Stilianos Vidalis
According to our database1,
Stilianos Vidalis
authored at least 19 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices.
Sensors, September, 2024
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks.
Comput. Secur., 2024
2023
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases.
Multim. Tools Appl., May, 2023
Technical Report relating to CVE-2022-46480, CVE-2023-26941, CVE-2023-26942, and CVE-2023-26943.
CoRR, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
2022
Proceedings of the Risks and Security of Internet and Systems, 2022
2021
Proceedings of the 2021 International Carnahan Conference on Security Technology, 2021
2018
Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networks.
Multim. Tools Appl., 2018
2016
Proceedings of the Eleventh International Conference on Digital Information Management, 2016
2013
Inf. Secur. J. A Glob. Perspect., 2013
2012
Proceedings of the 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 2012
Proceedings of the 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 2012
Collecting Evidence from Large-Scale Heterogeneous Virtual Computing Infrastructures Using Website Capture.
Proceedings of the 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 2012
2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
2007
2006
Inf. Manag. Comput. Secur., 2006
2005
Analyzing Threat Agents and Their Attributes.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
2003