ADvoCATE: a consent management platform for personal data processing in the IoT using blockchain technology K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou, A Kritsas Innovative Security Solutions for Information Technology and Communications …, 2019 | 69 | 2019 |
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem. K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou ICETE (2) 298, 572-577, 2018 | 61 | 2018 |
A quantitative evaluation of trust in the quality of cyber threat intelligence sources T Schaberreiter, V Kupfersberger, K Rantos, A Spyros, A Papanikolaou, ... Proceedings of the 14th international conference on availability …, 2019 | 54 | 2019 |
Interoperability challenges in the cybersecurity information sharing ecosystem K Rantos, A Spyros, A Papanikolaou, A Kritsas, C Ilioudis, V Katos Computers 9 (1), 18, 2020 | 49 | 2020 |
The importance of corporate forensic readiness in the information security framework G Pangalos, C Ilioudis, I Pagkalos 2010 19th IEEE International Workshops on Enabling Technologies …, 2010 | 43 | 2010 |
A blockchain-based platform for consent management of personal data processing in the IoT ecosystem K Rantos, G Drosatos, A Kritsas, C Ilioudis, A Papanikolaou, AP Filippidis Security and Communication Networks 2019, 1-15, 2019 | 33 | 2019 |
Insider threats in corporate environments: a case study for data leakage prevention V Stamati-Koromina, C Ilioudis, R Overill, CK Georgiadis, D Stamatis Proceedings of the Fifth Balkan Conference in Informatics, 271-274, 2012 | 30 | 2012 |
Improving forensic triage efficiency through cyber threat intelligence N Serketzis, V Katos, C Ilioudis, D Baltatzis, G Pangalos Future Internet 11 (7), 162, 2019 | 23 | 2019 |
Developing a Public Key Infrastructure for a secure regional e-Health environment G Pangalos, I Mavridis, C Ilioudis, C Georgiadis Methods of information in medicine 41 (05), 414-418, 2002 | 23 | 2002 |
A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet C Ilioudis, G Pangalos Journal of Medical Internet Research 3 (2), e836, 2001 | 23 | 2001 |
Actionable threat intelligence for digital forensics readiness N Serketzis, V Katos, C Ilioudis, D Baltatzis, GJ Pangalos Information & Computer Security 27 (2), 273-291, 2019 | 22 | 2019 |
Real-time network data analysis using time series models T Vafeiadis, A Papanikolaou, C Ilioudis, S Charchalakis Simulation Modelling Practice and Theory 29, 173-180, 2012 | 20 | 2012 |
A Hacker's Perspective on Educating Future Security Experts A Papanikolaou, V Karakoidas, V Vlachos, A Venieris, C Ilioudis, ... 2011 15th Panhellenic Conference on Informatics, 68-72, 2011 | 12 | 2011 |
Detecting and manipulating compressed alternate data streams in a forensics investigation AI Martini, A Zaharis, C Ilioudis 2008 Third International Annual Workshop on Digital Forensics and Incident …, 2008 | 11 | 2008 |
A framework for teaching network security in academic environments A Papanikolaou, V Vlachos, A Venieris, C Ilioudis, K Papapanagiotou, ... Information Management & Computer Security 21 (4), 315-338, 2013 | 10 | 2013 |
On the evolution of malware species V Vlachos, C Ilioudis, A Papanikolaou International Conference on e-Democracy, 54-61, 2011 | 8 | 2011 |
State of vulnerabilities 2018/2019 V Katos, S Rostami, P Bellonias, N Davies, A Kleszcz, S Faily, A Spyros, ... European Union Agency for Cybersecurity (ENISA), Technical Report, 2019 | 7 | 2019 |
Analyzing the selection and dynamic composition of web services in e-commerce transactions N Vesyropoulos, CK Georgiadis, C Ilioudis Proceedings of the Fifth Balkan Conference in Informatics, 130-135, 2012 | 7 | 2012 |
Lightweight steganalysis based on image reconstruction and lead digit distribution analysis A Zaharis, A Martini, T Tryfonas, C Ilioudis, G Pangalos International Journal of Digital Crime and Forensics (IJDCF) 3 (4), 29-41, 2011 | 7 | 2011 |
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time I Mavridis, A Mattas, I Pagkalos, I Kotini, C Ilioudis International Journal of Information and Computer Security 2 (4), 328-352, 2008 | 7 | 2008 |