Vasileios Mavroeidis

Orcid: 0000-0003-1097-0599

According to our database1, Vasileios Mavroeidis authored at least 27 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TIPS: Threat Sharing Information Platform for Enhanced Security.
CoRR, 2024

Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure.
Proceedings of the 20th IEEE International Conference on Factory Communication Systems, 2024

On the Use of Neurosymbolic AI for Defending Against Cyber Attacks.
Proceedings of the Neural-Symbolic Learning and Reasoning - 18th International Conference, 2024

2023
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications.
Dataset, September, 2023

PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
CoRR, 2023

The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification.
Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering, 2023

Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Enhancing the STIX Representation of MITRE ATT&CK for Group Filtering and Technique Prioritization.
CoRR, 2022

Cybersecurity Playbook Sharing with STIX 2.1.
CoRR, 2022

A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence.
Proceedings of the 13th International Conference on Cyber Conflict, 2021

On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
A nonproprietary language for the command and control of cyber defenses - OpenC2.
Comput. Secur., 2020

Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics.
Proceedings of the Open Identity Summit 2020, 26-27 May, 2020, Copenhagen, Denmark., 2020

Firearm Detection via Convolutional Neural Networks: Comparing a Semantic Segmentation Model Against End-to-End Solutions.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

2018
An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics.
CoRR, 2018

The Impact of Quantum Computing on Present Cryptography.
CoRR, 2018

Data-Driven Threat Hunting Using Sysmon.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Framework for Data-Driven Physical Security and Insider Threat Detection.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Automatic Detection of Malware-Generated Domains with Recurrent Neural Models.
CoRR, 2017

Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks.
Proceedings of the Computer Network Security, 2017

Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

Neural reputation models learned from passive DNS data.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2009
Review of modern regional innovation measurement tools and proposal of a business excellence barometer - implementation and conclusions for the Region of Western Greece.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009


  Loading...