Georgios Kambourakis

Orcid: 0000-0001-6348-5031

According to our database1, Georgios Kambourakis authored at least 154 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Assessing the detection of lateral movement through unsupervised learning techniques.
Comput. Secur., 2025

2024
Hierarchical adaptive evolution framework for privacy-preserving data publishing.
World Wide Web (WWW), July, 2024

The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.
Inf., May, 2024

Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis.
CoRR, 2024

Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

Federated Genetic Algorithm: Two-Layer Privacy-Preserving Trajectory Data Publishing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2024

2023
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs.
Int. J. Inf. Sec., December, 2023

Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study.
Int. J. Inf. Sec., April, 2023

A Closer Look at Machine Learning Effectiveness in Android Malware Detection.
Inf., January, 2023

IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond.
IT Prof., 2023

Assessing the Security and Privacy of Android Official ID Wallet Apps.
Inf., 2023

Intrusion Detection based on Federated Learning: a systematic review.
CoRR, 2023

A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset.
Comput. Secur., 2023

TLEF: Two-Layer Evolutionary Framework for t-Closeness Anonymization.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Bypassing antivirus detection: old-school malware, new tricks.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features.
Sensors, 2022

Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny.
Sensors, 2022

Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces.
Secur. Commun. Networks, 2022

Revisiting man-in-the-middle attacks against HTTPS.
Netw. Secur., 2022

How is your Wi-Fi connection today? DoS attacks on WPA3-SAE.
J. Inf. Secur. Appl., 2022

Large-scale empirical evaluation of DNS and SSDP amplification attacks.
J. Inf. Secur. Appl., 2022

WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations.
Cryptogr., 2022

Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems.
IEEE Access, 2022

Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation.
Wirel. Commun. Mob. Comput., 2021

A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection.
Inf., 2021

A Multi-Tier Security Analysis of Official Car Management Apps for Android.
Future Internet, 2021

Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures.
CoRR, 2021

An extrinsic random-based ensemble approach for android malware detection.
Connect. Sci., 2021

WiF0: All Your Passphrase Are Belong to Us.
Computer, 2021

Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents.
IEEE Access, 2021

A Survey on Digital Certificates Approaches for the COVID-19 Pandemic.
IEEE Access, 2021

Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset.
IEEE Access, 2021

At Your Service 24/7 or Not? Denial of Service on ESInet Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response Headers.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps.
Wirel. Commun. Mob. Comput., 2020

Two Anatomists Are Better than One - Dual-Level Android Malware Detection.
Symmetry, 2020

A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks.
Symmetry, 2020

A Survey on Mobile Malware Detection Techniques.
IEICE Trans. Inf. Syst., 2020

Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks.
Future Internet, 2020

Feature importance in mobile malware detection.
CoRR, 2020

Dissecting contact tracing apps in the Android platform.
CoRR, 2020

What Email Servers Can Tell to Johnny: An Empirical Study of Provider-to-Provider Email Security.
IEEE Access, 2020

Feature importance in Android malware detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Improving Android Malware Detection Through Dimensionality Reduction Techniques.
Proceedings of the Machine Learning for Networking - Third International Conference, 2020

2019
Security, Privacy, and Trust on Internet of Things.
Wirel. Commun. Mob. Comput., 2019

Hands-Free one-Time and continuous authentication using glass wearable devices.
J. Inf. Secur. Appl., 2019

A comprehensive cybersecurity learning platform for elementary education.
Inf. Secur. J. A Glob. Perspect., 2019

Editorial: special issue on advances in security and privacy for future mobile communications.
Electron. Commer. Res., 2019

Screening Out Social Bots Interference: Are There Any Silver Bullets?
IEEE Commun. Mag., 2019

The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems.
IEEE Access, 2019

Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems.
IEEE Access, 2019

2018
Security and Privacy in Wireless and Mobile Networks.
Future Internet, 2018

Dendron : Genetic trees driven rule induction for network intrusion detection systems.
Future Gener. Comput. Syst., 2018

Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks.
IEEE Commun. Surv. Tutorials, 2018

Cybertrust in the IoT Age.
Computer, 2018

Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral Patterns.
Proceedings of the 2018 IEEE SmartWorld, 2018

Never say never: Authoritative TLD nameserver-powered DNS amplification.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

2017
OnionSIP: Preserving Privacy in SIP with Onion Routing.
J. Univers. Comput. Sci., 2017

TermID: a distributed swarm intelligence-based approach for wireless intrusion detection.
Int. J. Inf. Sec., 2017

Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset.
Future Internet, 2017

Cryptographic Key Management in Delay Tolerant Networks: A Survey.
Future Internet, 2017

DDoS in the IoT: Mirai and Other Botnets.
Computer, 2017

Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Lightweight algorithm for protecting SDN controller against DDoS attacks.
Proceedings of the 10th IFIP Wireless and Mobile Networking Conference, 2017

The Mirai botnet and the IoT Zombie Armies.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Introducing touchstroke: keystroke-based authentication system for smartphones.
Secur. Commun. Networks, 2016

New facets of mobile botnet: architecture and evaluation.
Int. J. Inf. Sec., 2016

Security Education and Awareness for K-6 Going Mobile.
Int. J. Interact. Mob. Technol., 2016

Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Commun. Surv. Tutorials, 2016

SnoopyBot: An Android spyware to bridge the mixes in Tor.
Proceedings of the 24th International Conference on Software, 2016

Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics Informatics, 2015

Special issue on Security, Privacy and Trust in network-based Big Data.
Inf. Sci., 2015

An efficient and easily deployable method for dealing with DoS in SIP services.
Comput. Commun., 2015

Security and privacy in unified communications: Challenges and solutions.
Comput. Commun., 2015

Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?.
Proceedings of the SECRYPT 2015, 2015

2014
Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Netw. Appl., 2014

Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
Mob. Networks Appl., 2014

Anonymity and closely related terms in the cyberspace: An analysis by example.
J. Inf. Secur. Appl., 2014

Secure mobility in future communication systems under standardization.
Comput. Stand. Interfaces, 2014

Mobile Application Security.
Computer, 2014

A cloud-based architecture to crowdsource mobile app privacy leaks.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Android forensics: Correlation analysis.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014

Complete SIP Message Obfuscation: PrivaSIP over Tor.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Client-Side Privacy Framework for Web Personalization.
Proceedings of the Semantic Hyper/Multimedia Adaptation - Schemes and Applications, 2013

User privacy and modern mobile services: are they on the same path?
Pers. Ubiquitous Comput., 2013

KAMU: providing advanced user privacy in Kerberos multi-domain scenarios.
Int. J. Inf. Sec., 2013

A critical review of 7 years of Mobile Device Forensics.
Digit. Investig., 2013

Attacks and Countermeasures on 802.16: Analysis and Assessment.
IEEE Commun. Surv. Tutorials, 2013

From keyloggers to touchloggers: Take the rough with the smooth.
Comput. Secur., 2013

DNS amplification attack revisited.
Comput. Secur., 2013

A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
SIPA: generic and secure accounting for SIP.
Secur. Commun. Networks, 2012

Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012

MILC: A secure and privacy-preserving mobile instant locator with chatting.
Inf. Syst. Frontiers, 2012

2011
Privacy preserving context transfer schemes for 4G networks.
Wirel. Commun. Mob. Comput., 2011

PrivaSIP: Ad-hoc identity privacy in SIP.
Comput. Stand. Interfaces, 2011

A Survey on Cluster-Based Group Key Agreement Protocols for WSNs.
IEEE Commun. Surv. Tutorials, 2011

