Nikolaos Tsalis
Title
Cited by
Cited by
Year
Security Busters: Web browser security vs. rogue sites
N Virvilis, A Mylonas, N Tsalis, D Gritzalis
Computers & Security 52, 90-105, 2015
592015
Mobile devices: A phisher’s paradise
N Virvilis, N Tsalis, A Mylonas, D Gritzalis
11th International Conference on Security and Cryptography (SECRYPT-2014), 2014
512014
In Cloud we Trust: Risk-Assessment-as-a-Service
M Theoharidou, N Tsalis, D Gritzalis
Trust Management VII (7th IFIP International Conference on Trust Management …, 2013
482013
Smart Home Solutions: Privacy Issues
M Theoharidou, N Tsalis, D Gritzalis
Handbook of Smart Homes, Health Care and Well-Being, 1-14, 2014
36*2014
Return on Security Investment for Cloud Platforms
N Tsalis, M Theoharidou, D Gritzalis
Economics of Security in the Cloud Workshop (ESC-2013), 2013
342013
Browser blacklists: the Utopia of phishing protection
N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis
International Conference on E-Business and Telecommunications, 278-293, 2014
272014
Evaluating the manageability of web browsers controls
A Mylonas, N Tsalis, D Gritzalis
9th International Workshop on Security and Trust Management (STM-2013), 2013
272013
An intensive analysis of security and privacy browser add-ons
N Tsalis, A Mylonas, D Gritzalis
10th International Conference on Risks and Security of Internet and Systems …, 2015
252015
Exploring the protection of private browsing in desktop browsers
N Tsalis, A Mylonas, A Nisioti, D Gritzalis, V Katos
Computers & Security 67, 181-197, 2017
132017
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks.
N Tsalis, G Stergiopoulos, E Bitsikas, D Gritzalis, TK Apostolopoulos
ICETE (2), 219-229, 2018
32018
Using side channel TCP features for real-time detection of malware connections
G Stergiopoulos, G Chronopoulou, E Bitsikas, N Tsalis, D Gritzalis
Journal of Computer Security, 1-14, 2019
12019
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
N Tsalis, D Gritzalis
Computers & Security 55, 113, 2015
2015
Securing Cloud and Mobility: A Practitioner's Guide, I. Lim, E. Coleen Coolidge, P. Hourani, Auerbach Publications, USA (2013)
N TSALIS, D GRITZALIS
Computers & security 45, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–13