Georgios Kambourakis
Georgios Kambourakis
Professor, Dept. of Information and Communication Systems Eng., University of the Aegean
Verified email at aegean.gr - Homepage
Title
Cited by
Cited by
Year
DDoS in the IoT: Mirai and other botnets
C Kolias, G Kambourakis, A Stavrou, J Voas
Computer 50 (7), 80-84, 2017
10432017
Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset
C Kolias, G Kambourakis, A Stavrou, S Gritzalis
IEEE Communications Surveys & Tutorials 18 (1), 184-208, 2015
2422015
Survey of security vulnerabilities in session initiation protocol.
D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ...
IEEE Communications Surveys and Tutorials 8 (1-4), 68-81, 2006
2392006
Swarm intelligence in intrusion detection: A survey
C Kolias, G Kambourakis, M Maragoudakis
computers & security 30 (8), 625-642, 2011
1802011
The mirai botnet and the iot zombie armies
G Kambourakis, C Kolias, A Stavrou
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 267-272, 2017
1172017
Detecting DNS amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
International workshop on critical information infrastructures security, 185-196, 2007
1172007
Introducing touchstroke: keystroke‐based authentication system for smartphones
G Kambourakis, D Damopoulos, D Papamartzivanos, E Pavlidakis
Security and Communication Networks 9 (6), 542-554, 2016
1152016
A critical review of 7 years of Mobile Device Forensics
K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos
Digital Investigation 10 (4), 323-349, 2013
1102013
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
1022012
DNS amplification attack revisited
M Anagnostopoulos, G Kambourakis, P Kopanos, G Louloudakis, ...
Computers & Security 39, 475-485, 2013
972013
SIP Security Mechanisms: A state-of-the-art review
D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ...
Proceedings of the Fifth International Network Conference (INC 2005), 147-155, 2005
892005
A framework for protecting a SIP-based infrastructure against malformed message attacks
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Computer Networks 51 (10), 2580-2593, 2007
862007
A survey on cluster-based group key agreement protocols for WSNs
E Klaoudatou, E Konstantinou, G Kambourakis, S Gritzalis
IEEE Communications surveys & tutorials 13 (3), 429-442, 2010
842010
Advanced SSL/TLS-based authentication for secure WLAN-3G interworking
G Kambourakis, A Rouskas, G Kormentzas, S Gritzalis
IEE Proceedings-Communications 151 (5), 501-506, 2004
772004
A fair solution to dns amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
Second International Workshop on Digital Forensics and Incident Analysis …, 2007
662007
Dendron: Genetic trees driven rule induction for network intrusion detection systems
D Papamartzivanos, FG Mármol, G Kambourakis
Future Generation Computer Systems 79, 558-574, 2018
642018
From keyloggers to touchloggers: Take the rough with the smooth
D Damopoulos, G Kambourakis, S Gritzalis
Computers & security 32, 102-114, 2013
642013
Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks
P Nespoli, D Papamartzivanos, FG Mármol, G Kambourakis
IEEE Communications Surveys & Tutorials 20 (2), 1361-1396, 2017
622017
Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art
G Kambourakis
International Journal of u- and e- Service, Science and Technology 6 (3), 67-84, 2013
612013
Two layer Denial of Service prevention on SIP VoIP infrastructures
S Ehlert, G Zhang, D Geneiatakis, G Kambourakis, T Dagiuklas, J Markl, ...
Computer Communications 31 (10), 2443-2456, 2008
592008
The system can't perform the operation now. Try again later.
Articles 1–20