Georgios Karopoulos
Cited by
Cited by
Demystifying COVID‐19 digital contact tracing: A survey on frameworks and mobile apps
T Martin, G Karopoulos, JL HernŠndez-Ramos, G Kambourakis, ...
Wireless Communications and Mobile Computing 2020 (1), 8851429, 2020
Evaluation of cryptography usage in android applications
A Chatzikonstantinou, C Ntantogian, G Karopoulos, C Xenakis
EAI Endorsed Transactions on Security and Safety 3 (9), 83-90, 2016
Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation
JL HernŠndez-Ramos, G Karopoulos, D Geneiatakis, T Martin, ...
Wireless Communications and Mobile Computing 2021 (1), 2427896, 2021
Demystifying in-vehicle intrusion detection systems: A survey of surveys and a meta-taxonomy
G Karopoulos, G Kambourakis, E Chatzoglou, JL HernŠndez-Ramos, ...
Electronics 11 (7), 1072, 2022
A framework for identity privacy in SIP
G Karopoulos, G Kambourakis, S Gritzalis, E Konstantinou
Journal of Network and Computer Applications 33 (1), 16-28, 2010
A survey on digital certificates approaches for the COVID-19 pandemic
G Karopoulos, JL Hernandez-Ramos, V Kouliaridis, G Kambourakis
IEEE Access 9, 138003-138025, 2021
A state-of-the-art review on the security of mainstream IoT wireless PAN protocol stacks
G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos, GM Makrakis, ...
Symmetry 12 (4), 579, 2020
PrivaSIP: Ad-hoc identity privacy in SIP
G Karopoulos, G Kambourakis, S Gritzalis
Computer Standards & Interfaces 33 (3), 301-314, 2011
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks
G Karopoulos, G Kambourakis, S Gritzalis
IEEE Communications Surveys & Tutorials 9 (3), 18-28, 2007
Blockchain in energy communities
K Ioannis, G Raimondo, G Dimitrios, DG Rosanna, K Georgios, S Gary, ...
Centro Comum de InvestigaÁ„o da Comiss„o Europeia 344003, 62, 2017
Data fusion-base anomay detection in networked critical infrastructures
B Genge, C Siaterlis, G Karopoulos
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks†…, 2013
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem
G Karopoulos, C Ntantogian, C Xenakis
Computers & Security 73, 307-325, 2018
Transforming malicious code to ROP gadgets for antivirus evasion
C Ntantogian, G Poulios, G Karopoulos, C Xenakis
IET Information Security 13 (6), 570-578, 2019
Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study
E Chatzoglou, V Kouliaridis, G Karopoulos, G Kambourakis
International Journal of Information Security 22 (2), 347-365, 2023
Self-organised key management for the smart grid
FF Demertzis, G Karopoulos, C Xenakis, A Colarieti
Ad-hoc, Mobile, and Wireless Networks: 14th International Conference, ADHOC†…, 2015
Usage control in SIP-based multimedia delivery
G Karopoulos, P Mori, F Martinelli
Computers & security 39, 406-418, 2013
A survey of voice and communication protection solutions against wiretapping
C Ntantogian, E Veroni, G Karopoulos, C Xenakis
Computers & Electrical Engineering 77, 163-178, 2019
Complete SIP message obfuscation: PrivaSIP over Tor
G Karopoulos, A Fakis, G Kambourakis
2014 Ninth International Conference on Availability, Reliability and†…, 2014
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset
E Chatzoglou, V Kouliaridis, G Kambourakis, G Karopoulos, S Gritzalis
Computers & Security 125, 103051, 2023
Encrypted DNS: The good, the bad and the moot
G Kambourakis, G Karopoulos
Computer Fraud & Security 2022 (5), 2022
The system can't perform the operation now. Try again later.
Articles 1–20