DDoS in the IoT: Mirai and other botnets C Kolias, G Kambourakis, A Stavrou, J Voas Computer 50 (7), 80-84, 2017 | 2189 | 2017 |
Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset C Kolias, G Kambourakis, A Stavrou, S Gritzalis IEEE Communications Surveys & Tutorials 18 (1), 184-208, 2015 | 568 | 2015 |
The mirai botnet and the iot zombie armies G Kambourakis, C Kolias, A Stavrou MILCOM 2017-2017 IEEE military communications conference (MILCOM), 267-272, 2017 | 267 | 2017 |
Survey of security vulnerabilities in session initiation protocol. D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ... IEEE Communications Surveys and Tutorials 8 (1-4), 68-81, 2006 | 266 | 2006 |
Swarm intelligence in intrusion detection: A survey C Kolias, G Kambourakis, M Maragoudakis computers & security 30 (8), 625-642, 2011 | 238 | 2011 |
Introducing deep learning self-adaptive misuse network intrusion detection systems D Papamartzivanos, FG Mármol, G Kambourakis IEEE access 7, 13546-13560, 2019 | 177 | 2019 |
Detecting DNS amplification attacks G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis Critical Information Infrastructures Security: Second International Workshop …, 2008 | 173 | 2008 |
DNS amplification attack revisited M Anagnostopoulos, G Kambourakis, P Kopanos, G Louloudakis, ... Computers & Security 39, 475-485, 2013 | 162 | 2013 |
Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks P Nespoli, D Papamartzivanos, FG Mármol, G Kambourakis IEEE Communications Surveys & Tutorials 20 (2), 1361-1396, 2017 | 146 | 2017 |
Introducing touchstroke: keystroke‐based authentication system for smartphones G Kambourakis, D Damopoulos, D Papamartzivanos, E Pavlidakis Security and Communication Networks 9 (6), 542-554, 2016 | 144 | 2016 |
A critical review of 7 years of Mobile Device Forensics K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos Digital Investigation 10 (4), 323-349, 2013 | 140 | 2013 |
Dendron: Genetic trees driven rule induction for network intrusion detection systems D Papamartzivanos, FG Mármol, G Kambourakis Future Generation Computer Systems 79, 558-574, 2018 | 138 | 2018 |
Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps T Martin, G Karopoulos, JL Hernández-Ramos, G Kambourakis, ... Wireless Communications and Mobile Computing 2020, 2020 | 126 | 2020 |
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ... Security and Communication Networks 5 (1), 3-14, 2012 | 126 | 2012 |
A critical review of 13 years of mobile game-based learning F Giannakas, G Kambourakis, A Papasalouros, S Gritzalis Educational Technology Research and Development 66, 341-384, 2018 | 123 | 2018 |
Automatic detection of online recruitment frauds: Characteristics, methods, and a public dataset S Vidros, C Kolias, G Kambourakis, L Akoglu Future Internet 9 (1), 6, 2017 | 99 | 2017 |
A survey on cluster-based group key agreement protocols for WSNs E Klaoudatou, E Konstantinou, G Kambourakis, S Gritzalis IEEE Communications surveys & tutorials 13 (3), 429-442, 2010 | 97 | 2010 |
A framework for protecting a SIP-based infrastructure against malformed message attacks D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ... Computer Networks 51 (10), 2580-2593, 2007 | 96 | 2007 |
SIP Security Mechanisms: A state-of-the-art review D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ... Proceedings of the Fifth International Network Conference (INC 2005), 147-155, 2005 | 96 | 2005 |
A comprehensive survey on machine learning techniques for android malware detection V Kouliaridis, G Kambourakis Information 12 (5), 185, 2021 | 95 | 2021 |