ADvoCATE: a consent management platform for personal data processing in the IoT using blockchain technology K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou, A Kritsas Innovative Security Solutions for Information Technology and Communications …, 2019 | 78 | 2019 |
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem. K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou ICETE (2) 298, 572-577, 2018 | 68 | 2018 |
A quantitative evaluation of trust in the quality of cyber threat intelligence sources T Schaberreiter, V Kupfersberger, K Rantos, A Spyros, A Papanikolaou, ... Proceedings of the 14th international conference on availability …, 2019 | 63 | 2019 |
Interoperability challenges in the cybersecurity information sharing ecosystem K Rantos, A Spyros, A Papanikolaou, A Kritsas, C Ilioudis, V Katos Computers 9 (1), 18, 2020 | 57 | 2020 |
The importance of corporate forensic readiness in the information security framework G Pangalos, C Ilioudis, I Pagkalos 2010 19th IEEE International Workshops on Enabling Technologies …, 2010 | 44 | 2010 |
A Blockchain‐Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem K Rantos, G Drosatos, A Kritsas, C Ilioudis, A Papanikolaou, AP Filippidis Security and Communication Networks 2019 (1), 1431578, 2019 | 41 | 2019 |
Improving forensic triage efficiency through cyber threat intelligence N Serketzis, V Katos, C Ilioudis, D Baltatzis, G Pangalos Future Internet 11 (7), 162, 2019 | 30 | 2019 |
Insider threats in corporate environments: a case study for data leakage prevention V Stamati-Koromina, C Ilioudis, R Overill, CK Georgiadis, D Stamatis Proceedings of the Fifth Balkan Conference in Informatics, 271-274, 2012 | 30 | 2012 |
Selected impressions on the beginning of the electronic medical record and patient information R Klar Methods of Information in Medicine 43 (05), 537-542, 2004 | 29 | 2004 |
Actionable threat intelligence for digital forensics readiness N Serketzis, V Katos, C Ilioudis, D Baltatzis, GJ Pangalos Information & Computer Security 27 (2), 273-291, 2019 | 24 | 2019 |
Developing a Public Key Infrastructure for a secure regional e-Health environment G Pangalos, I Mavridis, C Ilioudis, C Georgiadis Methods of information in medicine 41 (05), 414-418, 2002 | 23 | 2002 |
A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet C Ilioudis, G Pangalos Journal of Medical Internet Research 3 (2), e836, 2001 | 23 | 2001 |
Real-time network data analysis using time series models T Vafeiadis, A Papanikolaou, C Ilioudis, S Charchalakis Simulation Modelling Practice and Theory 29, 173-180, 2012 | 20 | 2012 |
A Hacker's Perspective on Educating Future Security Experts A Papanikolaou, V Karakoidas, V Vlachos, A Venieris, C Ilioudis, ... 2011 15th Panhellenic Conference on Informatics, 68-72, 2011 | 12 | 2011 |
Detecting and manipulating compressed alternate data streams in a forensics investigation AI Martini, A Zaharis, C Ilioudis 2008 Third International Annual Workshop on Digital Forensics and Incident …, 2008 | 11 | 2008 |
A framework for teaching network security in academic environments A Papanikolaou, V Vlachos, A Venieris, C Ilioudis, K Papapanagiotou, ... Information Management & Computer Security 21 (4), 315-338, 2013 | 10 | 2013 |
On the evolution of malware species V Vlachos, C Ilioudis, A Papanikolaou International Conference on e-Democracy, 54-61, 2011 | 9 | 2011 |
Lightweight steganalysis based on image reconstruction and lead digit distribution analysis A Zaharis, A Martini, T Tryfonas, C Ilioudis, G Pangalos International Journal of Digital Crime and Forensics (IJDCF) 3 (4), 29-41, 2011 | 8 | 2011 |
State of vulnerabilities 2018/2019 V Katos, S Rostami, P Bellonias, N Davies, A Kleszcz, S Faily, A Spyros, ... European Union Agency for Cybersecurity (ENISA), Technical Report, 2019 | 7 | 2019 |
Analyzing the selection and dynamic composition of web services in e-commerce transactions N Vesyropoulos, CK Georgiadis, C Ilioudis Proceedings of the Fifth Balkan Conference in Informatics, 130-135, 2012 | 7 | 2012 |