Yannis Soupionis
Cited by
Cited by
The Sphinx enigma in critical VoIP infrastructures: Human or botnet?
D Gritzalis, Y Soupionis, V Katos, I Psaroudakis, P Katsaros, A Mentis
IISA 2013, 1-6, 2013
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony
Y Soupionis, D Gritzalis
computers & security 29 (5), 603-618, 2010
An adaptive policy-based approach to SPIT management
Y Soupionis, S Dritsas, D Gritzalis
European Symposium on Research in Computer Security, 446-460, 2008
Audio CAPTCHA for SIP-based VoIP
Y Soupionis, G Tountas, D Gritzalis
IFIP International Information Security Conference, 25-38, 2009
Aspf: Adaptive anti-spit policy-based framework
Y Soupionis, D Gritzalis
2011 Sixth International Conference on Availability, Reliability and …, 2011
Spit identification criteria implementation: Effectiveness and lessons learned
S Dritsas, Y Soupionis, M Theoharidou, Y Mallios, D Gritzalis
IFIP International Information Security Conference, 381-395, 2008
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT)
D Gritzalis, G Marias, Y Rebahi, Y Soupionis, S Ehlert
Journal of Computer Security 19 (5), 835-867, 2011
Formal analysis for robust anti-SPIT protection using model checking
D Gritzalis, P Katsaros, S Basagiannis, Y Soupionis
International Journal of Information Security 11 (2), 121-135, 2012
A formally verified mechanism for countering SPIT
Y Soupionis, S Basagiannis, P Katsaros, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 128-139, 2010
A fault diagnosis system for interdependent critical infrastructures based on HMMs
S Ntalampiras, Y Soupionis, G Giannopoulos
Reliability Engineering & System Safety 138, 73-81, 2015
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication
Y Soupionis, RA Koutsiamanis, P Efraimidis, D Gritzalis
Journal of Computer Security 22 (3), 383-413, 2014
Probabilistic model checking of CAPTCHA admission control for DoS resistant anti-SPIT protection
E Stachtiari, Y Soupionis, P Katsaros, A Mentis, D Gritzalis
Critical Information Infrastructures Security, 143-154, 2013
Faults and cyber attacks detection in critical infrastructures
Y Soupionis, S Ntalampiras, G Giannopoulos
International Conference on Critical Information Infrastructures Security …, 2014
A DSM test case applied on an end-to-end system, from consumer to energy provider
N Andreadou, Y Soupionis, F Bonavitacola, G Prettico
Sustainability 10 (4), 935, 2018
Cyber-physical testbed—The impact of cyber attacks and the human factor
Y Soupionis, T Benoist
2015 10th International Conference for Internet Technology and Secured …, 2015
SIP vulnerabilities for SPIT, SPIT identification criteria and anti-SPIT mechanisms evaluation framework
G Marias, M Theocharidou, Y Soupionis, S Ehlert, D Gritzalis
IP Handbook: Services, Technologies, and Security of Session Initiation …, 0
User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges.
A Tasidou, PS Efraimidis, Y Soupionis, L Mitrou, V Katos
HAISA, 139-149, 2012
A generic Grid security policy reconciliation framework
L Gymnopoulos, V Tsoumas, I Soupionis, S Gritzalis
Internet Research, 2005
Privacy-preserving, user-centric VoIP CAPTCHA challenges
A Tasidou, PS Efraimidis, Y Soupionis, L Mitrou, V Katos
Information & Computer Security, 2016
Gaussian Mixture Modeling for Detecting Integrity Attacks in Smart Grids
S Ntalampiras, Y Soupionis
Electronics 5 (4), 82, 2016
The system can't perform the operation now. Try again later.
Articles 1–20