Emmanouil Magkos
Orcid: 0000-0002-5922-4274
According to our database1,
Emmanouil Magkos
authored at least 58 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., June, 2024
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams.
J. Netw. Syst. Manag., April, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2022
Proceedings of the 13th International Conference on Information, 2022
2021
J. Data Intell., 2021
PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises.
Inf., 2021
Inf. Comput. Secur., 2021
A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020
An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools.
Proceedings of the Information Security Education. Information Security in Action, 2020
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Game-Based Information Security/Privacy Education and Awareness: Theory and Practice.
Proceedings of the Information Systems, 2020
2019
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
2017
Proceedings of the Information Systems, 2017
2016
Secur. Commun. Networks, 2016
Comput. Commun., 2016
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
2014
Proceedings of the 9th International Workshop on Semantic and Social Media Adaptation and Personalization, 2014
Proceedings of the Privacy in Statistical Databases, 2014
Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
2013
Secur. Commun. Networks, 2013
T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
2012
Int. J. Crit. Infrastructure Prot., 2012
Int. J. Ad Hoc Ubiquitous Comput., 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
2011
J. Comput. Sci. Eng., 2011
Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey.
Int. J. Inf. Technol. Syst. Approach, 2011
2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the Privacy in Statistical Databases, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
2009
Treating scalability and modelling human countermeasures against local preference worms via gradient models.
J. Comput. Virol., 2009
Secur. Commun. Networks, 2009
Data Knowl. Eng., 2009
Proceedings of the PCI 2009, 2009
Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2009
2008
Int. J. Secur. Networks, 2008
Comput. Secur., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems.
Proceedings of the WEBIST 2008, 2008
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections.
Proceedings of the Privacy in Statistical Databases, 2008
2007
J. Comput. Virol., 2007
Electron. Gov. an Int. J., 2007
2006
Proceedings of the Critical Information Infrastructures Security, 2006
2005
Proceedings of the 2005 International Conference on a World of Wireless, 2005
2004
2003
Proceedings of the Secure Electronic Voting, 2003
2001
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
Proceedings of the Towards The E-Society: E-Commerce, 2001
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions.
Proceedings of the Electronic Commerce and Web Technologies, 2001
2000
Proceedings of the Electronic Commerce and Web Technologies, 2000