Constantinos Patsakis

Orcid: 0000-0002-4460-9331

Affiliations:
  • University of Piraeus, Department of Informatics, Greece


According to our database1, Constantinos Patsakis authored at least 160 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification.
Comput. Secur., 2025

2024
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle.
Int. J. Inf. Sec., August, 2024

Cashing out crypto: state of practice in ransom payments.
Int. J. Inf. Sec., April, 2024

Hello me, meet the real me: Voice synthesis attacks on voice assistants.
Comput. Secur., February, 2024

Smart Tourism-The Impact of Artificial Intelligence and Blockchain
Intelligent Systems Reference Library 249, Springer, ISBN: 978-3-031-50882-0, 2024

Can we learn from an imagined ransomware attack on a hospital at home platform?
npj Digit. Medicine, 2024

Assessing LLMs in malicious code deobfuscation of real-world malware campaigns.
Expert Syst. Appl., 2024

Assessing the Impact of Packing on Machine Learning-Based Malware Detection and Classification Systems.
CoRR, 2024

The Malware as a Service ecosystem.
CoRR, 2024

Decoding developer password patterns: A comparative analysis of password extraction and selection practices.
Comput. Secur., 2024

The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign.
Comput. Secur., 2024

Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition.
Int. J. Inf. Sec., October, 2023

Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents.
DTRAP, 2023

The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign.
CoRR, 2023

Man vs the machine: The Struggle for Effective Text Anonymisation in the Age of Large Language Models.
CoRR, 2023

Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants.
CoRR, 2023

The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces.
Proceedings of the IEEE International Conference on Service-Oriented System Engineering, 2023

What's Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict.
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023

2022
On the Unbearable Lightness of FIPS 140-2 Randomness Tests.
IEEE Trans. Inf. Forensics Secur., 2022

On the effectiveness of binary emulation in malware classification.
J. Inf. Secur. Appl., 2022

Promoting smart tourism personalised services via a combination of deep learning techniques.
Expert Syst. Appl., 2022

SoK: cross-border criminal investigations and digital evidence.
J. Cybersecur., 2022

From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem.
CoRR, 2022

Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents.
Comput. Secur., 2022

Who watches the new watchmen? The challenges for drone digital forensics investigations.
Array, 2022

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews.
IEEE Access, 2022

Topic modeling approaches to counter online grooming.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022

Semi-Decentralized File Sharing as a Service.
Proceedings of the 13th International Conference on Information, 2022

The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

Privacy and Data Protection Challenges in the Distributed Era
26, Springer, ISBN: 978-3-030-85442-3, 2022

2021
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors.
J. Cybersecur. Priv., July, 2021

Blockchain Mutability: Challenges and Proposed Solutions.
IEEE Trans. Emerg. Top. Comput., 2021

Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains.
J. Netw. Comput. Appl., 2021

Exploiting statistical and structural features for the detection of Domain Generation Algorithms.
J. Inf. Secur. Appl., 2021

NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation.
J. Inf. Secur. Appl., 2021

Introduction to the special issue on privacy and security for location-based services and devices.
J. Inf. Secur. Appl., 2021

Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets.
Informatics, 2021

Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks.
Future Gener. Comput. Syst., 2021

Large-scale analysis of grooming in modern social networks.
Expert Syst. Appl., 2021

An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors.
CoRR, 2021

A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics.
CoRR, 2021

EtherClue: Digital investigation of attacks on Ethereum smart contracts.
CoRR, 2021

Unearthing malicious campaigns and actors from the blockchain DNS ecosystem.
Comput. Commun., 2021

Python and Malware: Developing Stealth and Evasive Malware without Obfuscation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
An Efficient Blockchain-Based Privacy-Preserving Collaborative Filtering Architecture.
IEEE Trans. Engineering Management, 2020

Delegated content erasure in IPFS.
Future Gener. Comput. Syst., 2020

Analysing the fall 2020 Emotet campaign.
CoRR, 2020

SoK: Blockchain Solutions for Forensics.
CoRR, 2020

Encrypted and covert DNS queries for botnets: Challenges and countermeasures.
Comput. Secur., 2020

A Survey on Privacy Properties for Data Publishing of Relational Data.
IEEE Access, 2020

Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS.
IEEE Access, 2020

Immutability and Decentralized Storage: An Analysis of Emerging Threats.
IEEE Access, 2020

Inside the X-Rated World of "Premium" Social Media Accounts.
Proceedings of the Social Informatics - 12th International Conference, 2020

Realising Honeypot-as-a-Service for Smart Home Solutions.
Proceedings of the 5th South-East Europe Design Automation, 2020

Measuring the Quality of Street Surfaces in Smart Cities through Smartphone Crowdsensing.
Proceedings of the 11th International Conference on Information, 2020

