The Sphinx enigma in critical VoIP infrastructures: Human or botnet? D Gritzalis, Y Soupionis, V Katos, I Psaroudakis, P Katsaros, A Mentis IISA 2013, 1-6, 2013 | 242 | 2013 |
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods A Nisioti, A Mylonas, PD Yoo, V Katos IEEE Communications Surveys & Tutorials 20 (4), 3369-3388, 2018 | 214 | 2018 |
A critical review of 7 years of Mobile Device Forensics K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos Digital Investigation 10 (4), 323-349, 2013 | 140 | 2013 |
Real time DDoS detection using fuzzy estimators SN Shiaeles, V Katos, AS Karakos, BK Papadopoulos computers & security 31 (6), 782-790, 2012 | 128 | 2012 |
Which IoT protocol? Comparing standardized approaches over a common M2M application K Fysarakis, I Askoxylakis, O Soultatos, I Papaefstathiou, C Manifavas, ... 2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016 | 106 | 2016 |
An architecture for blockchain over edge-enabled IoT for smart circular cities A Damianou, CM Angelopoulos, V Katos 2019 15th International Conference on Distributed Computing in Sensor …, 2019 | 64 | 2019 |
Towards a green blockchain: A review of consensus mechanisms and their energy consumption AO Bada, A Damianou, CM Angelopoulos, V Katos 2021 17th international conference on distributed computing in sensor …, 2021 | 59 | 2021 |
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis V Katos Information Sciences 177 (15), 3060-3073, 2007 | 58 | 2007 |
Encrypted and covert DNS queries for botnets: Challenges and countermeasures C Patsakis, F Casino, V Katos Computers & Security 88, 101614, 2020 | 57 | 2020 |
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments M Walshe, G Epiphaniou, H Al-Khateeb, M Hammoudeh, V Katos, ... Ad Hoc Networks 95, 101988, 2019 | 57 | 2019 |
Interoperability challenges in the cybersecurity information sharing ecosystem K Rantos, A Spyros, A Papanikolaou, A Kritsas, C Ilioudis, V Katos Computers 9 (1), 18, 2020 | 56 | 2020 |
Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19 J Deutrom, V Katos, R Ali Behaviour & Information Technology 41 (14), 3161-3175, 2022 | 55 | 2022 |
Blockchains as Enablers for Auditing Cooperative Circular Economy Networks G Alexandris, V Katos, S Alexaki, G Hatzivasilis 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design …, 2018 | 51 | 2018 |
A cyber-crime investigation framework V Katos, PM Bednar Computer Standards & Interfaces 30 (4), 223-228, 2008 | 49 | 2008 |
DHP Framework: Digital Health Passports Using Blockchain--Use case on international tourism during the COVID-19 pandemic CM Angelopoulos, A Damianou, V Katos arXiv preprint arXiv:2005.08922, 2020 | 47 | 2020 |
Blockchain-based electronic patient records for regulated circular healthcare jurisdictions S Alexaki, G Alexandris, V Katos, NE Petroulakis 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design …, 2018 | 47 | 2018 |
A randomness test for block ciphers V Katos Applied mathematics and computation 162 (1), 29-35, 2005 | 47 | 2005 |
Reengineering the user: privacy concerns about personal data on smartphones M Tsavli, PS Efraimidis, V Katos, L Mitrou Information & Computer Security 23 (4), 394-405, 2015 | 44 | 2015 |
Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes K Ruan IGI Global, 2012 | 37 | 2012 |
Exploring the protection of private browsing in desktop browsers N Tsalis, A Mylonas, A Nisioti, D Gritzalis, V Katos Computers & Security 67, 181-197, 2017 | 35 | 2017 |