Sotiris Ioannidis
Orcid: 0000-0001-9340-2241
According to our database1,
Sotiris Ioannidis
authored at least 232 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Commun. Mag., November, 2024
IEEE Trans. Wirel. Commun., July, 2024
IEEE Internet Things J., July, 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
LightningNet: Distributed Graph-based Cellular Network Performance Forecasting for the Edge.
CoRR, 2024
Fingerprinting the Shadows: Unmasking Malicious Servers with Machine Learning-Powered TLS Analysis.
Proceedings of the ACM on Web Conference 2024, 2024
Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2024
REBECCA: Reconfigurable Heterogeneous Highly Parallel Processing Platform for Safe and Secure AI.
Proceedings of the 27th Euromicro Conference on Digital System Design, 2024
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
CoRR, 2023
On the Mobility Effect in UAV-Mounted Absorbing Metasurfaces: A Theoretical and Experimental Study.
IEEE Access, 2023
On the Impact of Coding Depth in Sliding Window Random Linear Network Coding Schemes.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023
ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023
Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
A Novel 3D Object Classification Paradigm through Reconfigurable Intelligent Surfaces.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023
Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Realizing Ambient Backscatter Communications with Intelligent Surfaces in 6G Wireless Systems.
IEEE Wirel. Commun., 2022
Explainable machine learning pipeline for Twitter bot detection during the 2020 US Presidential Elections.
Softw. Impacts, 2022
Software-Defined Reconfigurable Intelligent Surfaces: From Theory to End-to-End Implementation.
Proc. IEEE, 2022
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures.
ACM Comput. Surv., 2022
XR-RF Imaging Enabled by Software-Defined Metasurfaces and Machine Learning: Foundational Vision, Technologies and Challenges.
CoRR, 2022
Comput. Networks, 2022
XR-RF Imaging Enabled by Software-Defined Metasurfaces and Machine Learning: Foundational Vision, Technologies and Challenges.
IEEE Access, 2022
Integrating Software-Defined Metasurfaces into Wireless Communication Systems: Design and Prototype Evaluation.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
The Best of Many Worlds: Scheduling Machine Learning Inference on CPU-GPU Integrated Architectures.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2022
Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the 32nd International Conference on Field-Programmable Logic and Applications, 2022
Proceedings of the 30th European Signal Processing Conference, 2022
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
SENTINEL - Approachable, tailor-made cybersecurity and data protection for small enterprises.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2022
An Open Platform for Simulating the Physical Layer of 6G Communication Systems with Multiple Intelligent Surfaces.
Proceedings of the 18th International Conference on Network and Service Management, 2022
A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness.
Proceedings of the IEEE International Conference on Big Data, 2022
Big Data Analytics in the Manufacturing Sector: Guidelines and Lessons Learned Through the Centro Ricerche FIAT (CRF) Case.
Proceedings of the Technologies and Applications for Big Data Value, 2022
Big Data Analytics in the Banking Sector: Guidelines and Lessons Learned from the CaixaBank Case.
Proceedings of the Technologies and Applications for Big Data Value, 2022
2021
IEEE Trans. Sustain. Comput., 2021
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware.
Sensors, 2021
IEEE Internet Things Mag., 2021
A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks.
Expert Syst. Appl., 2021
Next Generation Connected Materials for Intelligent Energy Propagation in Multiphysics Systems.
IEEE Commun. Mag., 2021
Proceedings of the 22nd IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2021
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2021
Proceedings of the NANOCOM '21: The Eighth Annual ACM International Conference on Nanoscale Computing and Communication, Virtual Event, Italy, September 7, 2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets?
IEEE Veh. Technol. Mag., 2020
The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks.
ACM Trans. Priv. Secur., 2020
ACM Trans. Cyber Phys. Syst., 2020
End-to-End Wireless Path Deployment With Intelligent Surfaces Using Interpretable Neural Networks.
