default search action
Georgios Karopoulos
Person information
- affiliation: National and Kapodistrian University of Athens, Greece
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers. SEC 2024: 61-75 - [i7]Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Keep your memory dump shut: Unveiling data leaks in password managers. CoRR abs/2404.00423 (2024) - [i6]Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis:
Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis. CoRR abs/2406.18894 (2024) - 2023
- [j19]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, Stefanos Gritzalis:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. Comput. Secur. 125: 103051 (2023) - [j18]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis:
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study. Int. J. Inf. Sec. 22(2): 347-365 (2023) - [j17]Vasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis:
Assessing the Security and Privacy of Android Official ID Wallet Apps. Inf. 14(8): 457 (2023) - [c16]Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas:
Bypassing antivirus detection: old-school malware, new tricks. ARES 2023: 150:1-150:10 - [i5]Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas:
Bypassing antivirus detection: old-school malware, new tricks. CoRR abs/2305.04149 (2023) - [i4]José Luis Hernández Ramos, Georgios Karopoulos, Efstratios Chatzoglou, Vasileios Kouliaridis, Enrique Mármol Campos, Aurora González-Vidal, Georgios Kambourakis:
Intrusion Detection based on Federated Learning: a systematic review. CoRR abs/2308.09522 (2023) - 2022
- [c15]Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 81-96 - [c14]Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 177-190 - [i3]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, Stefanos Gritzalis:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. CoRR abs/2208.06722 (2022) - 2021
- [j16]Georgios Karopoulos, José Luis Hernández Ramos, Vasileios Kouliaridis, Georgios Kambourakis:
A Survey on Digital Certificates Approaches for the COVID-19 Pandemic. IEEE Access 9: 138003-138025 (2021) - [j15]José Luis Hernández Ramos, Georgios Karopoulos, Dimitris Geneiatakis, Tania Martin, Georgios Kambourakis, Igor Nai Fovino:
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation. Wirel. Commun. Mob. Comput. 2021: 2427896:1-2427896:12 (2021) - [c13]Georgios Karopoulos, Dimitris Geneiatakis, Georgios Kambourakis:
Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response Headers. TrustBus 2021: 83-95 - [i2]José Luis Hernández Ramos, Georgios Karopoulos, Dimitris Geneiatakis, Tania Martin, Georgios Kambourakis, Igor Nai Fovino:
Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation. CoRR abs/2101.04575 (2021) - 2020
- [j14]Alexandros Fakis, Georgios Karopoulos, Georgios Kambourakis:
Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks. Future Internet 12(5): 92 (2020) - [j13]Georgios Kambourakis, Constantinos Kolias, Dimitris Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, Ioannis Kounelis:
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks. Symmetry 12(4): 579 (2020) - [j12]Tania Martin, Georgios Karopoulos, José Luis Hernández Ramos, Georgios Kambourakis, Igor Nai Fovino:
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps. Wirel. Commun. Mob. Comput. 2020: 8851429:1-8851429:29 (2020) - [i1]Tania Martin, Georgios Karopoulos, José Luis Hernández Ramos, Georgios Kambourakis, Igor Nai Fovino:
Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps. CoRR abs/2007.11687 (2020)
2010 – 2019
- 2019
- [j11]Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis:
A survey of voice and communication protection solutions against wiretapping. Comput. Electr. Eng. 77: 163-178 (2019) - [j10]Christoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis:
Transforming malicious code to ROP gadgets for antivirus evasion. IET Inf. Secur. 13(6): 570-578 (2019) - 2018
- [j9]Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis:
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem. Comput. Secur. 73: 307-325 (2018) - 2017
- [j8]Alexandros Fakis, Georgios Karopoulos, Georgios Kambourakis:
OnionSIP: Preserving Privacy in SIP with Onion Routing. J. Univers. Comput. Sci. 23(10): 969-991 (2017) - [c12]Georgios Karopoulos, Christos Xenakis, Stefano Tennina, Stefanos Evangelopoulos:
Towards trusted metering in the smart grid. CAMAD 2017: 1-5 - [c11]Stefano Tennina, I. Tunaru, Georgios Karopoulos, Dionysis Xenakis, Eirini Liotou, Nikos I. Passas:
Secure energy management in Smart Energy Networks. CAMAD 2017: 1-6 - 2016
- [j7]Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis:
Evaluation of Cryptography Usage in Android Applications. EAI Endorsed Trans. Security Safety 3(9): e4 (2016) - 2015
- [j6]Georgios Karopoulos, Georgios Portokalidis, Josep Domingo-Ferrer, Ying-Dar Lin, Dimitris Geneiatakis, Georgios Kambourakis:
Security and privacy in unified communications: Challenges and solutions. Comput. Commun. 68: 1-3 (2015) - [c10]Foivos F. Demertzis, Georgios Karopoulos, Christos Xenakis, Andrea Colarieti:
Self-organised Key Management for the Smart Grid. ADHOC-NOW 2015: 303-316 - [c9]Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis:
Evaluation of Cryptography Usage in Android Applications. BICT 2015: 83-90 - [c8]Christoforos Ntantogian, Grigoris Valtas, Nikos Kapetanakis, Faidon Lalagiannis, Georgios Karopoulos, Christos Xenakis:
Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software. TrustBus 2015: 73-86 - 2014
- [c7]Georgios Karopoulos, Alexandros Fakis, Georgios Kambourakis:
Complete SIP Message Obfuscation: PrivaSIP over Tor. ARES 2014: 217-226 - 2013
- [j5]Georgios Karopoulos, Paolo Mori, Fabio Martinelli:
Usage control in SIP-based multimedia delivery. Comput. Secur. 39: 406-418 (2013) - [c6]Béla Genge, Christos Siaterlis, Georgios Karopoulos:
Data fusion-base anomay detection in networked critical infrastructures. DSN Workshops 2013: 1-8 - 2012
- [c5]Georgios Karopoulos, Paolo Mori, Fabio Martinelli:
Continuous Authorizations in SIP with Usage Control. PDP 2012: 283-287 - 2011
- [j4]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
PrivaSIP: Ad-hoc identity privacy in SIP. Comput. Stand. Interfaces 33(3): 301-314 (2011) - [j3]Iosif Terzis, Georgios Kambourakis, Giorgos Karopoulos, Costas Lambrinoudakis:
Privacy preserving context transfer schemes for 4G networks. Wirel. Commun. Mob. Comput. 11(2): 289-302 (2011) - [c4]Giorgos Karopoulos, Fabio Martinelli:
IMS Session Management Based on Usage Control. STA 2011: 71-78 - 2010
- [j2]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis, Elisavet Konstantinou:
A framework for identity privacy in SIP. J. Netw. Comput. Appl. 33(1): 16-28 (2010)
2000 – 2009
- 2009
- [b1]Georgios Karopoulos:
Secure mobile multimedia over all-IP wireless heterogeneous networks. University of the Aegean, Greece, 2009 - 2008
- [c3]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Caller identity privacy in SIP heterogeneous realms: A practical solution. ISCC 2008: 37-43 - [c2]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Privacy Protection in Context Transfer Protocol. PDP 2008: 590-596 - 2007
- [j1]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks. IEEE Commun. Surv. Tutorials 9(1-4): 18-28 (2007) - [c1]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Two privacy enhanced context transfer schemes. Q2SWinet 2007: 172-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint