Match!
Georgios Kambourakis
University of the Aegean
The InternetDistributed computingComputer networkComputer securityComputer science
129Publications
24H-index
2,078Citations
What is this?
Publications 131
Newest
#1Alexandros FakisH-Index: 2
Last. Georgios KambourakisH-Index: 24
view all 3 authors...
To establish peer-to-peer connections and achieve real-time web-based communication, the Web Real-Time Communication (WebRTC) framework requires address information of the communicating peers. This means that users behind, say, Network Address Translation (NAT) or firewalls normally rely on the Interactive Connectivity Establishment (ICE) framework for the sake of negotiating information about the connection and media transferring. This typically involves Session Traversal Utilities for NAT (STU...
Source
#2Constantinos KoliasH-Index: 11
Last. Ioannis KounelisH-Index: 7
view all 6 authors...
Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT technologies are also attracting significant attention given the risks that are inherently associated with the respective devices and their numerous applications, ranging from healthcare, smart homes, and cities, to intelligent transportation systems and industrial automation. Considering the still heterogeneous nature of the majority of Io...
Source
#2Konstantia Barmpatsalou (UC: University of Coimbra)H-Index: 3
Last. Shuhong Chen (GU: Guangzhou University)H-Index: 1
view all 4 authors...
1 CitationsSource
Last. Peng Zhou
view all 4 authors...
1 CitationsSource
Social networks are a primary source of news and information that can be steered, distorted, and influenced. Recent scandals such as the one involving Cambridge Analytics proved that social media users are prone to such direct manipulation. Among the weapons available to perform these anti-democracy attacks, Social Bots are beyond question the most powerful one. These autonomous entities constitute coordinated armies that sneakily manipulate and deceive real users. Thus, our research identifies ...
Source
#1Dimitrios Damopoulos (Stevens Institute of Technology)H-Index: 10
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Abstract This paper investigates whether glass wearable devices can be used to authenticate end-users, both to grant access (one-time) and to maintain access (continuous), in a hands-free way. We do so by designing and implementing Gauth, a system that enables users to authenticate with a service simply by issuing a voice command, while facing the computer terminal they are going to use to access the service. To achieve this goal, we create a physical communication channel from the terminal to t...
3 CitationsSource
#1Filippos Giannakas (University of the Aegean)H-Index: 3
#2Andreas Papasalouros (University of the Aegean)H-Index: 10
Last. Stefanos Gritzalis (University of the Aegean)H-Index: 31
view all 4 authors...
ABSTRACTFor elementary students, security and privacy education is anticipated to be more joyful when the knowledge is delivered in the form of a digital game-based learning activity. This paper de...
Source
#1Constantinos Kolias (UIdaho: University of Idaho)
#2Weizhi Meng (DTU: Technical University of Denmark)H-Index: 13
Last. Jiageng Chen (CCNU: Central China Normal University)
view all 4 authors...
Source
#1Dimitrios Papamartzivanos (University of the Aegean)H-Index: 5
#2Félix Gómez Mármol (University of Murcia)H-Index: 16
Last. Georgios Kambourakis (University of the Aegean)H-Index: 24
view all 3 authors...
The intrusion detection systems (IDSs) are essential elements when it comes to the protection of an ICT infrastructure. A misuse IDS is a stable method that can achieve high attack detection rates (ADR) while keeping false alarm rates under acceptable levels. However, the misuse IDSs suffer from the lack of agility, as they are unqualified to adapt to new and “unknown” environments. That is, such an IDS puts the security administrator into an intensive engineering task for keeping the IDS up-to-...
4 CitationsSource
#1Zisis Tsiatsikas (University of the Aegean)H-Index: 3
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last. HuaWang (VU: Victoria University, Australia)H-Index: 35
view all 4 authors...
VoIP services, in general, and session initiation protocol (SIP) ones, in particular, continue to grow at a fast pace and have already become a key component of next-generation networks. Despite this proliferation, SIP-based services expose a large attack surface for perpetrators, especially those who seek to cause denial of service (DoS). While so far, a plethora of works in the literature have been devoted to the detection of DoS attacks in SIP ecosystems, the focus is on those which exploit S...
2 CitationsSource
12345678910