From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods A Nisioti, A Mylonas, PD Yoo, V Katos IEEE Communications Surveys & Tutorials 20 (4), 3369-3388, 2018 | 232 | 2018 |
Data-driven decision support for optimizing cyber forensic investigations A Nisioti, G Loukas, A Laszka, E Panaousis IEEE Transactions on Information Forensics and Security 16, 2397-2412, 2021 | 49 | 2021 |
Exploring the protection of private browsing in desktop browsers N Tsalis, A Mylonas, A Nisioti, D Gritzalis, V Katos Computers & Security 67, 181-197, 2017 | 38 | 2017 |
Towards a multi-layered phishing detection K Rendall, A Nisioti, A Mylonas Sensors 20 (16), 4540, 2020 | 29 | 2020 |
Game-theoretic decision support for cyber forensic investigations A Nisioti, G Loukas, S Rass, E Panaousis Sensors 21 (16), 5300, 2021 | 21 | 2021 |
You can run but you cannot hide from memory: Extracting IM evidence of Android apps A Nisioti, A Mylonas, V Katos, PD Yoo, A Chryssanthou 2017 IEEE Symposium on Computers and Communications (ISCC), 457-464, 2017 | 11 | 2017 |
Forensics for multi-stage cyber incidents: Survey and future directions A Nisioti, G Loukas, A Mylonas, E Panaousis Forensic Science International: Digital Investigation 44, 301480, 2023 | 6 | 2023 |
TRAWL: Protection against rogue sites for the masses A Nisioti, M Heydari, A Mylonas, V Katos, VHF Tafreshi 2017 11th International Conference on Research Challenges in Information …, 2017 | 4 | 2017 |