Elias Athanasopoulos
Orcid: 0000-0002-8759-3261
According to our database1,
Elias Athanasopoulos
authored at least 76 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ERCIM News, 2024
Proceedings of the 17th European Workshop on Systems Security, 2024
2023
Proc. Priv. Enhancing Technol., July, 2023
Proc. Priv. Enhancing Technol., January, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
2022
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
2021
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2021
Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
SoK: Machine vs. machine - A systematic classification of automated machine learning-based CAPTCHA solvers.
Comput. Secur., 2020
APPS 2020: Second International Workshop on Adaptive and Personalized Privacy and Security.
Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization, 2020
Adaptive and Personalized Privacy and Security (APPS 2020): Workshop Chairs' Welcome.
Proceedings of the Adjunct Publication of the 28th ACM Conference on User Modeling, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Adaptive and Personalized Privacy and Security (APPS 2019): Workshop Chairs' Welcome and Organization.
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 11th European Workshop on Systems Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
ACM Trans. Internet Techn., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
2016
Soc. Netw. Anal. Min., 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Eighth European Workshop on System Security, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014
Proceedings of the 26th IEEE International Symposium on Computer Architecture and High Performance Computing, 2014
Proceedings of the Seventh European Workshop on System Security, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 8th Workshop on Implementation, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
PhD thesis, 2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011
2010
IEEE Netw., 2010
Proceedings of the USENIX Conference on Web Application Development, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Computer Security, 2010
2009
Proceedings of the Second European Workshop on System Security, 2009
2008
Proceedings of the 22nd Large Installation System Administration Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
2007
Proceedings of the Advances in Information and Computer Security, 2007
2006
Proceedings of the Communications and Multimedia Security, 2006
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006