Empirical evaluation of attacks against IEEE 802.11 enterprise networks: The AWID3 dataset E Chatzoglou, G Kambourakis, C Kolias IEEE Access 9, 34188-34205, 2021 | 38 | 2021 |
Dissecting contact tracing apps in the Android platform V Kouliaridis, G Kambourakis, E Chatzoglou, D Geneiatakis, H Wang Plos one 16 (5), e0251867, 2021 | 27 | 2021 |
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE E Chatzoglou, G Kambourakis, C Kolias Journal of Information Security and Applications 64, 103058, 2022 | 22 | 2022 |
Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy G Karopoulos, G Kambourakis, E Chatzoglou, JL Hernández-Ramos, ... Electronics 11 (7), 1072, 2022 | 16 | 2022 |
Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems E Chatzoglou, G Kambourakis, C Kolias, C Smiliotopoulos IEEE Access, 2022 | 10 | 2022 |
Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study E Chatzoglou, V Kouliaridis, G Karopoulos, G Kambourakis International Journal of Information Security 22 (2), 347-365, 2023 | 8 | 2023 |
Revisiting man-in-the-middle attacks against HTTPS V Kampourakis, G Kambourakis, E Chatzoglou, C Zaroliagis Network Security 2022 (3), 2022 | 8 | 2022 |
Let the cat out of the bag: Popular android iot apps under security scrutiny E Chatzoglou, G Kambourakis, C Smiliotopoulos Sensors 22 (2), 513, 2022 | 8 | 2022 |
A Multi-Tier Security Analysis of Official Car Management Apps for Android E Chatzoglou, G Kambourakis, V Kouliaridis Future Internet 13 (3), 58, 2021 | 8 | 2021 |
Wif0: All your passphrase are belong to us E Chatzoglou, G Kambourakis, C Kolias Computer 54 (7), 82-88, 2021 | 7 | 2021 |
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset E Chatzoglou, V Kouliaridis, G Kambourakis, G Karopoulos, S Gritzalis Computers & Security 125, 103051, 2023 | 3 | 2023 |
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations V Kampourakis, E Chatzoglou, G Kambourakis, A Dolmes, C Zaroliagis Cryptography 6 (4), 53, 2022 | 3 | 2022 |
Your wap is at risk: a vulnerability analysis on wireless access point web-based management interfaces E Chatzoglou, G Kambourakis, C Kolias Security and Communication Networks 2022, 2022 | 3 | 2022 |
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features E Chatzoglou, G Kambourakis, C Smiliotopoulos, C Kolias Sensors 22 (15), 5633, 2022 | 3 | 2022 |
Bypassing antivirus detection: old-school malware, new tricks E Chatzoglou, G Karopoulos, G Kambourakis, Z Tsiatsikas arXiv preprint arXiv:2305.04149, 2023 | | 2023 |
Beam-Selection for 5G/B5G Networks Using Machine Learning: A Comparative Study E Chatzoglou, SK Goudos Sensors 23 (6), 2967, 2023 | | 2023 |
Bl0ck: Paralyzing 802.11 connections through Block Ack frames E Chatzoglou, V Kampourakis, G Kambourakis arXiv preprint arXiv:2302.05899, 2023 | | 2023 |
Προσομοίωση δικτύων 6G σε THz συχνότητες Ε ΧΑΤΖΟΓΛΟΥ Ελληνικό Ανοικτό Πανεπιστήμιο/Hellenic Open University, 2022 | | 2022 |
Μελέτη επιθέσεων στο πρότυπο ΙΕΕΕ 802.11 με πιστοποίηση ταυτότητας ΙΕΕΕ 802.1 Χ ΕΑΡ Ε Χατζόγλου | | 2020 |