Search

Your search keyword '"Pitropakis, Nikolaos"' showing total 203 results

Search Constraints

Start Over You searched for: Author "Pitropakis, Nikolaos" Remove constraint Author: "Pitropakis, Nikolaos"
203 results on '"Pitropakis, Nikolaos"'

Search Results

1. DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

2. RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations

3. PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

4. CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

5. SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

6. Examining the Strength of Three Word Passwords

7. Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics

8. Transforming EU Governance: The Digital Integration Through EBSI and GLASS

10. Towards The Creation Of The Future Fish Farm

11. Transforming EU Governance: The Digital Integration through EBSI and GLASS

12. The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

13. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

14. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

15. Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

16. PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

17. Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

18. GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

19. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

20. Privacy and Trust Redefined in Federated Machine Learning

21. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

22. Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing

23. Privacy Preserving Passive DNS

24. Testing And Hardening IoT Devices Against the Mirai Botnet

25. A Distributed Trust Framework for Privacy-Preserving Machine Learning

26. Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

27. Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device

28. Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

30. GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS

33. Launching Adversarial Label Contamination Attacks Against Malicious URL Detection

34. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

35. GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS

36. Microtargeting or Microphishing? Phishing Unveiled

37. Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures

45. An Enhanced Cyber Attack Attribution Framework

Catalog

Books, media, physical & digital resources