


Остановите войну!
for scientists:


default search action
Nikolaos Pitropakis
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j26]Chathuranga Sampath Kalutharage
, Xiaodong Liu
, Christos Chrysoulas
, Nikolaos Pitropakis
, Pavlos Papadopoulos
:
Explainable AI-Based DDOS Attack Identification Method for IoT Networks. Comput. 12(2): 32 (2023) - [j25]Joseph Haddad, Nikolaos Pitropakis
, Christos Chrysoulas
, Mouad Lemoudden
, William J. Buchanan
:
Attacking Windows Hello for Business: Is It What We Were Promised? Cryptogr. 7(1): 9 (2023) - [j24]Sahar Badri, Sana Ullah Jan, Daniyal M. Alghazzawi
, Sahar Aldhaheri, Nikolaos Pitropakis:
BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things. Comput. Syst. Sci. Eng. 46(3): 3667-3684 (2023) - [j23]Ben Hasselgren
, Christos Chrysoulas
, Nikolaos Pitropakis
, William J. Buchanan
:
Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet 15(1): 5 (2023) - [c22]Sarwar Sayeed
, Nikolaos Pitropakis
, William J. Buchanan
, Evangelos K. Markakis
, Dimitra Papatsaroucha
, Ilias Politis
:
TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework. ARES 2023: 145:1-145:10 - [c21]Stuart Laing, Robert Ludwiniak, Brahim El Boudani
, Christos Chrysoulas, George Ubakanma, Nikolaos Pitropakis:
Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System. DRCN 2023: 1-6 - [i23]Pavlos Papadopoulos, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis:
Towards The Creation Of The Future Fish Farm. CoRR abs/2301.01618 (2023) - [i22]Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai, Baraq Ghaleb, William J. Buchanan:
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. CoRR abs/2308.10834 (2023) - [i21]Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis:
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. CoRR abs/2309.11476 (2023) - [i20]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan:
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms. CoRR abs/2311.02795 (2023) - 2022
- [j22]Adel R. Alharbi, Jawad Ahmad
, Arshad
, Sajjad Shaukat Jamal
, Fawad Masood, Yazeed Yasin Ghadi
, Nikolaos Pitropakis, William J. Buchanan:
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complex. 2022: 7047282:1-7047282:15 (2022) - [j21]Michael Gallagher, Nikolaos Pitropakis
, Christos Chrysoulas
, Pavlos Papadopoulos
, Alexios Mylonas
, Sokratis K. Katsikas
:
Investigating machine learning attacks on financial time series models. Comput. Secur. 123: 102933 (2022) - [j20]Hisham Ali, Jawad Ahmad
, Zakwan Jaroucheh, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Owen Lo, Will Abramson, William J. Buchanan
:
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy 24(10): 1379 (2022) - [j19]Jawad Ahmad, Syed Aziz Shah
, Shahid Latif
, Fawad Ahmed
, Zhuo Zou, Nikolaos Pitropakis:
DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8112-8121 (2022) - [j18]Grant McDonald, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Jawad Ahmad
, William J. Buchanan
:
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors 22(3): 953 (2022) - [j17]Safi Ullah
, Muazzam Ali Khan
, Jawad Ahmad
, Sajjad Shaukat Jamal
, Zil E. Huma, Muhammad Tahir Hassan, Nikolaos Pitropakis
, Arshad
, William J. Buchanan
:
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors 22(4): 1340 (2022) - [j16]Owen Lo
, William J. Buchanan
, Sarwar Sayeed
, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Christos Chrysoulas
:
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors 22(6): 2291 (2022) - [j15]Safi Ullah
, Jawad Ahmad
, Muazzam Ali Khan, Eman H. Alkhammash
, Myriam Hadjouni
, Yazeed Ghadi
, Faisal Saeed
, Nikolaos Pitropakis
:
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors 22(10): 3607 (2022) - [c20]Jon Barton, William J. Buchanan, Nikolaos Pitropakis, Sarwar Sayeed, Will Abramson:
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. ICISSP 2022: 551-561 - [i19]Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan:
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. CoRR abs/2202.03276 (2022) - [i18]Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas:
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. CoRR abs/2203.08781 (2022) - [i17]Nikolaos Pitropakis, Christos Lyvas, Costas Lambrinoudakis:
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. CoRR abs/2206.09834 (2022) - [i16]William J. Buchanan, Mwrwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel:
The Future of Integrated Digital Governance in the EU: EBSI and GLASS. CoRR abs/2212.03218 (2022) - 2021
- [j14]Kris Hughes, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Adrian Smales
, Jawad Ahmad
, William J. Buchanan
:
Browsers' Private Mode: Is It What We Were Promised? Comput. 10(12): 165 (2021) - [j13]Andrei Butnaru, Alexios Mylonas
, Nikolaos Pitropakis
:
Towards Lightweight URL-Based Phishing Detection. Future Internet 13(6): 154 (2021) - [j12]Pavlos Papadopoulos
, Will Abramson, Adam J. Hall, Nikolaos Pitropakis
, William J. Buchanan
:
Privacy and Trust Redefined in Federated Machine Learning. Mach. Learn. Knowl. Extr. 3(2): 333-356 (2021) - [j11]Christopher Kelly, Nikolaos Pitropakis
, Alexios Mylonas
, Sean McKeown
, William J. Buchanan
:
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors 21(7): 2433 (2021) - [j10]Muhammad Almas Khan
, Muazzam Ali Khan
, Sana Ullah Jan
, Jawad Ahmad
, Sajjad Shaukat Jamal
, Awais Aziz Shah
, Nikolaos Pitropakis
, William J. Buchanan
:
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors 21(21): 7016 (2021) - [j9]Will Abramson
, Pavlos Papadopoulos
, Nikolaos Pitropakis
, William J. Buchanan
:
PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform. Softw. Impacts 9: 100101 (2021) - [c19]Christos Chrysoulas
, Amanda Thomson, Nikolaos Pitropakis
, Pavlos Papadopoulos
, Owen Lo
, William J. Buchanan
, George Domalis, Nikos I. Karacapilidis, Dimitris Tsakalidis, Dimitrios Tsolis:
GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 40-57 - [c18]Robert Sutton, Robert Ludwiniak, Nikolaos Pitropakis, Christos Chrysoulas, Tasos Dagiuklas:
Towards An SDN Assisted IDS. NTMS 2021: 1-5 - [c17]Will Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo:
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. SIN 2021: 1-8 - [c16]Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. SIN 2021: 1-6 - [c15]Bruno Marchand, Nikolaos Pitropakis
, William J. Buchanan
, Costas Lambrinoudakis
:
Launching Adversarial Label Contamination Attacks Against Malicious URL Detection. TrustBus 2021: 69-82 - [i15]Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan:
Privacy and Trust Redefined in Federated Machine Learning. CoRR abs/2103.15753 (2021) - [i14]Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas
, William J. Buchanan:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. CoRR abs/2104.12426 (2021) - [i13]Christos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos I. Karacapilidis, Dimitris Tsakalidis, Dimitrios Tsolis:
GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. CoRR abs/2109.08566 (2021) - [i12]Edward Henry Young, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, William J. Buchanan:
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. CoRR abs/2110.01970 (2021) - [i11]William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo:
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. CoRR abs/2112.02855 (2021) - [i10]Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. CoRR abs/2112.10092 (2021) - 2020
- [j8]Lisa Muller, Christos Chrysoulas
, Nikolaos Pitropakis
, Peter J. Barclay:
A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda. Big Data Cogn. Comput. 4(4): 38 (2020) - [j7]Pavlos Papadopoulos
, Nikolaos Pitropakis
, William J. Buchanan
, Owen Lo, Sokratis K. Katsikas
:
Privacy-Preserving Passive DNS. Comput. 9(3): 64 (2020) - [j6]Nikolaos Pitropakis
, Kamil Kokot, Dimitra Gkatzia
, Robert Ludwiniak, Alexios Mylonas
, Miltiadis Kandias:
Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter. Mach. Learn. Knowl. Extr. 2(3): 192-215 (2020) - [j5]Charalampos S. Stamatellis
, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Sokratis K. Katsikas
, William J. Buchanan
:
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors 20(22): 6587 (2020) - [c14]Christopher Kelly, Nikolaos Pitropakis, Sean McKeown
, Costas Lambrinoudakis
:
Testing And Hardening IoT Devices Against the Mirai Botnet. Cyber Security 2020: 1-8 - [c13]William Bowditch, Will Abramson, William J. Buchanan
, Nikolaos Pitropakis, Adam J. Hall:
Privacy-preserving Surveillance Methods using Homomorphic Encryption. ICISSP 2020: 240-248 - [c12]Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos
