Christos Xenakis
Orcid: 0000-0001-6718-122X
According to our database1,
Christos Xenakis
authored at least 116 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
How many FIDO protocols are needed? Analysing the technology, security and compliance.
ACM Comput. Surv., August, 2024
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain.
Int. J. Inf. Sec., February, 2024
Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space Networks.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Comput. Sci. Rev., August, 2023
J. Netw. Comput. Appl., 2023
RETINA: Distributed and Secure Trust Management for Smart Grid Applications and Energy Trading.
CoRR, 2023
OASEES: An Innovative Scope for a DAO-Based Programmable Swarm Solution, for Decentralizing AI Applications Close to Data Generation Locations.
Proceedings of the Artificial Intelligence Applications and Innovations. AIAI 2023 IFIP WG 12.5 International Workshops, 2023
Enhancing 3GPP CAPIF Authentication and Authorization Across Mobile Operators Using OpenID Connect and Single Sign-On.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Sensors, 2022
Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
J. Inf. Secur. Appl., 2022
Int. J. Inf. Sec., 2022
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022
Proceedings of the SSDBM 2022: 34th International Conference on Scientific and Statistical Database Management, Copenhagen, Denmark, July 6, 2022
Proceedings of the 14th International Conference on Communications, 2022
A Holistic Approach for IoT Networks' Identity and Trust Management - The ERATOSTHENES Project.
Proceedings of the Internet of Things, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Sensors, 2021
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone.
Sensors, 2021
P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go.
Sensors, 2021
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation.
J. Inf. Secur. Appl., 2021
How many FIDO protocols are needed? Surveying the design, security and market perspectives.
CoRR, 2021
On an innovative architecture for digital immunity passports and vaccination certificates.
CoRR, 2021
Contract-Less Mobile Data Access Beyond 5G: Fully-Decentralized, High-Throughput and Anonymous Asset Trading Over the Blockchain.
IEEE Access, 2021
A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations.
Proceedings of the Italian Conference on Cybersecurity, 2021
Unveiling the user requirements of a cyber range for 5G security testing and training.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication.
IEEE Trans. Inf. Forensics Secur., 2020
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems".
J. Inf. Secur. Appl., 2020
On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats.
IEEE Access, 2020
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the 2020 Global Internet of Things Summit, 2020
ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM).
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Calculation of the Hubble Universe Expansion Constant by Analyzing Observational Data: An Exploratory Teaching Proposal based on STEM Epistemology.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020
2019
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications.
Int. J. Inf. Sec., 2019
IET Inf. Secur., 2019
Comput. Secur., 2019
Comput. Electr. Eng., 2019
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the Critical Information Infrastructures Security, 2019
2018
Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication.
CoRR, 2018
Comput. Secur., 2018
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018
2017
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks.
Comput. Networks, 2017
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017
RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017
Proceedings of the 22nd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2017
2016
EAI Endorsed Trans. Security Safety, 2016
Comput. Secur., 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Comput. Secur., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Attacking the baseband modem of mobile phones to breach the users' privacy and network security.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015
2014
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks.
Comput. Secur., 2014
Comput. Secur., 2014
Comput. Commun., 2014
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014
2013
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013
2012
Wirel. Pers. Commun., 2012
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012
2011
IEEE Trans. Wirel. Commun., 2011
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks.
Comput. Secur., 2011
An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
2010
Comput. Secur., 2010
A Novel Intrusion Detection System for MANETs.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Proceedings of the Critical Information Infrastructures Security, 2010
2009
Wirel. Pers. Commun., 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007
2006
Wirel. Pers. Commun., 2006
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms.
Comput. Networks, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
2004
PhD thesis, 2004
2002
Proceedings of the 13th IEEE International Symposium on Personal, 2002
1998
Proceedings of the 9th IEEE International Symposium on Personal, 1998