A traceability and auditing framework for electronic equipment reverse logistics based on blockchain: the case of mobile phones.
Proceedings of the 11th International Conference on Information, 2020

Protocol Deployment for Employing Honeypot-as-a-Service.
Proceedings of the Artificial Intelligence Applications and Innovations. AIAI 2020 IFIP WG 12.5 International Workshops, 2020

2019
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets.
IEEE Trans. Inf. Forensics Secur., 2019

A systematic literature review of blockchain-based applications: Current status, classification and open issues.
Telematics Informatics, 2019

External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security.
J. Hardw. Syst. Secur., 2019

Unravelling Security Issues of Runtime Permissions in Android.
J. Hardw. Syst. Secur., 2019

Hydras and IPFS: a decentralised playground for malware.
Int. J. Inf. Sec., 2019

Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation.
Electron. Commer. Res. Appl., 2019

Unravelling Ariadne's Thread: Exploring the Threats of Decentalised DNS.
CoRR, 2019

Profiling tax and financial behaviour with big data under the GDPR.
Comput. Law Secur. Rev., 2019

A Survey on Long-Range Attacks for Proof of Stake Protocols.
IEEE Access, 2019

Enhanced Vendor-managed Inventory through Blockchain.
Proceedings of the 4th South-East Europe Design Automation, 2019

GRYPHON: Drone Forensics in Dataflash and Telemetry Logs.
Proceedings of the Advances in Information and Computer Security, 2019

Smart Android Application using Self-Destructive Identities against Cyber Harassment.
Proceedings of the 10th International Conference on Information, 2019

Sharing Emotions at Scale: The Vent Dataset.
Proceedings of the Thirteenth International Conference on Web and Social Media, 2019

User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Defining granularity levels for supply chain traceability based on IoT and blockchain.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

A Framework for Supply Chain Traceability Based on Blockchain Tokens.
Proceedings of the Business Process Management Workshops, 2019

2018
Session Fingerprinting in Android via Web-to-App Intercommunication.
Secur. Commun. Networks, 2018

I know what you streamed last night: On the security and privacy of streaming.
Digit. Investig., 2018

Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions.
J. Cybersecur., 2018

The market's response toward privacy and mass surveillance: The Snowden aftermath.
Comput. Secur., 2018

Backups and the right to be forgotten in the GDPR: An uneasy relationship.
Comput. Law Secur. Rev., 2018

Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice.
IEEE Access, 2018

Blockchain Meets Smart Health: Towards Next Generation Healthcare Services.
Proceedings of the 9th International Conference on Information, 2018

Efficient Wireless Channel Characterization in Medicalised Vehicles for Smart Health.
Proceedings of the 9th International Conference on Information, 2018

Sensus Vox: Sentiment Mapping Through Smartphone Multi-Sensory Crowdsourcing.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Knock-Knock: The Unbearable Lightness of Android Notifications.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Android Hooking Revisited.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Context-Aware Environments in Passenger Train Transportation Systems: Ideas, Feasibility and Risks.
Proceedings of the Applications in Electronics Pervading Industry, Environment and Society, 2018

2017
Healthy Routes in the Smart City: A Context-Aware Mobile Recommender.
IEEE Softw., 2017

Context Dissemination for Dynamic Urban-Scale Applications.
Mob. Networks Appl., 2017

A survey on mobile affective computing.
Comput. Sci. Rev., 2017

Technical Report: Implementation and Validation of a Smart Health Application.
CoRR, 2017

Monkey Says, Monkey Does: Security and Privacy on Voice Assistants.
IEEE Access, 2017

Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Trapped by the UI: The Android Case.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Persistent vs Service IDs in Android: Session Fingerprinting from Apps.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Mapping the Wireless Coverage Grid for Carrier and User Recommendations through Crowdsourcing.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

There's Wally! Location Tracking in Android without Permissions.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Automobile 2.0: Reformulating the Automotive Platform as an IT System.
IT Prof., 2016

Lightweight private proximity testing for geospatial social networks.
Comput. Commun., 2016

AndroPatchApp: Taming Rogue Ads in Android.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

A practical k-anonymous recommender system.
Proceedings of the 7th International Conference on Information, 2016

2015
A k-anonymous approach to privacy preserving collaborative filtering.
J. Comput. Syst. Sci., 2015

Private Proximity Testing on Steroids: An NTRU-based Protocol.
IACR Cryptol. ePrint Arch., 2015

Interoperable Privacy-Aware E-Participation within Smart Cities.
Computer, 2015

Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures.
Comput. J., 2015

Wandering Analysis with Mobile Phones - On the Relation Between Randomness and Wandering.
Proceedings of the PECCS 2015, 2015

Urban Scale Context Dissemination in the Internet of Things: Challenge Accepted.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

