The Sphinx enigma in critical VoIP infrastructures: Human or botnet? D Gritzalis, Y Soupionis, V Katos, I Psaroudakis, P Katsaros, A Mentis IISA 2013, 1-6, 2013 | 242 | 2013 |
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony Y Soupionis, D Gritzalis computers & security 29 (5), 603-618, 2010 | 95 | 2010 |
Blockchain performance analysis for supporting cross-border E-government services D Geneiatakis, Y Soupionis, G Steri, I Kounelis, R Neisse, I Nai-Fovino IEEE Transactions on Engineering Management 67 (4), 1310-1322, 2020 | 83 | 2020 |
An adaptive policy-based approach to SPIT management Y Soupionis, S Dritsas, D Gritzalis Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 51 | 2008 |
Blockchain technology applied to energy demand response service tracking and data sharing A Lucas, D Geneiatakis, Y Soupionis, I Nai-Fovino, E Kotsakis Energies 14 (7), 1881, 2021 | 36 | 2021 |
Audio CAPTCHA for SIP-based VoIP Y Soupionis, G Tountas, D Gritzalis IFIP International Information Security Conference, 25-38, 2009 | 36 | 2009 |
A fault diagnosis system for interdependent critical infrastructures based on HMMs S Ntalampiras, Y Soupionis, G Giannopoulos Reliability engineering & System safety 138, 73-81, 2015 | 35 | 2015 |
Aspf: Adaptive anti-spit policy-based framework Y Soupionis, D Gritzalis 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 35 | 2011 |
Spit identification criteria implementation: Effectiveness and lessons learned S Dritsas, Y Soupionis, M Theoharidou, Y Mallios, D Gritzalis Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 30 | 2008 |
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT) D Gritzalis, G Marias, Y Rebahi, Y Soupionis, S Ehlert Journal of Computer Security 19 (5), 835-867, 2011 | 29 | 2011 |
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication Y Soupionis, RA Koutsiamanis, P Efraimidis, D Gritzalis Journal of Computer Security 22 (3), 383-413, 2014 | 25 | 2014 |
A formally verified mechanism for countering SPIT Y Soupionis, S Basagiannis, P Katsaros, D Gritzalis Critical Information Infrastructures Security: 5th International Workshop …, 2011 | 24 | 2011 |
Formal analysis for robust anti-SPIT protection using model checking D Gritzalis, P Katsaros, S Basagiannis, Y Soupionis International Journal of Information Security 11, 121-135, 2012 | 23 | 2012 |
Probabilistic model checking of CAPTCHA admission control for DoS resistant anti-SPIT protection E Stachtiari, Y Soupionis, P Katsaros, A Mentis, D Gritzalis Critical Information Infrastructures Security: 7th International Workshop …, 2013 | 21 | 2013 |
Faults and cyber attacks detection in critical infrastructures Y Soupionis, S Ntalampiras, G Giannopoulos Critical Information Infrastructures Security: 9th International Conference …, 2016 | 18 | 2016 |
Cyber-physical testbed—The impact of cyber attacks and the human factor Y Soupionis, T Benoist 2015 10th International Conference for Internet Technology and Secured …, 2015 | 17 | 2015 |
SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues GF Marias, L Mitrou, M Theoharidou, J Soupionis, S Ehlert, D Gritzalis | 10 | 2009 |
A DSM test case applied on an end-to-end system, from consumer to energy provider N Andreadou, Y Soupionis, F Bonavitacola, G Prettico Sustainability 10 (4), 935, 2018 | 7 | 2018 |
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment A Tasidou, PS Efraimidis, Y Soupionis, L Mitrou, V Katos Information & Computer Security 24 (1), 2-19, 2016 | 7 | 2016 |
Cyber security impact on power grid including nuclear plant Y Soupionis, R Piccinelli, T Benoist 2016 Federated Conference on Computer Science and Information Systems …, 2016 | 6 | 2016 |