Name
Affiliation
Papers
ALEXIOS MYLONAS
Athens Univ Econ & Business AUEB, Dept Informat, Informat Secur & Crit Infrastruct Protect Res Lab, GR-10434 Athens, Greece
28
Collaborators
Citations 
PageRank 
47
234
17.65
Referers 
Referees 
References 
489
590
338
Search Limit
100590
Title
Citations
PageRank
Year
Towards a Multi-Layered Phishing Detection.00.342020
Known unknowns: Indeterminacy in authentication in IoT00.342020
Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter.10.412020
R$²$BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification.30.642020
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS.00.342019
Uncertainty-Aware Authentication Model for IoT.00.342019
A Usability Evaluation of Privacy Add-ons for Web Browsers.00.342019
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods.80.592018
Exiting the Risk Assessment Maze: A Meta-Survey.20.372018
I Know What You Did Last Summer: New Persistent Tracking Mechanisms In The Wild00.342018
Exploring the protection of private browsing in desktop browsers.00.342017
TRAWL: Protection against rogue sites for the masses00.342017
A Study On Usability And Security Features Of The Android Pattern Lock Screen20.382016
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention30.392015
Security Busters: Web browser security vs. rogue sites50.472015
Exploring the Adoption of Physical Security Controls in Smartphones.20.382015
An Intensive Analysis of Security and Privacy Browser Add-Ons.10.362015
Browser Blacklists: The Utopia of Phishing Protection.30.412014
Assessing Privacy Risks In Android: A User-Centric Approach140.772013
Evaluating the Manageability of Web Browsers Controls.60.512013
Delegate the smartphone user? Security awareness in smartphone platforms702.462013
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users.170.822013
Smartphone sensor data as digital evidence221.232013
A Risk Assessment Method For Smartphones251.072012
Smartphone Forensics: A Proactive Investigation Scheme For Evidence Acquisition120.992012
On the Feasibility of Malware Attacks in Smartphone Platforms60.572011
A secure smartphone applications roll-out scheme80.612011
Smartphone Security Evaluation - The Malware Attack Case .241.512011