Introducing touchstroke: keystroke‐based authentication system for smartphones G Kambourakis, D Damopoulos, D Papamartzivanos, E Pavlidakis Security and Communication Networks 9 (6), 542-554, 2016 | 146 | 2016 |
A critical review of 7 years of Mobile Device Forensics K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos Digital Investigation 10 (4), 323-349, 2013 | 143 | 2013 |
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ... Security and Communication Networks 5 (1), 3-14, 2012 | 120 | 2012 |
From keyloggers to touchloggers: Take the rough with the smooth D Damopoulos, G Kambourakis, S Gritzalis Computers & security 32, 102-114, 2013 | 75 | 2013 |
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones D Damopoulos, G Kambourakis, G Portokalidis Proceedings of the seventh european workshop on system security, 1-6, 2014 | 65 | 2014 |
iSAM: an iPhone stealth airborne malware D Damopoulos, G Kambourakis, S Gritzalis Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011 | 50 | 2011 |
A cloud-based architecture to crowdsource mobile app privacy leaks D Papamartzivanos, D Damopoulos, G Kambourakis Proceedings of the 18th panhellenic conference on informatics, 1-6, 2014 | 46 | 2014 |
Location-enhanced authentication using the IoT: Because you cannot be in two places at once I Agadakos, P Hallgren, D Damopoulos, A Sabelfeld, G Portokalidis Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 44 | 2016 |
Exposing mobile malware from the inside (or what is your mobile app really doing?) D Damopoulos, G Kambourakis, S Gritzalis, SO Park Peer-to-Peer Networking and Applications 7, 687-697, 2014 | 39 | 2014 |
User privacy and modern mobile services: are they on the same path? D Damopoulos, G Kambourakis, M Anagnostopoulos, S Gritzalis, JH Park Personal and ubiquitous computing 17, 1437-1448, 2013 | 39 | 2013 |
MILC: A secure and privacy-preserving mobile instant locator with chatting A Loukas, D Damopoulos, SA Menesidou, ME Skarkala, G Kambourakis, ... Information Systems Frontiers 14, 481-497, 2012 | 30 | 2012 |
Hands-Free one-Time and continuous authentication using glass wearable devices D Damopoulos, G Kambourakis Journal of Information Security and Applications 46, 138-150, 2019 | 21 | 2019 |
The convergence of artificial intelligence and blockchain: the state of play and the road ahead D Bhumichai, C Smiliotopoulos, R Benton, G Kambourakis, ... Information 15 (5), 268, 2024 | 19 | 2024 |
Let’s Meet! A participatory-based discovery and rendezvous mobile marketing framework L Ntalkos, G Kambourakis, D Damopoulos Telematics and Informatics 32 (4), 539-563, 2015 | 15 | 2015 |
A competent post-authentication and non-repudiation biometric-based scheme for m-learning G Kambourakis, D Damopoulos Proceedings of the 10th IASTED International Conference on Web-based …, 2013 | 14 | 2013 |
Europe in the shadow of financial crisis: Policy Making via Stance Classification L Spiliotopoulou, D Damopoulos, Y Charalabidis, M Maragoudakis, ... | 6 | 2017 |
User-privacy and modern smartphones: A Siri(ous) dilemma D Damopoulos, G Kambourakis, M Anagnostopoulos, S Gritzalis, JH Park FTRA AIM 2012 International Conference on Advanced IT, 2012 | 5* | 2012 |
Intrusion detection and prevention for mobile ecosystems G Kambourakis, A Shabtai, C Kolias, D Damopoulos CRC Press, 2017 | 4 | 2017 |
From fuzziness to criminal investigation: An inference system for Mobile Forensics K Barmpatsalou, T Cruz, E Monteiro, P Simoes, G Kambourakis, ... Intrusion Detection and Prevention for Mobile Ecosystems, 117-134, 2017 | 3 | 2017 |
Wysisnwiv: What you scan is not what i visit Q Yang, D Damopoulos, G Portokalidis Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015 | 3 | 2015 |