The impact of quantum computing on present cryptography V Mavroeidis, K Vishi, MD Zych, A Jøsang arXiv preprint arXiv:1804.00200, 2018 | 392 | 2018 |
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence V Mavroeidis, S Bromander 2017 European Intelligence and Security Informatics Conference (EISIC), 91-98, 2017 | 341 | 2017 |
Privacy issues and data protection in big data: a case study analysis under GDPR N Gruschka, V Mavroeidis, K Vishi, M Jensen 2018 IEEE International Conference on Big Data (Big Data), 5027-5033, 2018 | 186 | 2018 |
Automatic Detection of Malware-Generated Domains with Recurrent Neural Models P Lison, V Mavroeidis Norwegian Information Security Conference (NISK 2017), 2017 | 84* | 2017 |
Data-driven threat hunting using sysmon V Mavroeidis, A Jøsang Proceedings of the 2nd International Conference on Cryptography, Security …, 2018 | 52 | 2018 |
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence V Mavroeidis, R Hohimer, T Casey, A Jøsang 2021 13th International Conference on Cyber Conflict (CyCon), 327-352, 2021 | 45 | 2021 |
An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics K Vishi, V Mavroeidis Norwegian Information Security Conference (NISK 2017), 2017 | 39 | 2017 |
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. V Mavroeidis, M Nicho 7th International Conference on Mathematical Methods, Models and …, 2017 | 38 | 2017 |
Neural Reputation Models learned from Passive DNS Data P Lison, V Mavroeidis IEEE BigData 2017 International Workshop on Big Data Analytic for Cyber …, 2017 | 35 | 2017 |
Firearm detection and segmentation using an ensemble of semantic neural networks A Egiazarov, V Mavroeidis, FM Zennaro, K Vishi 2019 European Intelligence and Security Informatics Conference (EISIC), 70-77, 2019 | 30 | 2019 |
A framework for data-driven physical security and insider threat detection V Mavroeidis, K Vishi, A Jøsang 2018 IEEE/ACM International Conference on Advances in Social Networks …, 2018 | 27 | 2018 |
The formai dataset: Generative ai in software security through the lens of formal verification N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis Proceedings of the 19th International Conference on Predictive Models and …, 2023 | 24 | 2023 |
On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence V Mavroeidis, P Eis, M Zadnik, M Caselli, B Jordan 2021 IEEE International Conference on Big Data (Big Data), 2022 | 15 | 2022 |
A Nonproprietary Language for the Command and Control of Cyber Defenses–OpenC2 V Mavroeidis, J Brule Computers & Security 97, 101999, 2020 | 13 | 2020 |
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery … K Fysarakis, A Lekidis, V Mavroeidis, K Lampropoulos, G Lyberopoulos, ... | 9 | 2023 |
A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness K Fysarakis, V Mavroeidis, M Athanatos, G Spanoudakis, S Ioannidis | 7 | 2023 |
Cybersecurity playbook sharing with stix 2.1 V Mavroeidis, M Zych arXiv preprint arXiv:2203.04136, 2022 | 6 | 2022 |
Enhancing the STIX Representation of MITRE ATT&CK for Group Filtering and Technique Prioritization M Zych, V Mavroeidis European Conference on Cyber Warfare and Security (ECCWS) 21 (1), 385-391, 2022 | 4 | 2022 |
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics T Bisztray, N Gruschka, V Mavroeidis, L Fritsch Open Identity Summit (OID) 2020, 185-192, 2020 | 4 | 2020 |
Firearm detection via convolutional neural networks: comparing a semantic segmentation model against end-to-end solutions A Egiazarov, FM Zennaro, V Mavroeidis 2020 IEEE International Conference on Big Data (Big Data), 1796-1804, 2020 | 3 | 2020 |