IEEE Trans. Commun., 2020
ACM Trans. Archit. Code Optim., 2020
Proceedings of the IEEE International Systems Conference, 2020
Proceedings of the 21st IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2020
Pythia: Scheduling of Concurrent Network Packet Processing Applications on Heterogeneous Devices.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020
Mobility-Aware Beam Steering in Metasurface-Based Programmable Wireless Environments.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the 3rd International Workshop on Edge Systems, Analytics and Networking, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the 25th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
On the Network-Layer Modeling and Configuration of Programmable Wireless Environments.
IEEE/ACM Trans. Netw., 2019
Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS).
ERCIM News, 2019
CoRR, 2019
A survey on vulnerability assessment tools and databases for cloud-based web applications.
Array, 2019
A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems.
Ad Hoc Networks, 2019
Exploration of Intercell Wireless Millimeter-Wave Communication in the Landscape of Intelligent Metasurfaces.
IEEE Access, 2019
A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks.
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019
Towards Specification of a Software Architecture for Cross-Sectoral Big Data Applications.
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
ABSense: Sensing Electromagnetic Waves on Metasurfaces via Ambient Compilation of Full Absorption.
Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 Global IoT Summit, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Security Applications of GPUs.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019
Joint Compressed Sensing and Manipulation of Wireless Emissions with Intelligent Surfaces.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 19th IEEE/ACM International Symposium on Cluster, 2019
Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019
Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Soc. Netw. Anal. Min., 2018
Modeling, Simulating and Configuring Programmable Wireless Environments for Multi-User Multi-Objective Networking.
CoRR, 2018
IEEE Commun. Mag., 2018
Commun. ACM, 2018
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018
Proceedings of the Information and Operational Technology Security Systems, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Enabling GPU-assisted Antivirus Protection on Android Devices through Edge Offloading.
Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking, 2018
Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms, 2018
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2018
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018
2017
Design and Implementation of a Stateful Network Packet Processing Framework for GPUs.
IEEE/ACM Trans. Netw., 2017
Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures.
IEEE/ACM Trans. Netw., 2017
Nano Commun. Networks, 2017
Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis.
IEEE Access, 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 4th ACM International Conference on Nanoscale Computing and Communication, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the European Project Space on Networks, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
2016
Soc. Netw. Anal. Min., 2016
Nano Commun. Networks, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 2016
Proceedings of the 3rd ACM International Conference on Nanoscale Computing and Communication, 2016
Proceedings of the 23rd International Conference on Telecommunications, 2016
Proceedings of the Computers Helping People with Special Needs, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
2015
ERCIM News, 2015
Testing for common sense (violation) in airline pricing or how complexity asymmetry defeated you and the web.
CoRR, 2015
CoRR, 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Second Annual International Conference on Nanoscale Computing and Communication, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Eighth European Workshop on System Security, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015
2014
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 26th IEEE International Symposium on Computer Architecture and High Performance Computing, 2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
Proceedings of the Seventh European Workshop on System Security, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Efficient software packet processing on heterogeneous and asymmetric hardware architectures.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014
2013
Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data.
Int. J. Digit. Crime Forensics, 2013
Proceedings of the 8th Workshop on Implementation, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the 2011 IEEE International Symposium on Workload Characterization, 2011
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
IEEE Netw., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Computer Security, 2010
2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
2007
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.
Int. J. Netw. Secur., 2007
Int. J. Inf. Sec., 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of IEEE International Conference on Communications, 2007
2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Information Security, 9th International Conference, 2006
2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, 2002
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002
Proceedings of the Management Solutions for the New Communications World, 2002
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001
2000
Proceedings of the Active Networks, Second International Working Conference, 2000
1999
Sci. Program., 1999
Parallel Distributed Comput. Pract., 1999
1998
Compiler and Run-Time Support for Adaptive Load Balancing in Software Distributed Shared Memory Systems.
Proceedings of the Languages, 1998