Emmanouil Magkos

Orcid: 0000-0002-5922-4274

According to our database1, Emmanouil Magkos authored at least 58 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mastering data privacy: leveraging K-anonymity for robust health data sharing.
Int. J. Inf. Sec., June, 2024

Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams.
J. Netw. Syst. Manag., April, 2024

AI-Powered Penetration Testing using Shennina: From Simulation to Validation.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

NITRO: an Interconnected 5G-IoT Cyber Range.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2022
A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities.
Proceedings of the 13th International Conference on Information, 2022

2021
A Data Scope Management Service to Support Privacy by Design and GDPR Compliance.
J. Data Intell., 2021

PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises.
Inf., 2021

Adapting CTF challenges into virtual cybersecurity learning environments.
Inf. Comput. Secur., 2021

A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

A Digital Twin-Based Cyber Range for SOC Analysts.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Automated and On-Demand Cybersecurity Certification.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020

An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools.
Proceedings of the Information Security Education. Information Security in Action, 2020

DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Sandboxing the Cyberspace for Cybersecurity Education and Learning.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Game-Based Information Security/Privacy Education and Awareness: Theory and Practice.
Proceedings of the Information Systems, 2020

2019

2017
The Privacy Paradox in the Context of Online Health Data Disclosure by Users.
Proceedings of the Information Systems, 2017

2016
SCN-SI-021 achieving privacy and access control in pervasive computing environments.
Secur. Commun. Networks, 2016

Lightweight private proximity testing for geospatial social networks.
Comput. Commun., 2016

Critical Infrastructure Protection: A Holistic Methodology for Greece.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

2014
Automated CAPTCHA Solving: An Empirical Comparison of Selected Techniques.
Proceedings of the 9th International Workshop on Semantic and Social Media Adaptation and Personalization, 2014

Towards Secure and Practical Location Privacy through Private Equality Testing.
Proceedings of the Privacy in Statistical Databases, 2014

Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

2013
Toward early warning against Internet worms based on critical-sized networks.
Secur. Commun. Networks, 2013

T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2012
A Model for Hybrid Evidence Investigation.
Int. J. Digit. Crime Forensics, 2012

Modeling security in cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2012

Secure and privacy-preserving, timed vehicular communications.
Int. J. Ad Hoc Ubiquitous Comput., 2012

A Model for Hybrid Evidence Investigation.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Fair Anonymous Authentication for Location Based Services.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Uncertainty for Privacy and 2-Dimensional Range Query Distortion.
J. Comput. Sci. Eng., 2011

Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey.
Int. J. Inf. Technol. Syst. Approach, 2011

2010
A distributed privacy-preserving scheme for location-based queries.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Uncertainty for Anonymity and 2-Dimensional Range Query Distortion.
Proceedings of the Privacy in Statistical Databases, 2010

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

2009
Treating scalability and modelling human countermeasures against local preference worms via gradient models.
J. Comput. Virol., 2009

Secure and practical key establishment for distributed sensor networks.
Secur. Commun. Networks, 2009

Accurate and large-scale privacy-preserving data mining using the election paradigm.
Data Knowl. Eng., 2009

A Novel Stochastic Approach for Modeling Random Scanning Worms.
Proceedings of the PCI 2009, 2009

Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2009

2008
Multilayer key establishment for large-scale sensor networks.
Int. J. Secur. Networks, 2008

Secure log management for privacy assurance in electronic communications.
Comput. Secur., 2008

Strengthening Privacy Protection in VANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems.
Proceedings of the WEBIST 2008, 2008

Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections.
Proceedings of the Privacy in Statistical Databases, 2008

2007
A spatial stochastic model for worm propagation: scale effects.
J. Comput. Virol., 2007

Towards secure online elections: models, primitives and open issues.
Electron. Gov. an Int. J., 2007

2006
A Framework for Secure and Verifiable Logging in Public Communication Networks.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

2004
Uncoercible e-Bidding Games.
Electron. Commer. Res., 2004

2003
Towards Secure and Practical E-Elections in the New Era.
Proceedings of the Secure Electronic Voting, 2003

Ασφαλή ηλεκτρονικά συστήματα συναλλαγών στο διαδίκτυο
PhD thesis, 2003

2001
Strong Forward Security.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Software-Based Receipt-Freeness in On-Line Elections.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

Receipt-Freeness in Large-Scale Elections without Untappable Channels.
Proceedings of the Towards The E-Society: E-Commerce, 2001

An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions.
Proceedings of the Electronic Commerce and Web Technologies, 2001

2000
An Equitably Fair On-line Auction Scheme.
Proceedings of the Electronic Commerce and Web Technologies, 2000


  Loading...