Name
Papers
Collaborators
COSTAS LAMBRINOUDAKIS
83
111
Citations 
PageRank 
Referers 
393
46.57
810
Referees 
References 
1011
533
Search Limit
1001000
Title
Citations
PageRank
Year
Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers00.342022
Launching Adversarial Label Contamination Attacks Against Malicious URL Detection00.342021
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers00.342020
Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System.00.342020
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers.00.342020
GDPR Compliance - Proposed Guidelines for Cloud-Based Health Organizations.00.342020
Compatibility Of A Security Policy For A Cloud-Based Healthcare System With The Eu General Data Protection Regulation (Gdpr)00.342020
Microtargeting or Microphishing? Phishing Unveiled.00.342020
Testing And Hardening IoT Devices Against the Mirai Botnet00.342020
Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile00.342019
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics.00.342019
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures.00.342019
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers00.342019
Dypermin: Dynamic permission mining framework for android platform.10.352018
The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers.00.342018
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens' Trust and the Role of Information Privacy.00.342017
The Far Side of Mobile Application Integrated Development Environments.00.342016
Literature Review of Trust Models for Cloud Computing00.342016
Till All Are One: Towards a Unified Cloud IDS40.462015
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments40.412015
Privacy Principles: Towards a Common Privacy Audit Methodology20.372015
Cloud Computing Security Requirements and a Methodology for Their Auditing.00.342015
A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments.00.342015
Towards a Common Security and Privacy Requirements Elicitation Methodology00.342015
Obscuring users' identity in VoIP/IMS environments.20.402014
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments10.352014
Empowering Users to Specify and Manage Their Privacy Preferences in e-Government Environments.20.382014
Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy.00.342013
ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence.00.342013
Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments30.372013
A Practical Steganographic Approach for Matroska Based High Quality Video Files00.342013
It's All in the Cloud: Reviewing Cloud Security00.342013
Special Issue on Advanced Information Security for Secure and Trust Computing00.342013
An intrusion detection and prevention system for IMS and VoIP services30.412013
Special issue on next generation communication and network security00.342012
Privacy and Traceability in Social Networking Sites30.402012
Special issue on security in cloud computing10.352012
IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS.10.352011
Privacy-preserving storage and access of medical data through pseudonymization and encryption40.692011
A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services10.352011
Privacy preserving context transfer schemes for 4G networks30.402011
Privacy requirements engineering for trustworthy e-government services20.382010
A call conference room interception attack and its detection40.422010
Transforming the Greek e-government environment towards the e-Gov 2.0 era50.522010
A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity50.442010
Utilizing bloom filters for detecting flooding attacks against SIP based services281.082009
Exploring Trust, Security and Privacy in Digital Business00.342009
Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings141.372009
A First Order Logic Security Verification Model for SIP20.372009
A Hierarchical Model for Cross-Domain Communication of Health Care Units00.342009
  • 1
  • 2