Constantinos Patsakis
Orcid: 0000-0002-4460-9331Affiliations:
- University of Piraeus, Department of Informatics, Greece
According to our database1,
Constantinos Patsakis
authored at least 160 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on github.com
-
on cs.unipi.gr
On csauthors.net:
Bibliography
2025
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification.
Comput. Secur., 2025
2024
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle.
Int. J. Inf. Sec., August, 2024
Int. J. Inf. Sec., April, 2024
Comput. Secur., February, 2024
Intelligent Systems Reference Library 249, Springer, ISBN: 978-3-031-50882-0, 2024
npj Digit. Medicine, 2024
Expert Syst. Appl., 2024
Assessing the Impact of Packing on Machine Learning-Based Malware Detection and Classification Systems.
CoRR, 2024
Decoding developer password patterns: A comparative analysis of password extraction and selection practices.
Comput. Secur., 2024
The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign.
Comput. Secur., 2024
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition.
Int. J. Inf. Sec., October, 2023
Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents.
DTRAP, 2023
The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign.
CoRR, 2023
Man vs the machine: The Struggle for Effective Text Anonymisation in the Age of Large Language Models.
CoRR, 2023
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces.
Proceedings of the IEEE International Conference on Service-Oriented System Engineering, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
J. Inf. Secur. Appl., 2022
Promoting smart tourism personalised services via a combination of deep learning techniques.
Expert Syst. Appl., 2022
CoRR, 2022
Comput. Secur., 2022
Who watches the new watchmen? The challenges for drone digital forensics investigations.
Array, 2022
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews.
IEEE Access, 2022
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022
Proceedings of the 13th International Conference on Information, 2022
Proceedings of the APWG Symposium on Electronic Crime Research, 2022
26, Springer, ISBN: 978-3-030-85442-3, 2022
2021
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors.
J. Cybersecur. Priv., July, 2021
IEEE Trans. Emerg. Top. Comput., 2021
J. Netw. Comput. Appl., 2021
Exploiting statistical and structural features for the detection of Domain Generation Algorithms.
J. Inf. Secur. Appl., 2021
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation.
J. Inf. Secur. Appl., 2021
Introduction to the special issue on privacy and security for location-based services and devices.
J. Inf. Secur. Appl., 2021
Informatics, 2021
Future Gener. Comput. Syst., 2021
An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors.
CoRR, 2021
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics.
CoRR, 2021
Comput. Commun., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
An Efficient Blockchain-Based Privacy-Preserving Collaborative Filtering Architecture.
IEEE Trans. Engineering Management, 2020
Comput. Secur., 2020
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Social Informatics - 12th International Conference, 2020
Proceedings of the 5th South-East Europe Design Automation, 2020
Measuring the Quality of Street Surfaces in Smart Cities through Smartphone Crowdsensing.
Proceedings of the 11th International Conference on Information, 2020
A traceability and auditing framework for electronic equipment reverse logistics based on blockchain: the case of mobile phones.
Proceedings of the 11th International Conference on Information, 2020
Proceedings of the Artificial Intelligence Applications and Innovations. AIAI 2020 IFIP WG 12.5 International Workshops, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
A systematic literature review of blockchain-based applications: Current status, classification and open issues.
Telematics Informatics, 2019
External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security.
J. Hardw. Syst. Secur., 2019
J. Hardw. Syst. Secur., 2019
Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation.
Electron. Commer. Res. Appl., 2019
Comput. Law Secur. Rev., 2019
Proceedings of the 4th South-East Europe Design Automation, 2019
Proceedings of the Advances in Information and Computer Security, 2019
Smart Android Application using Self-Destructive Identities against Cyber Harassment.
Proceedings of the 10th International Conference on Information, 2019
Proceedings of the Thirteenth International Conference on Web and Social Media, 2019
User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Defining granularity levels for supply chain traceability based on IoT and blockchain.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019
Proceedings of the Business Process Management Workshops, 2019
2018
Secur. Commun. Networks, 2018
Digit. Investig., 2018
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions.
J. Cybersecur., 2018
Comput. Secur., 2018
Comput. Law Secur. Rev., 2018
Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice.
IEEE Access, 2018
Proceedings of the 9th International Conference on Information, 2018
Efficient Wireless Channel Characterization in Medicalised Vehicles for Smart Health.
Proceedings of the 9th International Conference on Information, 2018
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
Context-Aware Environments in Passenger Train Transportation Systems: Ideas, Feasibility and Risks.
Proceedings of the Applications in Electronics Pervading Industry, Environment and Society, 2018
2017
IEEE Softw., 2017
Mob. Networks Appl., 2017
CoRR, 2017
IEEE Access, 2017
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Mapping the Wireless Coverage Grid for Carrier and User Recommendations through Crowdsourcing.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
IT Prof., 2016
Comput. Commun., 2016
Proceedings of the Mobile, Secure, and Programmable Networking, 2016
Proceedings of the 7th International Conference on Information, 2016
2015
J. Comput. Syst. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures.
Comput. J., 2015
Wandering Analysis with Mobile Phones - On the Relation Between Randomness and Wandering.
Proceedings of the PECCS 2015, 2015
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015
Proceedings of the Mobile, Secure, and Programmable Networking, 2015
s-health as a driver towards better emergency response systems in urban environments.
Proceedings of the 2015 IEEE International Symposium on Medical Measurements and Applications, 2015
Proceedings of the IEEE First International Smart Cities Conference, 2015
Demand-Side Management: Optimising Through Differential Evolution Plug-in Electric Vehicles to Partially Fulfil Load Demand.
Proceedings of the Computational Intelligence - International Joint Conference, 2015
Design of an Autonomous Intelligent Demand-Side Management System by using Electric Vehicles as Mobile Energy Storage Units by Means of Evolutionary Algorithms.
Proceedings of the 7th International Joint Conference on Computational Intelligence (IJCCI 2015), 2015
Personalising and crowdsourcing stress management in urban environments via s-Health.
Proceedings of the 6th International Conference on Information, 2015
Proceedings of the Context-Aware Systems and Applications - 4th International Conference, 2015
Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption.
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching.
Proceedings of the 28th IEEE International Symposium on Computer-Based Medical Systems, 2015
2014
J. Inf. Hiding Multim. Signal Process., 2014
The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study.
J. Inf. Secur. Appl., 2014
Trans. Emerg. Telecommun. Technol., 2014
Lightweight Self-Bootstrapping Multiparty Computations of Time-Series Data with Custom Collusion Tolerance.
CoRR, 2014
Towards a distributed secure in-vehicle communication architecture for modern vehicles.
Comput. Secur., 2014
Distributing privacy policies over multimedia content across multiple online social networks.
Comput. Networks, 2014
IEEE Commun. Mag., 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 2014 IEEE International Symposium on Medical Measurements and Applications, 2014
Proceedings of the 5th International Conference on Information, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014
2013
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Privacy-aware event data recorders: cryptography meets the automotive industry again.
IEEE Commun. Mag., 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Metadata and Semantics Research - 7th Research Conference, 2013
Proceedings of the 2013 International Conference on MOBILe Wireless MiddleWARE, 2013
Proceedings of the 4th International Conference on Information, 2013
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
On Privacy Preserving Collaborative Filtering: Current Trends, Open Problems, and New Issues.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
A cryptographic approach for monitoring patients with mild cognitive impairment and dementia.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013
2012
J. Inf. Hiding Multim. Signal Process., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Eighth International Conference on Networks, 2009
2008
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
PhD thesis, 2008