Christos Ilioudis
Christos Ilioudis
Professor in Internet Security, International Hellenic University - Greece
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα - Αρχική σελίδα
Παρατίθεται από
Παρατίθεται από
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem.
K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou
ICETE (2), 738-743, 2018
ADvoCATE: a consent management platform for personal data processing in the IoT using blockchain technology
K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou, A Kritsas
International Conference on Security for Information Technology and …, 2018
The importance of corporate forensic readiness in the information security framework
G Pangalos, C Ilioudis, I Pagkalos
2010 19th IEEE International Workshops on Enabling Technologies …, 2010
Insider threats in corporate environments: a case study for data leakage prevention
V Stamati-Koromina, C Ilioudis, R Overill, CK Georgiadis, D Stamatis
Proceedings of the Fifth Balkan Conference in Informatics, 271-274, 2012
A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet
C Ilioudis, G Pangalos
Journal of Medical Internet Research 3 (2), e14, 2001
Developing a Public Key Infrastructure for a secure regional e-Health environment
G Pangalos, I Mavridis, C Ilioudis, C Georgiadis
Methods of information in medicine 41 (05), 414-418, 2002
Real-time network data analysis using time series models
T Vafeiadis, A Papanikolaou, C Ilioudis, S Charchalakis
Simulation Modelling Practice and Theory 29, 173-180, 2012
A quantitative evaluation of trust in the quality of cyber threat intelligence sources
T Schaberreiter, V Kupfersberger, K Rantos, A Spyros, A Papanikolaou, ...
Proceedings of the 14th International Conference on Availability …, 2019
Interoperability challenges in the cybersecurity information sharing ecosystem
K Rantos, A Spyros, A Papanikolaou, A Kritsas, C Ilioudis, V Katos
Computers 9 (1), 18, 2020
Actionable threat intelligence for digital forensics readiness
N Serketzis, V Katos, C Ilioudis, D Baltatzis, GJ Pangalos
Information & Computer Security, 2019
A Hacker's Perspective on Educating Future Security Experts
A Papanikolaou, V Karakoidas, V Vlachos, A Venieris, C Ilioudis, ...
2011 15th Panhellenic Conference on Informatics, 68-72, 2011
A framework for teaching network security in academic environments
A Papanikolaou, V Vlachos, A Venieris, C Ilioudis, K Papapanagiotou, ...
Information Management & Computer Security, 2013
Improving forensic triage efficiency through cyber threat intelligence
N Serketzis, V Katos, C Ilioudis, D Baltatzis, G Pangalos
Future Internet 11 (7), 162, 2019
Detecting and manipulating compressed alternate data streams in a forensics investigation
AI Martini, A Zaharis, C Ilioudis
2008 Third International Annual Workshop on Digital Forensics and Incident …, 2008
A blockchain-based platform for consent management of personal data processing in the IoT ecosystem
K Rantos, G Drosatos, A Kritsas, C Ilioudis, A Papanikolaou, AP Filippidis
Security and Communication Networks 2019, 2019
Lightweight steganalysis based on image reconstruction and lead digit distribution analysis
A Zaharis, A Martini, T Tryfonas, C Ilioudis, G Pangalos
International Journal of Digital Crime and Forensics (IJDCF) 3 (4), 29-41, 2011
Measuring the Internet's threat level: A global-local approach
S Kollias, V Vlachos, A Papanikolaou, P Chatzimisios, C Ilioudis, ...
2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014
Analyzing the selection and dynamic composition of web services in e-commerce transactions
N Vesyropoulos, CK Georgiadis, C Ilioudis
Proceedings of the Fifth Balkan Conference in Informatics, 130-135, 2012
On the evolution of malware species
V Vlachos, C Ilioudis, A Papanikolaou
Global Security, Safety and Sustainability & e-Democracy, 54-61, 2011
The importance of biometric sensor continuous secure monitoring
A Papanikolaou, C Ilioudis, CK Georgiadis, E Pimenidis
2008 Third International Conference on Digital Information Management, 569-574, 2008
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20