Christos Xenakis
Christos Xenakis
Professor, Department of Digital Systems, University of Piraeus
Verified email at unipi.gr - Homepage
TitleCited byYear
Security in third generation mobile networks
C Xenakis, L Merakos
Computer communications 27 (7), 638-650, 2004
852004
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
C Xenakis, N Laoutaris, L Merakos, I Stavrakakis
Computer Networks 50 (17), 3225-3241, 2006
812006
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
C Xenakis, C Panos, I Stavrakakis
Computers & Security 30 (1), 63-80, 2011
662011
Evaluating the privacy of Android mobile applications under forensic analysis
C Ntantogian, D Apostolopoulos, G Marinakis, C Xenakis
Computers & Security 42, 66-76, 2014
472014
One-pass EAP-AKA authentication in 3G-WLAN integrated networks
C Ntantogian, C Xenakis
Wireless personal communications 48 (4), 569-584, 2009
332009
Discovering authentication credentials in volatile memory of android mobile devices
D Apostolopoulos, G Marinakis, C Ntantogian, C Xenakis
Conference on e-Business, e-Services and e-Society, 178-185, 2013
292013
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks
C Panos, C Ntantogian, S Malliaros, C Xenakis
Computer Networks 113, 94-110, 2017
282017
A novel intrusion detection system for MANETs
C Panos, C Xenakis, I Stavrakakis
2010 International Conference on Security and Cryptography (SECRYPT), 1-10, 2010
262010
On demand network-wide VPN deployment in GPRS
C Xenakis, L Merakos
IEEE network 16 (6), 28-37, 2002
262002
Evaluation of cryptography usage in android applications
A Chatzikonstantinou, C Ntantogian, G Karopoulos, C Xenakis
Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016
222016
A specification-based intrusion detection engine for infrastructure-less networks
C Panos, C Xenakis, P Kotzias, I Stavrakakis
Computer Communications 54, 67-83, 2014
222014
Secure VPN deployment in GPRS mobile network
C Xenakis, E Gazis, L Merakos
Proc. European Wireless, 293-300, 2002
222002
Malicious actions against the GPRS technology
C Xenakis
Journal in Computer Virology 2 (2), 121-133, 2006
212006
A qualitative risk analysis for the GPRS technology
C Xenakis, D Apostolopoulou, A Panou, I Stavrakakis
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
202008
Security Measures and Weaknesses of the GPRS Security Architecture.
C Xenakis
IJ Network Security 6 (2), 158-169, 2008
202008
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
C Xenakis, C Ntantogian
Computers & Security 40, 84-94, 2014
192014
Gaithashing: a two-factor authentication scheme based on gait features
C Ntantogian, S Malliaros, C Xenakis
Computers & Security 52, 17-32, 2015
172015
A generic mechanism for efficient authentication in B3G networks
C Ntantogian, C Xenakis, I Stavrakakis
Computers & Security 29 (4), 460-475, 2010
162010
Attacking the baseband modem of mobile phones to breach the users' privacy and network security
C Xenakis, C Ntantogian
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
152015
IPsec-based end-to-end VPN deployment over UMTS
C Xenakis, L Merakos
Computer Communications 27 (17), 1693-1708, 2004
152004
The system can't perform the operation now. Try again later.
Articles 1–20