default search action
Vassilis Prevelakis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst:
REACT: Autonomous intrusion response system for intelligent vehicles. Comput. Secur. 145: 104008 (2024) - [i3]Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst:
REACT: Autonomous Intrusion Response System for Intelligent Vehicles. CoRR abs/2401.04792 (2024) - 2023
- [j12]Mohammad Hamad, Andreas Finkenzeller, Hangmao Liu, Jan Lauinger, Vassilis Prevelakis, Sebastian Steinhorst:
SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation. IEEE Internet Things J. 10(4): 3384-3406 (2023) - [c40]Jihane Najar, Marinos Tsantekidis, Aris Sotiropoulos, Vassilis Prevelakis:
Enhancing Cyber Threat Hunting: A Visual Approach with the Forensic Visualization Toolkit. IEEE Big Data 2023: 3035-3042 - [c39]Marinos Tsantekidis, Souleima Abdelghani, Mohammad Hamad, Vassilis Prevelakis:
Creating a Security Enforcement Environment for a Vehicular Platform. CSCN 2023: 278-283 - 2021
- [c38]Mohammad Hamad, Emanuel Regnath, Jan Lauinger, Vassilis Prevelakis, Sebastian Steinhorst:
SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication. DATE 2021: 529-534 - [c37]Marinos Tsantekidis, Vassilis Prevelakis:
MMU-based Access Control for Libraries. SECRYPT 2021: 686-691 - 2020
- [j11]Mohammad Hamad, Vassilis Prevelakis:
SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study. Inf. 11(5): 273 (2020) - [j10]Mohammad Hamad, Zain Alabedin Haj Hammadeh, Selma Saidi, Vassilis Prevelakis:
Temporal-based intrusion detection for IoV. it Inf. Technol. 62(5-6): 227-239 (2020) - [c36]Marinos Tsantekidis, Vassilis Prevelakis:
Software System Exploration Using Library Call Analysis. MSTEC 2020: 125-139
2010 – 2019
- 2019
- [c35]Marinos Tsantekidis, Vassilis Prevelakis:
Efficient Monitoring of Library Call Invocation. IoTSMS 2019: 387-392 - [c34]Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis:
Intrusion Response System for Vehicles: Challenges and Vision. SMARTGREENS/VEHITS (Selected Papers) 2019: 321-341 - [c33]Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis:
Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System. VEHITS 2019: 148-158 - 2018
- [c32]Muhammad Ali Siddiqi, Robert M. Seepers, Mohammad Hamad, Vassilis Prevelakis, Christos Strydis:
Attack-tree-based Threat Modeling of Medical Implants. PROOFS 2018: 32-49 - [c31]Jihane Najar, Vassilis Prevelakis:
A Secure and Efficient File System Access Control Mechanism (FlexFS). IOSec@RAID 2018: 15-26 - [c30]Mohammad Hamad, Zain Alabedin Haj Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst:
Prediction of abnormal temporal behavior in real-time systems. SAC 2018: 359-367 - [c29]Mohammad Hamad, Mustafa R. Agha, Vassilis Prevelakis:
ProSEV: Proxy-Based Secure and Efficient Vehicular Communication. VNC 2018: 1-8 - 2017
- [c28]Mustafa Ayoob, Wael Adi, Vassilis Prevelakis:
Using Ciphers for Failure-Recovery in ITS Systems. ARES 2017: 98:1-98:7 - [c27]Vassilis Prevelakis, Wael Adi:
LS-ARP: A lightweight and secure ARP. EST 2017: 204-208 - [c26]Saleh Mulhem, Wael Adi, Ayoub Mars, Vassilis Prevelakis:
Chaining trusted links by deploying secured physical identities. EST 2017: 215-220 - [c25]Sotiris Ioannidis, Cristiano Giuffrida, Ioannis Sourdis, Vassilis Prevelakis, Christos Strydis, John Thomson, Dmitry Pidan, Martin Böhner:
Secure Hardware-Software Architectures for Robust Computing Systems - SHARCS. EPS 2017 - [c24]Mohammad Hamad, Vassilis Prevelakis:
Secure APIs for Applications in Microkernel-based Systems. ICISSP 2017: 553-558 - [c23]Mohammad Hamad, Marcus Nolte, Vassilis Prevelakis:
A framework for policy based secure intra vehicle communication. VNC 2017: 1-8 - [i2]Vassilis Prevelakis, Sotiris Ioannidis, Panagiotis Papadopoulos, Zacharias Tzermias:
Privacy Risks from Public Data Sources. CoRR abs/1711.09260 (2017) - 2015
- [c22]Elias Athanasopoulos, Martin Böhner, Sotiris Ioannidis, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis, Ioannis Sourdis, Christos Strydis, John Thomson:
Secure Hardware-Software Architectures for Robust Computing Systems. e-Democracy 2015: 209-212 - [c21]Vassilis Prevelakis, Mohammad Hamad:
