An efficient and easily deployable method for dealing with DoS in SIP services Z Tsiatsikas, D Geneiatakis, G Kambourakis, AD Keromytis Computer Communications 57, 50-63, 2015 | 25 | 2015 |
Battling against DDoS in SIP. Is machine learning-based detection an effective weapon? Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ... | 25 | 2015 |
The devil is in the detail: SDP-driven malformed message attacks and mitigation in SIP ecosystems Z Tsiatsikas, G Kambourakis, D Geneiatakis, H Wang IEEE Access 7, 2401-2417, 2018 | 23 | 2018 |
Hidden in plain sight. sdp-based covert channel for botnet communication Z Tsiatsikas, M Anagnostopoulos, G Kambourakis, S Lambrou, ... Trust, Privacy and Security in Digital Business: 12th International …, 2015 | 16 | 2015 |
Realtime ddos detection in sip ecosystems: Machine learning tools of the trade Z Tsiatsikas, D Geneiatakis, G Kambourakis, S Gritzalis Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016 | 12 | 2016 |
Measuring the adoption of TLS encrypted client hello extension and its forebear in the wild Z Tsiatsikas, G Karopoulos, G Kambourakis European Symposium on Research in Computer Security, 177-190, 2022 | 6 | 2022 |
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP Z Tsiatsikas, D Geneiatakis, G Kambourakis, AD Keromytis 2013 International Conference on Availability, Reliability and Security, 224-229, 2013 | 6 | 2013 |
Bypassing antivirus detection: old-school malware, new tricks E Chatzoglou, G Karopoulos, G Kambourakis, Z Tsiatsikas Proceedings of the 18th International Conference on Availability …, 2023 | 5 | 2023 |
Exposing resource consumption attacks in internet multimedia services Z Tsiatsikas, G Kambourakis, D Geneiatakis 2014 IEEE International Symposium on Signal Processing and Information …, 2014 | 5 | 2014 |
At your service 24/7 or not? denial of service on esinet systems Z Tsiatsikas, G Kambourakis, D Geneiatakis International Conference on Trust and Privacy in Digital Business, 35-49, 2021 | 3 | 2021 |
Why Snoopy loves online services: An Analysis of (lack of) Privacy in Online Services V Cozza, Z Tsiatsikas, M Conti, G Kambourakis International Conference on Information Systems Security and Privacy 2, 431-438, 2017 | 2 | 2017 |
Method and a system for silent and non-exposing alerting of previously abandoned calls E Michopanou, Z Tsiatsikas, M Botsis US Patent App. 18/545,203, 2024 | | 2024 |
Method and system for optimizing blockchain complexity Z Tsiatsikas US Patent App. 18/346,919, 2024 | | 2024 |
Method and system for efficient callback functionality using signal coverage data Z Tsiatsikas, A Pagonis, S Anagnostou US Patent App. 18/346,902, 2024 | | 2024 |
Computer-implemented method of processing an emergency call and emergency communication network A Pagonis, Z Tsiatsikas, M Mikrouli, S Anagnostou US Patent 11,956,706, 2024 | | 2024 |
Keep your memory dump shut: Unveiling data leaks in password managers E Chatzoglou, V Kampourakis, Z Tsiatsikas, G Karopoulos, ... arXiv preprint arXiv:2404.00423, 2024 | | 2024 |
Computer-implemented method of processing an emergency incident and emergency communication network Z Tsiatsikas, S Anagnostou US Patent 11,843,974, 2023 | | 2023 |
Computer-implemented method of optimizing bandwidth in a PSAP environment and communication network Z Tsiatsikas, E Michopanou, A Karanasiou, S Anagnostou US Patent 11,805,399, 2023 | | 2023 |
Computer-implemented method of processing an emergency incident and emergency communication network A Pagonis, Z Tsiatsikas, M Mikrouli, S Anagnostou US Patent 11,800,344, 2023 | | 2023 |
Method and system for establishing optimized data streams in a network Z Tsiatsikas, E Michopanou US Patent 11,729,224, 2023 | | 2023 |