PrivaKERB: A user privacy framework for Kerberos.
Comput. Secur., 2011

Swarm intelligence in intrusion detection: A survey.
Comput. Secur., 2011

DoS attacks exploiting signaling in UMTS and IMS.
Comput. Commun., 2011

iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

2010
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web.
Pers. Ubiquitous Comput., 2010

A framework for identity privacy in SIP.
J. Netw. Comput. Appl., 2010

Device Authentication In Wireless And Pervasive Environments.
Intell. Autom. Soft Comput., 2010

Efficient Certification Path Discovery for MANET.
EURASIP J. Wirel. Commun. Netw., 2010

Privacy-enhanced fast re-authentication for EAP-based next generation network.
Comput. Commun., 2010

Revisiting WiMAX MBS security.
Comput. Math. Appl., 2010

2009
Pandora: An SMS-oriented m-informational system for educational realms.
J. Netw. Comput. Appl., 2009

A generic accounting scheme for next generation networks.
Comput. Networks, 2009

A Cluster-Based Framework for the Security of Medical Sensor Environments.
Proceedings of the Trust, 2009

Signaling-Oriented DoS Attacks in UMTS Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

A secure and efficient authentication protocol for passive RFID tags.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009

A First Order Logic Security Verification Model for SIP.
Proceedings of IEEE International Conference on Communications, 2009

2008
Enabling the provision of secure web based m-health services utilizing XML based security models.
Secur. Commun. Networks, 2008

An ontology-based policy for deploying secure SIP-based VoIP services.
Comput. Secur., 2008

Two layer Denial of Service prevention on SIP VoIP infrastructures.
Comput. Commun., 2008

A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony.
Proceedings of the Trust, 2008

Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles.
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008

A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization.
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008

A new Accounting Mechanism for Modern and Future AAA Services.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A pervasive wiki application based on VoiceXML.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008

Privacy Protection in Context Transfer Protocol.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

Binary tree based public-key management for Mobile Ad Hoc Networks.
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008

Caller identity privacy in SIP heterogeneous realms: A practical solution.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

PANOPTIS: A System for Intelligent Monitoring of the Hellenic Broadcast Sector.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

Clustering Oriented Architectures in Medical Sensor Environments.
Proceedings of the The Third International Conference on Availability, 2008

2007
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks.
IEEE Commun. Surv. Tutorials, 2007

A framework for protecting a SIP-based infrastructure against malformed message attacks.
Comput. Networks, 2007

A PKI approach for deploying modern secure distributed e-learning and m-learning environments.
Comput. Educ., 2007

On Device Authentication in Wireless Networks: Present Issues and Future Challenges.
Proceedings of the Trust, 2007

Towards effective Wireless Intrusion Detection in IEEE 802.11i.
Proceedings of the Third International Workshop on Security, 2007

On RSN-Oriented Wireless Intrusion Detection.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Two privacy enhanced context transfer schemes.
Proceedings of the Q2SWinet'07, 2007

Detecting DNS Amplification Attacks.
Proceedings of the Critical Information Infrastructures Security, 2007

Securing Medical Sensor Environments: The CodeBlue Framework Case.
Proceedings of the The Second International Conference on Availability, 2007

2006
Survey of security vulnerabilities in session initiation protocol.
IEEE Commun. Surv. Tutorials, 2006

Support of subscribers' certificates in a hybrid WLAN-3G environment.
Comput. Networks, 2006

2005
A framework for detecting malformed messages in SIP networks.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005

Evaluation of digital certificates acquisition in large-scale 802.11-3GPP hybrid environments.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005

2004
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks.
Wirel. Pers. Commun., 2004

Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems.
EURASIP J. Wirel. Commun. Netw., 2004

Delivering Attribute Certificates over GPRS.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems.
Proceedings of the NETWORKING 2004, 2004

Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks.
Proceedings of the Public Key Infrastructure, 2004

2003
Introducing PKI to Enhance Security in Future Mobile Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Using SSL/TLS in authentication and key agreement procedures of future mobile networks.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002


  Loading...