A Policy-based Communications Architecture for Vehicles. ICISSP 2015: 155-162 - 2014
- [c20]Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis:
Privacy Risks from Public Data Sources. SEC 2014: 156-168 - [c19]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, Vassilis Prevelakis:
On the Development of Automated Forensic Analysis Methods for Mobile Devices. TRUST 2014: 212-213 - 2010
- [j9]Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto, Angelos D. Keromytis, Vassilis Prevelakis:
On the General Applicability of Instruction-Set Randomization. IEEE Trans. Dependable Secur. Comput. 7(3): 255-270 (2010) - [j8]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
A market-based bandwidth charging framework. ACM Trans. Internet Techn. 10(1): 1:1-1:30 (2010)
2000 – 2009
- 2008
- [j7]Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis:
Decentralized access control in distributed file systems. ACM Comput. Surv. 40(3): 10:1-10:30 (2008) - 2007
- [j6]Vassilis Prevelakis:
Supporting a Security Laboratory. login Usenix Mag. 32(3) (2007) - [c18]Angelos Stavrou, David Turner, Angelos D. Keromytis, Vassilis Prevelakis:
Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007 - 2006
- [j5]Vassilis Prevelakis, Admela Jukan:
How to buy a network: trading of resources in the physical layer. IEEE Commun. Mag. 44(12): 94-102 (2006) - [j4]Vassilis Prevelakis:
Letter to the Editor. login Usenix Mag. 31(4) (2006) - [c17]Jason W. Kim, Vassilis Prevelakis:
Base line performance measurements of access controls for libraries and modules. IPDPS 2006 - [c16]Vassilis Prevelakis, Sotiris Ioannidis:
Preserving TCP Connections Across Host Address Changes. ISC 2006: 299-310 - 2005
- [j3]Vassilis Prevelakis:
The Virtual Firewall. login Usenix Mag. 30(6) (2005) - [c15]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
The Bandwidth Exchange Architecture. ISCC 2005: 939-944 - [c14]David Michael Turner, Vassilis Prevelakis:
The Ethernet Speaker System. USENIX ATC, FREENIX Track 2005: 151-162 - [i1]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
The Bandwidth Exchange Architecture. CoRR abs/cs/0504007 (2005) - 2003
- [j2]Vassilis Prevelakis, Angelos D. Keromytis:
Drop-in security for distributed and portable computing elements. Internet Res. 13(2): 107-115 (2003) - [c13]Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis:
Countering code-injection attacks with instruction-set randomization. CCS 2003: 272-280 - [c12]Dan DaCosta, Christopher Dahn, Spiros Mancoridis, Vassilis Prevelakis:
Demonstration of COSAK static analysis tools. DISCEX (2) 2003: 7-9 - [c11]Dan DaCosta, Christopher Dahn, Spiros Mancoridis, Vassilis Prevelakis:
Characterizing the 'Security Vulnerability Likelihood' of Software Functions. ICSM 2003: 266- - [c10]Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis:
TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100 - [c9]Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith:
Secure and Flexible Global File Sharing. USENIX ATC, FREENIX Track 2003: 165-178 - [c8]Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis:
WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64 - 2002
- [c7]John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis:
Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299 - 2001
- [c6]Vassilis Prevelakis, Diomidis Spinellis:
Sandboxing Applications. USENIX ATC, FREENIX Track 2001: 119-126
1990 – 1999
- 1999
- [j1]Vassilis Prevelakis:
Managing large WWW sites. Internet Res. 9(1): 41-48 (1999) - [c5]Vassilis Prevelakis, Jean-Henry Morin, Dimitri Konstantas:
Controlling the Dissemination of Electronic Documents. DEXA Workshop 1999: 869-873 - [c4]Vassilis Prevelakis:
A Secure Station for Network Monitoring and Control. Conference on Information Security Management & Small Systems Security 1999: 103-116 - [c3]Vassilis Prevelakis:
A Secure Station for Network Monitoring and Control. USENIX Security Symposium 1999 - 1998
- [c2]Vassilis Prevelakis:
The reconfigurable electronic textbook. ECIS 1998: 684-694 - 1993
- [c1]Vassilis Prevelakis, Dennis Tsichritzis:
Perspectives on Software Development Environments. CAiSE 1993: 586-600
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint