Nikolaos Pitropakis
Orcid: 0000-0002-3392-9970
According to our database1,
Nikolaos Pitropakis
authored at least 71 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.
Int. J. Inf. Sec., February, 2024
DID: RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity.
CoRR, 2024
RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations.
CoRR, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024
DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.
Proceedings of the 7th IEEE International Conference on Advanced Technologies, 2024
2023
AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks.
Sensors, November, 2023
Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection.
Comput., September, 2023
Cryptogr., March, 2023
Comput., February, 2023
Future Internet, 2023
BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things.
Comput. Syst. Sci. Eng., 2023
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.
CoRR, 2023
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.
Sensors, 2022
Sensors, 2022
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.
Sensors, 2022
DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.
J. King Saud Univ. Comput. Inf. Sci., 2022
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
Entropy, 2022
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud.
CoRR, 2022
Comput. Secur., 2022
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.
Complex., 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
2021
J. Cybersecur. Priv., April, 2021
PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform.
Softw. Impacts, 2021
Mach. Learn. Knowl. Extr., 2021
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.
CoRR, 2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
Mach. Learn. Knowl. Extr., 2020
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.
CoRR, 2020
A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda.
Big Data Cogn. Comput., 2020
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
2019
CoRR, 2019
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
2018
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Trust, Privacy and Security in Digital Business, 2016
2015
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments.
Int. J. Inf. Sec., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
2014
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments.
J. Cloud Comput., 2014
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014
2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013