoRR, 2018

MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem.
Comput. Secur., 2018

A forensic investigation of Android mobile applications.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

2017
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks.
Comput. Networks, 2017

A Security Evaluation of FIDO's UAF Protocol in Mobile and Embedded Devices.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Towards trusted metering in the smart grid.
Proceedings of the 22nd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2017

2016
Evaluation of Cryptography Usage in Android Applications.
EAI Endorsed Trans. Security Safety, 2016

(U)SimMonitor: A mobile application for security evaluation of cellular networks.
Comput. Secur., 2016

Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Gaithashing: A two-factor authentication scheme based on gait features.
Comput. Secur., 2015

Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Attacking the baseband modem of mobile phones to breach the users' privacy and network security.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

Self-organised Key Management for the Smart Grid.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015

2014
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks.
Comput. Secur., 2014

Evaluating the privacy of Android mobile applications under forensic analysis.
Comput. Secur., 2014

A specification-based intrusion detection engine for infrastructure-less networks.
Comput. Commun., 2014

Bypassing XSS Auditor: Taking advantage of badly written PHP code.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

2013
SOMA-E: Self-organized mesh authentication - Extended.
Math. Comput. Model., 2013

A Better Time Approximation Scheme for e-Passports.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

2012
Questioning the Feasibility of UMTS-GSM Interworking Attacks.
Wirel. Pers. Commun., 2012

Securing the 802.11 MAC in MANETs: A specification-based intrusion detection engine.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks.
Proceedings of the Information Security and Privacy Research, 2012

Busfinder: A Personalized Multimodal Transportation Guide with Dynamic Routing.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

2011
Reducing False Synchronizations in 3G-WLAN Integrated Networks.
IEEE Trans. Wirel. Commun., 2011

A comparative evaluation of intrusion detection architectures for mobile ad hoc networks.
Comput. Secur., 2011

An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2010
A generic mechanism for efficient authentication in B3G networks.
Comput. Secur., 2010

A Novel Intrusion Detection System for MANETs.
Proceedings of the SECRYPT 2010, 2010

SOMA: Self-Organised Mesh Authentication.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

A Quantitative Risk Analysis Approach for Deliberate Threats.
Proceedings of the Critical Information Infrastructures Security, 2010

2009
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks.
Wirel. Pers. Commun., 2009

2008
Security Measures and Weaknesses of the GPRS Security Architecture.
Int. J. Netw. Secur., 2008

A network-assisted mobile VPN for securing users data in UMTS.
Comput. Commun., 2008

Towards a security framework for an established autonomous network.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

A Qualitative Risk Analysis for the GPRS Technology.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Security architectures for B3G mobile networks.
Telecommun. Syst., 2007

Reducing Authentication Traffic in 3G-WLAN Integrated Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Efficient Authentication for Users Autonomy in Next Generation All-IP Networks.
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007

2006
Alternative Schemes for Dynamic Secure VPN Deployment in UMTS.
Wirel. Pers. Commun., 2006

Malicious actions against the GPRS technology.
J. Comput. Virol., 2006

A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms.
Comput. Networks, 2006

Vulnerabilities and Possible Attacks Against the GPRS Backbone Network.
Proceedings of the Critical Information Infrastructures Security, 2006

2004
Αρχιτεκτονικές ασφάλειας εικονικών ιδιωτικών δικτύων σε κινητά 3ης γενιάς
PhD thesis, 2004

IPsec-based end-to-end VPN deployment over UMTS.
Comput. Commun., 2004

Security in third Generation Mobile Networks.
Comput. Commun., 2004

2002
On demand network-wide VPN deployment in GPRS.
IEEE Netw., 2002

Dynamic network-based secure VPN deployment in GPRS.
Proceedings of the 13th IEEE International Symposium on Personal, 2002

1998
Signaling and mobility control for wireless intelligent ATM CPNs.
Proceedings of the 9th IEEE International Symposium on Personal, 1998


  Loading...