, Sean McKeown, William J. Buchanan
:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. ICISSP 2020: 289-298 - [c11]Bridget Khursheed, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis
:
Microtargeting or Microphishing? Phishing Unveiled. TrustBus 2020: 89-105 - [c10]Will Abramson, Adam James Hall, Pavlos Papadopoulos
, Nikolaos Pitropakis, William J. Buchanan
:
A Distributed Trust Framework for Privacy-Preserving Machine Learning. TrustBus 2020: 205-220 - [i9]Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. CoRR abs/2005.06599 (2020) - [i8]Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan:
A Distributed Trust Framework for Privacy-Preserving Machine Learning. CoRR abs/2006.02456 (2020) - [i7]Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Testing And Hardening IoT Devices Against the Mirai Botnet. CoRR abs/2007.13410 (2020) - [i6]Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, Sokratis K. Katsikas:
Privacy Preserving Passive DNS. CoRR abs/2008.06430 (2020) - [i5]William J. Buchanan, Muhammad Ali Imran, Masood Ur Rehman, Lei Zhang, Qammer H. Abbasi, Christos Chrysoulas, David Haynes
, Nikolaos Pitropakis, Pavlos Papadopoulos
:
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. CoRR abs/2009.05126 (2020) - [i4]Charalampos S. Stamatellis, Pavlos Papadopoulos, Nikolaos Pitropakis, Sokratis K. Katsikas, William J. Buchanan:
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. CoRR abs/2011.09260 (2020)
2010 – 2019
- 2019
- [j4]Nikolaos Pitropakis, Emmanouil Panaousis
, Thanassis Giannetsos, Eleftherios Anastasiadis, George Loukas
:
A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34 (2019) - [c9]Nikolaos Pitropakis, Marios Logothetis, Gennady L. Andrienko, Jason Stefanatos, Eirini Karapistoli, Costas Lambrinoudakis
:
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 53-68 - [i3]Adam James Hall, Nikolaos Pitropakis, William J. Buchanan
, Naghmeh Moradpoor:
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. CoRR abs/1907.10272 (2019) - [i2]Jon Barton, William J. Buchanan, Will Abramson, Nikolaos Pitropakis:
Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device. CoRR abs/1912.12257 (2019) - 2018
- [j3]Christos Chrysoulas, Nikolaos Pitropakis:
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Trans. Ind. Networks Intell. Syst. 4(12): e4 (2018) - [c8]Adam James Hall, Nikolaos Pitropakis, William J. Buchanan
, Naghmeh Moradpoor:
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. IEEE BigData 2018: 5034-5039 - [c7]Nikolaos Pitropakis, Emmanouil Panaousis
, Alkiviadis Giannakoulias, George Kalpakis
, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis
:
An Enhanced Cyber Attack Attribution Framework. TrustBus 2018: 213-228 - 2017
- [c6]Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis:
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. CCS 2017: 569-586 - [i1]Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis:
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. CoRR abs/1708.08519 (2017) - 2016
- [c5]Christos Lyvas, Nikolaos Pitropakis, Costas Lambrinoudakis
:
The Far Side of Mobile Application Integrated Development Environments. TrustBus 2016: 111-122 - 2015
- [j2]Nikolaos Pitropakis, Aggelos Pikrakis
, Costas Lambrinoudakis
:
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments. Int. J. Inf. Sec. 14(4): 299-305 (2015) - [c4]Nikolaos Pitropakis, Costas Lambrinoudakis
, Dimitris Geneiatakis:
Till All Are One: Towards a Unified Cloud IDS. TrustBus 2015: 136-149 - 2014
- [j1]Nikolaos Pitropakis, Dimitra Anastasopoulou, Aggelos Pikrakis
, Costas Lambrinoudakis
:
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. J. Cloud Comput. 3: 20 (2014) - [c3]Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis
:
Towards an augmented authenticator in the Cloud. ISSPIT 2014: 296-300 - 2013
- [c2]Nikolaos Pitropakis, Costas Lambrinoudakis
, Dimitris Geneiatakis, Dimitris Gritzalis:
A Practical Steganographic Approach for Matroska Based High Quality Video Files. AINA Workshops 2013: 684-688 - [c1]Nikolaos Pitropakis, Eleni Darra, Nikos Vrakas, Costas Lambrinoudakis
:
It's All in the Cloud: Reviewing Cloud Security. UIC/ATC 2013: 355-362
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-11-09 20:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint