JOURNAL
Authors | Title | Venue |
A Zacharis, C Patsakis | AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition | International Journal of Information Security |
A. Hernandez-Suarez, G. Sanchez-Perez, L. K. Toscano-Medina, H. Perez-Meana, J. Olivares-Mercado, J. Portillo-Portillo,Gibran Benitez-Garcia,A. L. Sandoval Orozco and L. J. García Villalba | ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning | Sensors (MDPI) |
E. Almaraz Luengo, B. Alaña Olivares, Luis Javier García Villalba and J. Hernandez-Castro |
Further Analysis of the Statistical Independence of the NIST SP 800-22 Randomness Tests | Applied Mathematics and Computation (Elsevier) |
A. G. Silva-Trujillo, M. González González, L. Rocha Pérez and L. J. García Villalba | Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack | Sensors (MDPI) |
Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis | Hello me, meet the real me: Voice synthesis attacks on voice assistants | Computers & Security |
Constantinos Patsakis & Nikolaos Lykousas | Man vs the machine in the struggle for effective text anonymisation in the age of large language models | Nature Scientific Reports |
Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis | The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign | Computers & Security |
Alexandros Zacharis, Vasilios Katos, and Constantinos Patsakis | Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle | International Journal of Information Security |
Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, and Yves LeTraon | Active Code Learning: Benchmarking Sample-Efficient Training of Code Models | IEEE Transactions on Software Engineering |
Ying Yuan, Giovanni Apruzzese, Mauro Conti | Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning | Digital Threats: Research and Practice |
P.L.S. Jayalaxmi , Rahul Saha , Gulshan Kumar, Mamoun Alazabc , Mauro Conti , Xiaochun Cheng | PIGNUS: A Deep Learning model for IDS in industrial internet-of-things | Computers & Security |
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Robson de Oliveira Albuquerque, Gabriela Mayumi Saiki, Sara Santedicola Ribeiro, Ana Lucila Sandoval Orozco, Luis Javier García Villalba | Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications | Results in Engineering |
Pablo López-Aguilar, Edgar Batista,Antoni Martínez-Ballesté, and Agusti Solanas | Information Security and Privacy in Railway Transportation: A Systematic Review | Sensors (MDPI) |
Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas | BENIGREEN: Blockchain-based Energy-Efficient Privacy-Preserving Scheme for Green IoTs | IEEE IoT |
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, Edna Dias Canedo, Fábio Lúcio Lopes de Mendonça, Robson de Oliveira Albuquerque, Ana Lucila Sa | Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review | Sensors (MDPI) |
Qiang Hu; Yuejun Guo; Xiaofei Xie; Maxime Cordy; Lei Ma; Mike Papadakis; Yves Le Traon | Active Code Learning: Benchmarking Sample-Efficient Training of Code Models | IEEE Transactions on Software Engineering |
Qiang Hu; Yuejun Guo; Xiaofei Xie; Maxime Cordy; Lei Ma; Mike Papadakis; Yves Le Traon | Test Optimization in DNN Testing: A Survey | ACM Transactions on Software Engineering and Methodology |
Yuejun Guo, Seifeddine Bettaieb, and Fran Casino | A Comprehensive Analysis on Software Vulnerability Detection Datasets: Trends, Challenges, and Road Ahead | International Journal of Information Security |
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas | Assessing LLMs in malicious code deobfuscation of real-world malware campaigns | Expert Systems with Applications |
Alexandros Zacharis, Vasilios Katos & Constantinos Patsakis | Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle | International Journal of Information Security |
Ying Yuan, Giovanni Apruzzese, Mauro Conti | Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning | Digital Threats: Research and Practice |
Vouvoutsis, V., Casino, F., & Patsakis, C. | Beyond the sandbox: Leveraging symbolic execution for evasive malware classification | COSE |
Fran Casino, Peio Lopez-Iturri, Constantinos Patsakis | Cloud continuum testbeds and next-generation ICTs: Trends, challenges, and perspectives | Computer Science Review |
Ariadna ClaudiaMoreno, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier García Villalba | Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems | Sensors (MDPI) |
CONFERENCES
Authors | Title | Venue |
A. Zacharis, R. Gavrila, C. Patsakis, D. Ikonomou | AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict | CyCon 2023 |
C. Karapapas, G. C. Polyzos and C. Patsakis | What’s inside a node? Malicious IPFS nodes under the magnifying glass | 38TH INTERNATIONAL CONFERENCE ON ICT SYSTEMS SECURITY AND PRIVACY PROTECTION IFIP SEC 2023 |
P. López-Aguilar, C. Patsakis, A. Solanas | The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review | eCrime2022 |
C.Patsakis, N. Lykousas | Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices | IEEE Euro S&P |
A. Zacharis, R. Gavrila, C. Patsakis | AiCEF: An AI-powered Cyber Exercise Content Generation Framework | BlackHat Asia 2023 |
Y. Guo, Q. Hu, Q. Tang, Y. L. Traon | An Empirical Study of the Imbalance Issue in Software Vulnerability Detection | ESORICS 2023 |
Y. Guo, S. Bettaieb | An Investigation of Quality Issues in Vulnerability Detection Datasets | IEEE Euro S&P |
A. Lotto, V. Singh, B. Ramasubramanian, A. Brighente, M. Conti, R. Poovendran | BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks | 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23) |
T. Bianchi, S. Asokraj, A. Brighente, M. Conti, R. Poovendran | QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer | 2023 IEEE 97th Vehicular Technology Conference: (VTC2023)-Spring |
Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon | MUTEN: Muten-Based Ensembles for Boosting Gradient-Based Adversarial Attack | 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023) |
Nikolaos Lykousas; Vasilios Koutsokostas; Fran Casino; Constantinos Patsakis | The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces | 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE) |
Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang, and Fran Casino | Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection | 29th European Symposium on Research in Computer Security (ESORICS), Bydgoszcz, Poland September 16-20, 2024 |
Wanpeng Li, Yuejun Guo | Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models | ACM SIGSAC Conference on Computer and Communications Security (CCS '24) |
Bruce Azevedo, Robson Albuquerque, Luis Villalba and Luis Hernandez | Method to automate PE32 malware classification using Word2vec and LSTM | JNIC - IX National Conference on Cybersecurity Research |
Nikolaos Lykousas, Vasileios Argyropoulos, Fran Casino | The potential of LLM-generated reports in DevSecOps | International Conference on AI-empowered Software Engineering – AIESE 2024, Formerly Joint Conference on Knowledge-based Software Engineering – JCKBSE 27 – 30 August 2024 Piraeus, Greece |
Bruce Azevedo, Robson Albuquerque, Luis Villalba and Luis Hernandez | Method for identifying buffer overflow in C code using Natural Language Processing Techniques | RECSI - Spanish meeting on cryptology and information security |
Rahul Saha, Mauro Conti, Archana Chhabra | PITCOR: Privacy-assured Time-controlled Revocation in Blockchain Transactions | BCCA 2024 |
Gulshan Kumar, Mauro Conti, Tannishtha Devgun | FASALKA: Offloaded Privacy Classification for Blockchain Smart Contracts | BCCA 2024 |