The Sphinx enigma in critical VoIP infrastructures: Human or botnet? D Gritzalis, Y Soupionis, V Katos, I Psaroudakis, P Katsaros, A Mentis IISA 2013, 1-6, 2013 | 243 | 2013 |
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony Y Soupionis, D Gritzalis Computers & Security 29 (5), 603-618, 2010 | 91 | 2010 |
An adaptive policy-based approach to SPIT management Y Soupionis, S Dritsas, D Gritzalis European Symposium on Research in Computer Security, 446-460, 2008 | 52 | 2008 |
Audio CAPTCHA for SIP-based VoIP Y Soupionis, G Tountas, D Gritzalis IFIP International Information Security Conference, 25-38, 2009 | 36 | 2009 |
Aspf: Adaptive anti-spit policy-based framework Y Soupionis, D Gritzalis 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 34 | 2011 |
Spit identification criteria implementation: Effectiveness and lessons learned S Dritsas, Y Soupionis, M Theoharidou, Y Mallios, D Gritzalis IFIP International Information Security Conference, 381-395, 2008 | 30 | 2008 |
Blockchain performance analysis for supporting cross-border E-government services D Geneiatakis, Y Soupionis, G Steri, I Kounelis, R Neisse, I Nai-Fovino IEEE Transactions on Engineering Management 67 (4), 1310-1322, 2020 | 29 | 2020 |
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT) D Gritzalis, G Marias, Y Rebahi, Y Soupionis, S Ehlert Journal of Computer Security 19 (5), 835-867, 2011 | 28 | 2011 |
A fault diagnosis system for interdependent critical infrastructures based on HMMs S Ntalampiras, Y Soupionis, G Giannopoulos Reliability engineering & System safety 138, 73-81, 2015 | 26 | 2015 |
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication Y Soupionis, RA Koutsiamanis, P Efraimidis, D Gritzalis Journal of Computer Security 22 (3), 383-413, 2014 | 24 | 2014 |
A formally verified mechanism for countering SPIT Y Soupionis, S Basagiannis, P Katsaros, D Gritzalis International Workshop on Critical Information Infrastructures Security, 128-139, 2010 | 24 | 2010 |
Formal analysis for robust anti-SPIT protection using model checking D Gritzalis, P Katsaros, S Basagiannis, Y Soupionis International Journal of Information Security 11 (2), 121-135, 2012 | 23 | 2012 |
Probabilistic model checking of CAPTCHA admission control for DoS resistant anti-SPIT protection E Stachtiari, Y Soupionis, P Katsaros, A Mentis, D Gritzalis Critical Information Infrastructures Security, 143-154, 2013 | 21 | 2013 |
Faults and cyber attacks detection in critical infrastructures Y Soupionis, S Ntalampiras, G Giannopoulos International Conference on Critical Information Infrastructures Security …, 2014 | 16 | 2014 |
Cyber-physical testbed—The impact of cyber attacks and the human factor Y Soupionis, T Benoist 2015 10th International Conference for Internet Technology and Secured …, 2015 | 12 | 2015 |
SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues GF Marias, L Mitrou, M Theoharidou, J Soupionis, S Ehlert, D Gritzalis SIP Handbook: Services, Technologies, and Security of Session Initiation …, 2018 | 10 | 2018 |
A DSM test case applied on an end-to-end system, from consumer to energy provider N Andreadou, Y Soupionis, F Bonavitacola, G Prettico Sustainability 10 (4), 935, 2018 | 6 | 2018 |
User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. A Tasidou, PS Efraimidis, Y Soupionis, L Mitrou, V Katos HAISA, 139-149, 2012 | 6 | 2012 |
A generic Grid security policy reconciliation framework L Gymnopoulos, V Tsoumas, I Soupionis, S Gritzalis Internet Research, 2005 | 6 | 2005 |
Blockchain technology applied to energy demand response service tracking and data sharing A Lucas, D Geneiatakis, Y Soupionis, I Nai-Fovino, E Kotsakis Energies 14 (7), 1881, 2021 | 5 | 2021 |