Georgios Kambourakis
Orcid: 0000-0001-6348-5031
According to our database1,
Georgios Kambourakis
authored at least 154 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Assessing the detection of lateral movement through unsupervised learning techniques.
Comput. Secur., 2025
2024
World Wide Web (WWW), July, 2024
The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.
Inf., May, 2024
CoRR, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Federated Genetic Algorithm: Two-Layer Privacy-Preserving Trajectory Data Publishing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2024
2023
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs.
Int. J. Inf. Sec., December, 2023
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study.
Int. J. Inf. Sec., April, 2023
Inf., January, 2023
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond.
IT Prof., 2023
Comput. Secur., 2023
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features.
Sensors, 2022
Sensors, 2022
Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces.
Secur. Commun. Networks, 2022
J. Inf. Secur. Appl., 2022
J. Inf. Secur. Appl., 2022
Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems.
IEEE Access, 2022
Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
2021
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation.
Wirel. Commun. Mob. Comput., 2021
Inf., 2021
Future Internet, 2021
Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures.
CoRR, 2021
Connect. Sci., 2021
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents.
IEEE Access, 2021
IEEE Access, 2021
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset.
IEEE Access, 2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response Headers.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps.
Wirel. Commun. Mob. Comput., 2020
Symmetry, 2020
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks.
Symmetry, 2020
What Email Servers Can Tell to Johnny: An Empirical Study of Provider-to-Provider Email Security.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Machine Learning for Networking - Third International Conference, 2020
2019
Wirel. Commun. Mob. Comput., 2019
J. Inf. Secur. Appl., 2019
Inf. Secur. J. A Glob. Perspect., 2019
Editorial: special issue on advances in security and privacy for future mobile communications.
Electron. Commer. Res., 2019
IEEE Commun. Mag., 2019
The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems.
IEEE Access, 2019
IEEE Access, 2019
2018
Dendron : Genetic trees driven rule induction for network intrusion detection systems.
Future Gener. Comput. Syst., 2018
Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks.
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
2017
J. Univers. Comput. Sci., 2017
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection.
Int. J. Inf. Sec., 2017
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset.
Future Internet, 2017
Future Internet, 2017
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 10th IFIP Wireless and Mobile Networking Conference, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
Secur. Commun. Networks, 2016
Int. J. Interact. Mob. Technol., 2016
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Commun. Surv. Tutorials, 2016
Proceedings of the 24th International Conference on Software, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
2015
Let's Meet! A participatory-based discovery and rendezvous mobile marketing framework.
Telematics Informatics, 2015
Inf. Sci., 2015
Comput. Commun., 2015
Comput. Commun., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?.
Proceedings of the SECRYPT 2015, 2015
2014
Peer-to-Peer Netw. Appl., 2014
Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
Mob. Networks Appl., 2014
J. Inf. Secur. Appl., 2014
Comput. Stand. Interfaces, 2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Proceedings of the Semantic Hyper/Multimedia Adaptation - Schemes and Applications, 2013
Pers. Ubiquitous Comput., 2013
Int. J. Inf. Sec., 2013
IEEE Commun. Surv. Tutorials, 2013
Comput. Secur., 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012
Inf. Syst. Frontiers, 2012
2011
Wirel. Commun. Mob. Comput., 2011
IEEE Commun. Surv. Tutorials, 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
2010
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web.
Pers. Ubiquitous Comput., 2010
Intell. Autom. Soft Comput., 2010
EURASIP J. Wirel. Commun. Netw., 2010
Comput. Commun., 2010
2009
J. Netw. Comput. Appl., 2009
Proceedings of the Trust, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
Enabling the provision of secure web based m-health services utilizing XML based security models.
Secur. Commun. Networks, 2008
Comput. Secur., 2008
Comput. Commun., 2008
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony.
Proceedings of the Trust, 2008
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008
A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization.
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008
Proceedings of the 16th Euromicro International Conference on Parallel, 2008
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks.
IEEE Commun. Surv. Tutorials, 2007
A framework for protecting a SIP-based infrastructure against malformed message attacks.
Comput. Networks, 2007
A PKI approach for deploying modern secure distributed e-learning and m-learning environments.
Comput. Educ., 2007
Proceedings of the Trust, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
IEEE Commun. Surv. Tutorials, 2006
Comput. Networks, 2006
2005
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005
Evaluation of digital certificates acquisition in large-scale 802.11-3GPP hybrid environments.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005
2004
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks.
Wirel. Pers. Commun., 2004
Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems.
EURASIP J. Wirel. Commun. Netw., 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the NETWORKING 2004, 2004
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks.
Proceedings of the Public Key Infrastructure, 2004
2003
Introducing PKI to Enhance Security in Future Mobile Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
Using SSL/TLS in authentication and key agreement procedures of future mobile networks.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002