What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
George Spanoudakis
Google Scholar
9
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/csr2
Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction of Cyber Threat Intelligence from Online Sources.
Rafail A. Ellinitakis
Konstantinos Fysarakis
Panagiotis Bountakas
George Spanoudakis
2023
conf/csr2
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
Konstantinos Fysarakis
Alexios Lekidis
Vasileios Mavroeidis
Konstantinos Lampropoulos
George L. Lyberopoulos
Ignasi Garcia-Milà Vidal
José Carles Terés i Casals
Eva Rodriguez Luna
Alejandro Antonio Moreno Sancho
Antonios Mavrelos
Marinos Tsantekidis
Sebastian Pape
Argyro Chatzopoulou
Christina Nanou
George Drivas
Vangelis Photiou
George Spanoudakis
Odysseas G. Koufopavlou
2023
conf/csr2
Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain.
George Hatzivasilis
Sotiris Ioannidis
Grigoris Kalogiannis
Manolis Chatzimpyrros
George Spanoudakis
Guillermo Jiménez Prieto
Araceli Rojas Morgan
Miguel Juaniz Lopez
Cataldo Basile
José Francisco Ruiz
2021
conf/csr2
The THREAT-ARREST Cyber Range Platform.
George Hatzivasilis
Sotiris Ioannidis
Michail Smyrlis
George Spanoudakis
Fulvio Frati
Chiara Braghin
Ernesto Damiani
Hristo Koshutanski
George Tsakirakis
Torsten Hildebrandt
Ludger Goeke
Sebastian Pape
Oleg Blinder
Michael Vinov
George Leftheriotis
Martin Kunc
Fotis Oikonomou
Giovanni Magilo
Vito Petrarolo
Antonio Chieti
Robert Bordianu
2019
conf/esorics
The THREAT-ARREST Cyber-Security Training Platform.
Othonas Soultatos
Konstantinos Fysarakis
George Spanoudakis
Hristo Koshutanski
Ernesto Damiani
Kristian Beckers
Dirk Wortmann
George Bravos
Menelaos Ioannidis
2019
conf/esorics
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective.
Iason Somarakis
Michail Smyrlis
Konstantinos Fysarakis
George Spanoudakis
2019
conf/esorics
Towards the Insurance of Healthcare Systems.
George Hatzivasilis
Panos Chatziadam
Andreas I. Miaoudakis
Eftychia Lakka
Sotiris Ioannidis
Alessia Alessio
Michail Smyrlis
George Spanoudakis
Artsiom Yautsiukhin
Michalis Antoniou
Nikos Stathiakis
2013
journals/compsec
Assessing the genuineness of events in runtime monitoring of cyber systems.
Theocharis Tsigkritis
George Spanoudakis
2013
journals/istr
A lightweight framework for secure life-logging in smart environments.
Nikolaos E. Petroulakis
Elias Z. Tragos
Alexandros G. Fragkiadakis
George Spanoudakis
Coauthors
Alejandro Antonio Moreno Sancho
(1)
Alessia Alessio
(1)
Alexandros G. Fragkiadakis
(1)
Alexios Lekidis
(1)
Andreas I. Miaoudakis
(1)
Antonio Chieti
(1)
Antonios Mavrelos
(1)
Araceli Rojas Morgan
(1)
Argyro Chatzopoulou
(1)
Artsiom Yautsiukhin
(1)
Cataldo Basile
(1)
Chiara Braghin
(1)
Christina Nanou
(1)
Dirk Wortmann
(1)
Eftychia Lakka
(1)
Elias Z. Tragos
(1)
Ernesto Damiani
(2)
Eva Rodriguez Luna
(1)
Fotis Oikonomou
(1)
Fulvio Frati
(1)
George Bravos
(1)
George Drivas
(1)
George Hatzivasilis
(3)
George L. Lyberopoulos
(1)
George Leftheriotis
(1)
George Spanoudakis
(9)
George Tsakirakis
(1)
Giovanni Magilo
(1)
Grigoris Kalogiannis
(1)
Guillermo Jiménez Prieto
(1)
Hristo Koshutanski
(2)
Iason Somarakis
(1)
Ignasi Garcia-Milà Vidal
(1)
José Carles Terés i Casals
(1)
José Francisco Ruiz
(1)
Konstantinos Fysarakis
(4)
Konstantinos Lampropoulos
(1)
Kristian Beckers
(1)
Ludger Goeke
(1)
Manolis Chatzimpyrros
(1)
Marinos Tsantekidis
(1)
Martin Kunc
(1)
Menelaos Ioannidis
(1)
Michael Vinov
(1)
Michail Smyrlis
(3)
Michalis Antoniou
(1)
Miguel Juaniz Lopez
(1)
Nikolaos E. Petroulakis
(1)
Nikos Stathiakis
(1)
Odysseas G. Koufopavlou
(1)
Oleg Blinder
(1)
Othonas Soultatos
(1)
Panagiotis Bountakas
(1)
Panos Chatziadam
(1)
Rafail A. Ellinitakis
(1)
Robert Bordianu
(1)
Sebastian Pape
(2)
Sotiris Ioannidis
(3)
Theocharis Tsigkritis
(1)
Torsten Hildebrandt
(1)
Vangelis Photiou
(1)
Vasileios Mavroeidis
(1)
Vito Petrarolo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to