Vasiliki Liagkou
Orcid: 0000-0002-1162-5490
According to our database1,
Vasiliki Liagkou
authored at least 38 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
J. Grid Comput., September, 2024
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks.
Sensors, March, 2024
Proceedings of the Structural Information and Communication Complexity, 2024
Proceedings of the IEEE Global Engineering Education Conference, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
Computing, October, 2023
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape.
J. Cybersecur. Priv., September, 2023
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023
On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
2022
Simul. Model. Pract. Theory, 2022
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem.
Cryptogr., 2022
Proceedings of the 7th South-East Europe Design Automation, 2022
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
2021
Privacy-Preserving Identity Management and Applications to Academic Degree Verification.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021
Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2019
Attack Detection for Healthcare Monitoring Systems Using Mechanical Learning in Virtual Private Networks over Optical Transport Layer Architecture.
Comput., 2019
Balt. J. Mod. Comput., 2019
Proceedings of the Collaborative Networks and Digital Transformation, 2019
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
2018
Proceedings of the Contemporary Complex Systems and Their Dependability, 2018
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
2012
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
2011
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
2009
Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
2008
PhD thesis, 2008
Proceedings of the Software Architecture, Second European Conference, 2008
2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Trust in global computing systems as a limit property emerging from short range random interactions.
Proceedings of the The Second International Conference on Availability, 2007
2006
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
The Threshold Behaviour of the Fixed Radius Random Graph Model and Applications to the Key Management Problem of Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2006
2005
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience.
Proceedings of the Information Security, 8th International Conference, 2005
2004