Analysis of Privacy and Security Exposure in Mobile Dating Applications.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

s-health as a driver towards better emergency response systems in urban environments.
Proceedings of the 2015 IEEE International Symposium on Medical Measurements and Applications, 2015

Context-aware recommender for smart health.
Proceedings of the IEEE First International Smart Cities Conference, 2015

Demand-Side Management: Optimising Through Differential Evolution Plug-in Electric Vehicles to Partially Fulfil Load Demand.
Proceedings of the Computational Intelligence - International Joint Conference, 2015

Design of an Autonomous Intelligent Demand-Side Management System by using Electric Vehicles as Mobile Energy Storage Units by Means of Evolutionary Algorithms.
Proceedings of the 7th International Joint Conference on Computational Intelligence (IJCCI 2015), 2015

Personalising and crowdsourcing stress management in urban environments via s-Health.
Proceedings of the 6th International Conference on Information, 2015

Snapcab: Urban Scale Context-Aware Smart Transport Using Adaptive Context Tries.
Proceedings of the Context-Aware Systems and Applications - 4th International Conference, 2015

Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching.
Proceedings of the 28th IEEE International Symposium on Computer-Based Medical Systems, 2015

2014
LSB and DCT steganographic detection using compressive sensing.
J. Inf. Hiding Multim. Signal Process., 2014

The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study.
J. Inf. Secur. Appl., 2014

CityWatch: exploiting sensor data to manage cities better.
Trans. Emerg. Telecommun. Technol., 2014

Lightweight Self-Bootstrapping Multiparty Computations of Time-Series Data with Custom Collusion Tolerance.
CoRR, 2014

Towards a distributed secure in-vehicle communication architecture for modern vehicles.
Comput. Secur., 2014

Distributing privacy policies over multimedia content across multiple online social networks.
Comput. Networks, 2014

Smart health: A context-aware health paradigm within smart cities.
IEEE Commun. Mag., 2014

Playing Hide and Seek with Mobile Dating Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Personalized medical services using smart cities' infrastructures.
Proceedings of the 2014 IEEE International Symposium on Medical Measurements and Applications, 2014

Heuristic-Based Multi-Agent Monte Carlo Tree Search.
Proceedings of the 5th International Conference on Information, 2014

Private Aggregation with Custom Collusion Tolerance.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

The Role of Inference in the Anonymization of Medical Records.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Privacy-Aware Large-Scale Virological and Epidemiological Data Monitoring.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

2013
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments.
IACR Cryptol. ePrint Arch., 2013

Anonymous aggregation for lightweight multiparty computations.
IACR Cryptol. ePrint Arch., 2013

RSA private key reconstruction from random bits using SAT solvers.
IACR Cryptol. ePrint Arch., 2013

Privacy-aware event data recorders: cryptography meets the automotive industry again.
IEEE Commun. Mag., 2013

Recovering RSA Private Keys on Implementations with Tampered LSBs.
Proceedings of the SECRYPT 2013, 2013

Storing Metadata as QR Codes in Multimedia Streams.
Proceedings of the Metadata and Semantics Research - 7th Research Conference, 2013

Data Sensing and Dissemination Framework for Smart Cities.
Proceedings of the 2013 International Conference on MOBILe Wireless MiddleWARE, 2013

Privacy as a Product: A case study in the m-Health sector.
Proceedings of the 4th International Conference on Information, 2013

Trading Privacy in the Cloud: A Fairer Way to Share Private Information.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

On Privacy Preserving Collaborative Filtering: Current Trends, Open Problems, and New Issues.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Quantification of information systems security with stochastic calculus.
Proceedings of the Cyber Security and Information Intelligence, 2013

A cryptographic approach for monitoring patients with mild cognitive impairment and dementia.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
Number Theoretic SETUPs for RSA Like Factoring Based Algorithms.
J. Inf. Hiding Multim. Signal Process., 2012

Social Network Content Management through Watermarking.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer.
Proceedings of the SECRYPT 2012, 2012

Steganalysis of Statistical Restored Stegoimages with Compressive Sensing.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

2011
A DCT Steganographic Classifier Based on Compressive Sensing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Enhancing 2D GUIs with 3D input devices.
Intell. Decis. Technol., 2010

A New SETUP for Factoring Based Algorithms.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Enhancing 2D environments with 3D data input.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Creating RSA Trapdoors Using Lagrange Four Square Theorem.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Social Networks as an Attack Platform: Facebook Case Study.
Proceedings of the Eighth International Conference on Networks, 2009

2008
Histographic Steganographic System.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Κρυπτανάλυση αλγορίθμων και εφαρμογές της κρυπτογραφίας σε κακόβουλο λογισμικό
PhD thesis, 2008

Torrent worms.
Proceedings of the Knowledge-Based Software Engineering, 2008


  Loading...