Zisis Tsiatsikas

Orcid: 0000-0002-9481-0906

According to our database1, Zisis Tsiatsikas authored at least 13 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

2023
Bypassing antivirus detection: old-school malware, new tricks.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
At Your Service 24/7 or Not? Denial of Service on ESInet Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

2019
Ανίχνευση και πρόληψη επιθέσεων άρνησης εξυπηρέτησης στα πρωτόκολλα SIP και SDP
PhD thesis, 2019

The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems.
IEEE Access, 2019

2017
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
An efficient and easily deployable method for dealing with DoS in SIP services.
Comput. Commun., 2015

Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?.
Proceedings of the SECRYPT 2015, 2015

2013
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013


  Loading...