Match!
Georgios Kambourakis
University of the Aegean
129Publications
22H-index
1,651Citations
Publications 129
Newest
Social networks are a primary source of news and information that can be steered, distorted, and influenced. Recent scandals such as the one involving Cambridge Analytics proved that social media users are prone to such direct manipulation. Among the weapons available to perform these anti-democracy attacks, Social Bots are beyond question the most powerful one. These autonomous entities constitute coordinated armies that sneakily manipulate and deceive real users. Thus, our research identifies ...
#1Dimitrios Damopoulos (Stevens Institute of Technology)H-Index: 10
#2Georgios Kambourakis (University of the Aegean)H-Index: 22
Abstract This paper investigates whether glass wearable devices can be used to authenticate end-users, both to grant access (one-time) and to maintain access (continuous), in a hands-free way. We do so by designing and implementing Gauth , a system that enables users to authenticate with a service simply by issuing a voice command, while facing the computer terminal they are going to use to access the service. To achieve this goal, we create a physical communication channel from the terminal to ...
#1Filippos Giannakas (University of the Aegean)H-Index: 2
#2Andreas Papasalouros (University of the Aegean)H-Index: 9
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 29
view all 4 authors...
ABSTRACTFor elementary students, security and privacy education is anticipated to be more joyful when the knowledge is delivered in the form of a digital game-based learning activity. This paper de...
#1Constantinos Kolias (UIdaho: University of Idaho)
#2Weizhi Meng (DTU: Technical University of Denmark)H-Index: 11
Last.Jiageng Chen (CCNU: Central China Normal University)
view all 4 authors...
#1Zisis Tsiatsikas (University of the Aegean)H-Index: 3
#2Georgios Kambourakis (University of the Aegean)H-Index: 22
Last.HuaWang (VU: Victoria University, Australia)H-Index: 29
view all 4 authors...
VoIP services, in general, and session initiation protocol (SIP) ones, in particular, continue to grow at a fast pace and have already become a key component of next-generation networks. Despite this proliferation, SIP-based services expose a large attack surface for perpetrators, especially those who seek to cause denial of service (DoS). While so far, a plethora of works in the literature have been devoted to the detection of DoS attacks in SIP ecosystems, the focus is on those which exploit S...
The intrusion detection systems (IDSs) are essential elements when it comes to the protection of an ICT infrastructure. A misuse IDS is a stable method that can achieve high attack detection rates (ADR) while keeping false alarm rates under acceptable levels. However, the misuse IDSs suffer from the lack of agility, as they are unqualified to adapt to new and “unknown” environments. That is, such an IDS puts the security administrator into an intensive engineering task for keeping the IDS up-to-...
#2Konstantia Barmpatsalou (University of the Aegean)H-Index: 1
Last.Guojun WangH-Index: 1
view all 4 authors...
Smartphones are pervasively used in many everyday life extents, and have been both targets and victims of malware. While there are many anti-malware applications available in mobile markets, so far there are no public services that collect mobile usage data, so as to observe malware effects on mobile devices. The main contribution of this paper is the Mal-warehouse, an open-source tool performing data collectionas-a-service for Android malware behavioral patterns. During its initial development ...
#1Jeffrey M. Voas (NIST: National Institute of Standards and Technology)H-Index: 11
#2Richard Kuhn (NIST: National Institute of Standards and Technology)H-Index: 14
Last.Georgios Kambourakis (University of the Aegean)H-Index: 22
view all 5 authors...
Will our smart devices betray us? Can we trust our smart beds, pet feeders, and watches to maintain the level of privacy we want and expect? As the numbers of devices coming online reach staggering levels, serious questions must be raised about the level of cybertrust we can reasonably expect to have in our modern lifestyle.
#1Filippos Giannakas (University of the Aegean)H-Index: 2
#2Georgios Kambourakis (University of the Aegean)H-Index: 22
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 29
view all 4 authors...
With the increasing popularity of smartphones and tablets, game-based learning (GBL) is undergoing a rapid shift to mobile platforms. This transformation is driven by mobility, wireless interfaces, and built-in sensors that these smart devices offer in order to enable blended and context-sensitive mobile learning (m-Learning) activities. Thus, m-Learning is becoming more independent and ubiquitous (u-Learning). In order to identify and analyze the main trends and the future challenging issues in...
12345678910