Nikos Vrakas
Title
Cited by
Cited by
Year
Utilizing bloom filters for detecting flooding attacks against SIP based services
D Geneiatakis, N Vrakas, C Lambrinoudakis
computers & security 28 (7), 578-591, 2009
742009
Privacy requirements engineering for trustworthy e-government services
N Vrakas, C Kalloniatis, A Tsohou, C Lambrinoudakis
International Conference on Trust and Trustworthy Computing, 298-307, 2010
112010
It's All in the Cloud: Reviewing Cloud Security
N Pitropakis, E Darra, N Vrakas, C Lambrinoudakis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and…, 2013
92013
An intrusion detection and prevention system for IMS and VoIP services
N Vrakas, C Lambrinoudakis
International Journal of Information Security 12 (3), 201-217, 2013
92013
Evaluating the security and privacy protection level of IP multimedia subsystem environments
N Vrakas, D Geneiatakis, C Lambrinoudakis
IEEE communications surveys & tutorials 15 (2), 803-819, 2012
92012
Performance evaluation of a flooding detection mechanism for voip networks
D Geneiatakis, N Vrakas, C Lambrinoudakis
2009 16th International Conference on Systems, Signals and Image Processing, 1-5, 2009
92009
Obscuring users' identity in VoIP/IMS environments
N Vrakas, D Geneiatakis, C Lambrinoudakis
Computers & security 43, 145-158, 2014
72014
A call conference room interception attack and its detection
N Vrakas, D Geneiatakis, C Lambrinoudakis
International Conference on Trust, Privacy and Security in Digital Business…, 2010
52010
On the internal workings of botnets: A review
EC Ogu, N Vrakas, O Chiemela, BM Ajose-Ismail
International Journal of Computer Applications 138 (4), 39-43, 2016
32016
Is IP Multimedia Subsystem affected by malformed message attacks? - An evaluation of OpenIMS
N Vrakas, D Geneiatakis, C Lambrinoudakis
Security and Cryptography (SECRYPT), 2011 Proceedings of the International…, 2011
32011
Vertical industries requirements analysis & targeted kpis for advanced 5g trials
T Doukoglou, V Gezerlis, K Trichias, N Kostopoulos, N Vrakas, ...
2019 European Conference on Networks and Communications (EuCNC), 95-100, 2019
22019
A cross layer spoofing detection mechanism for multimedia communication services
N Vrakas, C Lambrinoudakis
Systems Approach Applications for Developments in Information Technology…, 2012
12012
Enhancing security and privacy in VoIP/IMS environments
N Vrakas
. , 2013
2013
IS IP MULTIMEDIA SUBSYSTEM AFFECTED BY MALFORMED MESSAGEATTACKS?
N Vrakas, D Geneiatakis, C Lambrinoudakis
2011
On the Internal Workings of Botnets: A Review
N Vrakas, O Chiemela, B Ajose-Ismail
International Journal of Computer Applications 975, 8887, 0
Auxiliary reviewers
F Aivaloglou, H Bahsi, J Blocki, N Cao, D Garg, V Iovino, J Jin, ...
D. Gritzalis and S. Furnell 491 Information security policy: An organizational-level process model KJ Knapp, R. Franklin Morris Jr
TE Marshall, TA Byrd, S Kraemer, P Carayon, J Clem, H Chivers, JA Clark, ...
The system can't perform the operation now. Try again later.
Articles 1–17