Survey of security vulnerabilities in session initiation protocol D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ... IEEE Communications Surveys & Tutorials 8 (3), 68-81, 2006 | 264 | 2006 |
Security and privacy issues for an IoT based smart home D Geneiatakis, I Kounelis, R Neisse, I Nai-Fovino, G Steri, G Baldini 2017 40th international convention on information and communication …, 2017 | 208 | 2017 |
Detecting DNS amplification attacks G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis Critical Information Infrastructures Security: Second International Workshop …, 2008 | 173 | 2008 |
Survey of network security systems to counter SIP-based denial-of-service attacks S Ehlert, D Geneiatakis, T Magedanz computers & security 29 (2), 225-243, 2010 | 159 | 2010 |
A Permission verification approach for android mobile applications D Geneiatakis, IN Fovino, I Kounelis, P Stirparo Computers & Security 49, 192-205, 2015 | 96 | 2015 |
A framework for protecting a SIP-based infrastructure against malformed message attacks D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ... Computer Networks 51 (10), 2580-2593, 2007 | 95 | 2007 |
A fair solution to dns amplification attacks G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis Second International Workshop on Digital Forensics and Incident Analysis …, 2007 | 89 | 2007 |
Fostering consumers' energy market through smart contracts I Kounelis, G Steri, R Giuliani, D Geneiatakis, R Neisse, I Nai-Fovino 2017 international conference in energy and sustainability in small …, 2017 | 87 | 2017 |
Utilizing bloom filters for detecting flooding attacks against SIP based services D Geneiatakis, N Vrakas, C Lambrinoudakis computers & security 28 (7), 578-591, 2009 | 87 | 2009 |
SIP Security Mechanisms: A state-of-the-art review D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ... Proceedings of the Fifth International Network Conference (INC 2005), 147-155, 2005 | 87 | 2005 |
Blockchain performance analysis for supporting cross-border E-government services D Geneiatakis, Y Soupionis, G Steri, I Kounelis, R Neisse, I Nai-Fovino IEEE Transactions on Engineering Management 67 (4), 1310-1322, 2020 | 78 | 2020 |
An ontology description for SIP security flaws D Geneiatakis, C Lambrinoudakis Computer Communications 30 (6), 1367-1374, 2007 | 73 | 2007 |
Two layer Denial of Service prevention on SIP VoIP infrastructures S Ehlert, G Zhang, D Geneiatakis, G Kambourakis, T Dagiuklas, J Markl, ... Computer Communications 31 (10), 2443-2456, 2008 | 64 | 2008 |
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment D Geneiatakis, C Lambrinoudakis Telecommunication Systems 36, 153-159, 2007 | 63 | 2007 |
A framework for detecting malformed messages in SIP networks D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ... 2005 14th IEEE Workshop on Local & Metropolitan Area Networks, 5 pp.-5, 2005 | 53 | 2005 |
On machine learning effectiveness for malware detection in Android OS using static analysis data V Syrris, D Geneiatakis Journal of information security and applications 59, 102794, 2021 | 52 | 2021 |
SIP message tampering: The SQL code injection attack D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ... Proceedings of 13th International Conference on Software, Telecommunications …, 2005 | 52 | 2005 |
Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation JL Hernández-Ramos, G Karopoulos, D Geneiatakis, T Martin, ... Wireless Communications and Mobile Computing 2021 (1), 2427896, 2021 | 46 | 2021 |
Two anatomists are better than one—dual-level android malware detection V Kouliaridis, G Kambourakis, D Geneiatakis, N Potha Symmetry 12 (7), 1128, 2020 | 39 | 2020 |
A state-of-the-art review on the security of mainstream IoT wireless PAN protocol stacks G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos, GM Makrakis, ... Symmetry 12 (4), 579, 2020 | 38 | 2020 |