Nikos Virvilis
Nikos Virvilis
Verified email at aueb.gr
Title
Cited by
Cited by
Year
The big four-what we did wrong in advanced persistent threat detection?
N Virvilis, D Gritzalis
2013 international conference on availability, reliability and security, 248-254, 2013
2032013
An insider threat prediction model
M Kandias, A Mylonas, N Virvilis, M Theoharidou, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2010
1882010
The insider threat in cloud computing
M Kandias, N Virvilis, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 93-103, 2011
1642011
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
N Virvilis, D Gritzalis, T Apostolopoulos
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
1452013
Security Busters: Web browser security vs. rogue sites
N Virvilis, A Mylonas, N Tsalis, D Gritzalis
Computers & Security 52, 90-105, 2015
622015
Changing the game: The art of deceiving sophisticated attackers
N Virvilis, B Vanautgaerden, OS Serrano
2014 6th International Conference On Cyber Conflict (CyCon 2014), 87-97, 2014
602014
Mobile devices: A phisher's paradise
N Virvilis, N Tsalis, A Mylonas, D Gritzalis
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-9, 2014
532014
Secure cloud storage: Available infrastructures and architectures review and evaluation
N Virvilis, S Dritsas, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2011
312011
A cloud provider-agnostic secure storage protocol
N Virvilis, S Dritsas, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 104-115, 2010
282010
Browser blacklists: the Utopia of phishing protection
N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis
International Conference on E-Business and Telecommunications, 278-293, 2014
272014
Big data analytics for sophisticated attack detection
N Virvilis, O Serrano, L Dandurand
Isaca Journal 3, 22-25, 2014
192014
The Big Four-What we did wrong in protecting critical ICT infrastructures from Advanced Persistent Threat detection?
N Virvilis, D Gritzalis
Proc. of the 8th International Conference on Availability, Reliability …, 0
9
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks, M. Mohammed, ASK Pathan, Auerbach Publications, USA (2013)
N Virvilis, D Gritzalis
Computers & security 42, 191-192, 2014
22014
Advanced Persistent Threats: The Empire Strikes Back
N Virvilis, D Gritzalis
12015
Fighting an unfair battle: Unconventional defences against sophisticated threats
N Virvilis
2015
INVITED SPEAKERS KEYNOTE SPEAKERS
S Goodman, I Brandic, D Karagiannis, M Golfarelli, E Weippl, E Yitayal, ...
Changing the game: The art of deception against sophisticated attackers
N Virvilis, O Serrano
A “human-or-bot” authentication means for VoIP systems in the AmI context
N Virvilis, A Mylonas, Y Soupionis, D Gritzalis
The system can't perform the operation now. Try again later.
Articles 1–18