Name
Papers
Collaborators
CHRISTOS XENAKIS
59
97
Citations 
PageRank 
Referers 
221
28.00
523
Referees 
References 
816
473
Search Limit
100816
Title
Citations
PageRank
Year
Facilitating DoS Attack Detection using Unsupervised Anomaly Detection00.342022
Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations.00.342022
A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations.00.342021
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation10.392021
SECONDO - A Platform for Cybersecurity Investments and Cyber Insurance Decisions.20.402020
Killing The Password And Preserving Privacy With Device-Centric And Attribute-Based Authentication00.342020
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems"00.342020
ICITPM - Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM).00.342020
Distributed Key Management in Microgrids.10.392020
Transforming Malicious Code to ROP Gadgets for Antivirus Evasion00.342019
ObjectMap: detecting insecure object deserialization00.342019
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications10.342019
Evaluation of Password Hashing Schemes in Open Source Web Platforms10.342019
A survey of voice and communication protection solutions against wiretapping00.342019
Curex: Secure And Private Health Data Exchange00.342019
Barrett Blockchain Regulated Remote Attestation00.342019
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem.00.342018
Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication.00.342018
Towards trusted metering in the smart grid00.342017
RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance.00.342017
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks.50.442017
A Security Evaluation of FIDO's UAF Protocol in Mobile and Embedded Devices.00.342017
(U)SimMonitor: A mobile application for security evaluation of cellular networks.00.342016
Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software00.342015
Attacking the baseband modem of mobile phones to breach the users' privacy and network security40.422015
Gaithashing: A two-factor authentication scheme based on gait features80.472015
Self-organised Key Management for the Smart Grid50.552015
Evaluation of Cryptography Usage in Android Applications.60.542015
Evaluating the privacy of Android mobile applications under forensic analysis.100.702014
A specification-based intrusion detection engine for infrastructure-less networks.80.522014
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks30.482014
SOMA-E: Self-organized mesh authentication - Extended.10.372013
Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices.110.692013
A Better Time Approximation Scheme for e-Passports.00.342013
Analysis And Modeling Of False Synchronizations In 3g-Wlan Integrated Networks00.342012
Busfinder: A Personalized Multimodal Transportation Guide with Dynamic Routing20.442012
Securing the 802.11 MAC in MANETs: A specification-based intrusion detection engine.00.342012
Questioning the Feasibility of UMTS-GSM Interworking Attacks10.382012
Mobility and energy-aware hierarchical intrusion detection system for mobile ad hoc networks10.342011
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks210.872011
An evaluation of anomaly-based intrusion detection engines for mobile ad hoc networks40.422011
Reducing False Synchronizations in 3G-WLAN Integrated Networks.20.412011
SOMA: self-organised mesh authentication10.372010
A quantitative risk analysis approach for deliberate threats20.502010
A Novel Intrusion Detection System for MANETs.80.542010
A generic mechanism for efficient authentication in B3G networks30.472010
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks201.112009
Security Measures and Weaknesses of the GPRS Security Architecture90.682008
A network-assisted mobile VPN for securing users data in UMTS10.412008
Security architectures for B3G mobile networks50.512007
  • 1
  • 2