Name
Papers
Collaborators
GEORGE STERGIOPOULOS
24
37
Citations 
PageRank 
Referers 
36
9.25
60
Referees 
References 
237
172
Search Limit
100237
Title
Citations
PageRank
Year
Dropping Malware Through Sound Injection: A Comparative Analysis On Android Operating Systems00.342021
Automatic network restructuring and risk mitigation through business process asset dependency analysis10.372020
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems.00.342020
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis.00.342020
Using side channel TCP features for real-time detection of malware connections.00.342019
Analyzing Congestion Interdependencies Of Ports And Container Ship Routes In The Maritime Network Infrastructure00.342018
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment.10.362018
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks.00.342018
Protecting the Transportation Sector from the Negative Impacts of Climate Change.00.342017
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures.10.362017
Program analysis with risk-based classification of dynamic invariants for logical error detection.00.342017
A Process-Based Dependency Risk Analysis Methodology For Critical Infrastructures20.452017
Critical Infrastructure Protection: A Holistic Methodology for Greece.00.342016
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures.40.752016
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.10.362016
Automated exploit detection using path profiling: The disposition should matter, not the position10.352015
"Water, Water, Every Where": Nuances For A Water Industry Critical Infrastructure Specification Exemplar00.342015
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures10.352015
Execution Path Classification for Vulnerability Analysis and Detection.00.342015
A Bug Hunter's Diary.10.342014
Insider Threat: Enhancing BPM through Social Media50.432014
Automated Detection of Logical Errors in Programs.40.412014
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework.60.472013
Hunting application-level logical errors80.532012