The big four-what we did wrong in advanced persistent threat detection? N Virvilis, D Gritzalis 2013 international conference on availability, reliability and security, 248-254, 2013 | 332 | 2013 |
An insider threat prediction model M Kandias, A Mylonas, N Virvilis, M Theoharidou, D Gritzalis Trust, Privacy and Security in Digital Business: 7th International …, 2010 | 260 | 2010 |
The insider threat in cloud computing M Kandias, N Virvilis, D Gritzalis International Workshop on Critical Information Infrastructures Security, 93-103, 2011 | 232 | 2011 |
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? N Virvilis, D Gritzalis, T Apostolopoulos 2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013 | 192 | 2013 |
Changing the game: The art of deceiving sophisticated attackers N Virvilis, B Vanautgaerden, OS Serrano 2014 6th International Conference On Cyber Conflict (CyCon 2014), 87-97, 2014 | 93 | 2014 |
Security Busters: Web browser security vs. rogue sites N Virvilis, A Mylonas, N Tsalis, D Gritzalis Computers & Security 52, 90-105, 2015 | 85 | 2015 |
Mobile devices: A phisher's paradise N Virvilis, N Tsalis, A Mylonas, D Gritzalis 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-9, 2014 | 73 | 2014 |
Browser blacklists: the Utopia of phishing protection N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis E-Business and Telecommunications: 11th International Joint Conference …, 2015 | 50 | 2015 |
Secure cloud storage: Available infrastructures and architectures review and evaluation N Virvilis, S Dritsas, D Gritzalis Trust, Privacy and Security in Digital Business: 8th International …, 2011 | 42 | 2011 |
A cloud provider-agnostic secure storage protocol N Virvilis, S Dritsas, D Gritzalis Critical Information Infrastructures Security: 5th International Workshop …, 2011 | 32 | 2011 |
Big data analytics for sophisticated attack detection N Virvilis, O Serrano, L Dandurand Isaca Journal 3, 22-25, 2014 | 23 | 2014 |
The Big Four-What we did wrong in protecting critical ICT infrastructures from Advanced Persistent Threat detection? N Virvilis, D Gritzalis Proc. of the 8th International Conference on Availability, Reliability …, 0 | 10 | |
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks, M. Mohammed, ASK Pathan, Auerbach Publications, USA (2013) N Virvilis, D Gritzalis Computers & security 42, 191-192, 2014 | 3 | 2014 |
Advanced Persistent Threats: The Empire Strikes Back N Virvilis | 1 | 2015 |
Fighting an unfair battle: Unconventional defences against sophisticated threats N Virvilis | | 2015 |
Changing the game: The art of deception against sophisticated attackers N Virvilis, O Serrano | | |
A “human-or-bot” authentication means for VoIP systems in the AmI context N Virvilis, A Mylonas, Y Soupionis, D Gritzalis | | |