Iosif Polenakis
Orcid: 0000-0002-6427-5519
According to our database1,
Iosif Polenakis
authored at least 26 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Towards a real-time distributed feedback system for the transportation assistance of PwD.
CoRR, 2024
2023
Detection and classification of malicious software utilizing Max-Flows between system-call groups.
J. Comput. Virol. Hacking Tech., March, 2023
A Code-Based Multiple Watermarking Scheme for the Preservation of Authenticity of Forensic Images.
Proceedings of the 14th International Conference on Information, 2023
Proceedings of the 24th International Conference on Computer Systems and Technologies, 2023
2022
Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs.
J. Comput. Virol. Hacking Tech., 2022
An integrated simulation framework for the prevention and mitigation of pandemics caused by airborne pathogens.
Netw. Model. Anal. Health Informatics Bioinform., 2022
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022
Proceedings of the 13th International Conference on Information, 2022
A Repetitive Watermarking Scheme for Digital Images based on Self-Inverting Permutations.
Proceedings of the 13th International Conference on Information, 2022
Proceedings of the CompSysTech '22: International Conference on Computer Systems and Technologies 2022, University of Ruse, Ruse, Bulgaria, June 17, 2022
2021
A graph-based framework for malicious software detection and classification utilizing temporal-graphs.
J. Comput. Secur., 2021
CoRR, 2021
CoRR, 2021
Detection and Classification of Malicious Software based on Regional Matching of Temporal Graphs.
Proceedings of the CompSysTech '21: International Conference on Computer Systems and Technologies '21, 2021
2020
An Algorithmic Framework for Malicious Software Detection Exploring Structural Characteristics of Behavioral Graphs.
Proceedings of the International Conference on Computer Systems and Technologies 2020, 2020
2019
PhD thesis, 2019
Proceedings of the 20th International Conference on Computer Systems and Technologies, 2019
2018
Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations.
CoRR, 2018
A Graph-based Model for Malicious Software Detection Exploiting Domination Relations between System-call Groups.
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018
2017
A graph-based model for malware detection and classification using system-call groups.
J. Comput. Virol. Hacking Tech., 2017
J. Inf. Secur. Appl., 2017
Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017
2016
A Model for Establishing Response-time Bounds to Prevent Malware Pandemics in Mobile Devices.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016
2015
Proceedings of the 19th Panhellenic Conference on Informatics, 2015
A graph-based model for malicious code detection exploiting dependencies of system-call groups.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015
2014
CoRR, 2014