JOURNAL
Authors | Title | Venue |
A Zacharis, C Patsakis | AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition | International Journal of Information Security |
A. Hernandez-Suarez, G. Sanchez-Perez, L. K. Toscano-Medina, H. Perez-Meana, J. Olivares-Mercado, J. Portillo-Portillo,Gibran Benitez-Garcia,A. L. Sandoval Orozco and L. J. García Villalba | ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning | Sensors (MDPI) |
E. Almaraz Luengo, B. Alaña Olivares, Luis Javier García Villalba and J. Hernandez-Castro |
Further Analysis of the Statistical Independence of the NIST SP 800-22 Randomness Tests | Applied Mathematics and Computation (Elsevier) |
A. G. Silva-Trujillo, M. González González, L. Rocha Pérez and L. J. García Villalba | Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack | Sensors (MDPI) |
Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis | Hello me, meet the real me: Voice synthesis attacks on voice assistants | Computers & Security |
Constantinos Patsakis & Nikolaos Lykousas | Man vs the machine in the struggle for effective text anonymisation in the age of large language models | Nature Scientific Reports |
Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis | The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign | Computers & Security |
Alexandros Zacharis, Vasilios Katos, and Constantinos Patsakis | Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle | International Journal of Information Security |
Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, and Yves LeTraon | Active Code Learning: Benchmarking Sample-Efficient Training of Code Models | IEEE Transactions on Software Engineering |
Ying Yuan, Giovanni Apruzzese, Mauro Conti | Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning | Digital Threats: Research and Practice |
P.L.S. Jayalaxmi , Rahul Saha , Gulshan Kumar, Mamoun Alazabc , Mauro Conti , Xiaochun Cheng | PIGNUS: A Deep Learning model for IDS in industrial internet-of-things | Computers & Security |
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Robson de Oliveira Albuquerque, Gabriela Mayumi Saiki, Sara Santedicola Ribeiro, Ana Lucila Sandoval Orozco, Luis Javier García Villalba | Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications | Results in Engineering |
Pablo López-Aguilar, Edgar Batista,Antoni Martínez-Ballesté, and Agusti Solanas | Information Security and Privacy in Railway Transportation: A Systematic Review | Sensors (MDPI) |
Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas | BENIGREEN: Blockchain-based Energy-Efficient Privacy-Preserving Scheme for Green IoTs | IEEE IoT |
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, Edna Dias Canedo, Fábio Lúcio Lopes de Mendonça, Robson de Oliveira Albuquerque, Ana Lucila Sa | Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review | Sensors (MDPI) |
CONFERENCES
Authors | Title | Venue |
A. Zacharis, R. Gavrila, C. Patsakis, D. Ikonomou | AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict | CyCon 2023 |
C. Karapapas, G. C. Polyzos and C. Patsakis | What’s inside a node? Malicious IPFS nodes under the magnifying glass | 38TH INTERNATIONAL CONFERENCE ON ICT SYSTEMS SECURITY AND PRIVACY PROTECTION IFIP SEC 2023 |
P. López-Aguilar, C. Patsakis, A. Solanas | The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review | eCrime2022 |
C.Patsakis, N. Lykousas | Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices | IEEE Euro S&P |
A. Zacharis, R. Gavrila, C. Patsakis | AiCEF: An AI-powered Cyber Exercise Content Generation Framework | BlackHat Asia 2023 |
Y. Guo, Q. Hu, Q. Tang, Y. L. Traon | An Empirical Study of the Imbalance Issue in Software Vulnerability Detection | ESORICS 2023 |
Y. Guo, S. Bettaieb | An Investigation of Quality Issues in Vulnerability Detection Datasets | IEEE Euro S&P |
A. Lotto, V. Singh, B. Ramasubramanian, A. Brighente, M. Conti, R. Poovendran | BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks | 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23) |
T. Bianchi, S. Asokraj, A. Brighente, M. Conti, R. Poovendran | QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer | 2023 IEEE 97th Vehicular Technology Conference: (VTC2023)-Spring |
Nikolaos Lykousas; Vasilios Koutsokostas; Fran Casino; Constantinos Patsakis | The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces | 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE) |