Slide Background

SCIENTIFIC PUBLICATIONS


JOURNAL

Authors Title Venue
A Zacharis, C Patsakis AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition International Journal of Information Security
A. Hernandez-Suarez, G. Sanchez-Perez, L. K. Toscano-Medina, H. Perez-Meana, J. Olivares-Mercado, J. Portillo-Portillo,Gibran Benitez-Garcia,A. L. Sandoval Orozco and L. J. García Villalba ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning Sensors (MDPI)
E. Almaraz Luengo, B. Alaña Olivares, Luis Javier García Villalba
and J. Hernandez-Castro
Further Analysis of the Statistical Independence of the NIST SP 800-22 Randomness Tests Applied Mathematics and Computation (Elsevier)
A. G. Silva-Trujillo, M. González González, L. Rocha Pérez and L. J. García Villalba Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack Sensors (MDPI)
Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis  Hello me, meet the real me: Voice synthesis attacks on voice assistants Computers & Security
Constantinos Patsakis & Nikolaos Lykousas  Man vs the machine in the struggle for effective text anonymisation in the age of large language models Nature Scientific Reports
Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis  The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign Computers & Security
Alexandros Zacharis, Vasilios Katos, and Constantinos Patsakis Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle International Journal of Information Security
Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, and Yves LeTraon Active Code Learning: Benchmarking Sample-Efficient Training of Code Models IEEE Transactions on Software Engineering
Ying Yuan, Giovanni Apruzzese, Mauro Conti Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning Digital Threats: Research and Practice
P.L.S. Jayalaxmi , Rahul Saha , Gulshan Kumar, Mamoun Alazabc , Mauro Conti , Xiaochun Cheng PIGNUS: A Deep Learning model for IDS in industrial internet-of-things Computers & Security
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Robson de Oliveira Albuquerque, Gabriela Mayumi Saiki, Sara Santedicola Ribeiro, Ana Lucila Sandoval Orozco, Luis Javier García Villalba Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications Results in Engineering
Pablo López-Aguilar, Edgar Batista,Antoni Martínez-Ballesté, and Agusti Solanas Information Security and Privacy in Railway Transportation: A Systematic Review Sensors (MDPI)
Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas BENIGREEN: Blockchain-based Energy-Efficient Privacy-Preserving Scheme for Green IoTs IEEE IoT
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, Edna Dias Canedo, Fábio Lúcio Lopes de Mendonça, Robson de Oliveira Albuquerque, Ana Lucila Sa Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review Sensors (MDPI)

CONFERENCES

Authors Title Venue
A. Zacharis, R. Gavrila, C. Patsakis, D. Ikonomou AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict CyCon 2023
C. Karapapas, G. C. Polyzos and C. Patsakis What’s inside a node? Malicious IPFS nodes under the magnifying glass 38TH INTERNATIONAL CONFERENCE ON ICT SYSTEMS SECURITY AND PRIVACY PROTECTION IFIP SEC 2023
P. López-Aguilar, C. Patsakis, A. Solanas The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review eCrime2022
C.Patsakis, N. Lykousas Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices IEEE Euro S&P
A. Zacharis, R. Gavrila, C. Patsakis AiCEF: An AI-powered Cyber Exercise Content Generation Framework BlackHat Asia 2023
Y. Guo, Q. Hu, Q. Tang, Y. L. Traon An Empirical Study of the Imbalance Issue in Software Vulnerability Detection ESORICS 2023
Y. Guo, S. Bettaieb An Investigation of Quality Issues in Vulnerability Detection Datasets IEEE Euro S&P
A. Lotto, V. Singh, B. Ramasubramanian, A. Brighente, M. Conti, R. Poovendran BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)
T. Bianchi, S. Asokraj, A. Brighente, M. Conti, R. Poovendran QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer 2023 IEEE 97th Vehicular Technology Conference: (VTC2023)-Spring
Nikolaos Lykousas; Vasilios Koutsokostas; Fran Casino; Constantinos Patsakis The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE)