Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? N Virvilis, D Gritzalis, T Apostolopoulos 2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013 | 187 | 2013 |
The compact linear collider (CLIC)-2018 summary report T CLIC, TK Charles, PJ Giansiracusa, TG Lucas, RP Rassool, M Volpi, ... arXiv preprint arXiv:1812.06018, 2018 | 168 | 2018 |
An open financial services architecture based on the use of intelligent mobile devices A Kousaridas, G Parissis, T Apostolopoulos Electronic Commerce Research and Applications 7 (2), 232-246, 2008 | 129 | 2008 |
Information technology investment evaluation: Investments in telecommunication infrastructure TK Apostolopoulos, KC Pramataris International Journal of Information Management 17 (4), 287-296, 1997 | 101 | 1997 |
A qualitative metrics vector for the awareness of smartphone security users A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos Trust, Privacy, and Security in Digital Business: 10th International …, 2013 | 76 | 2013 |
Queueing analysis of buffered CSMA/CD protocols T Apostolopoulos, E Protonotarios IEEE Transactions On Communications 34 (9), 898-905, 1986 | 59 | 1986 |
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos Computers & Security 74, 371-383, 2018 | 52 | 2018 |
A cyber attack evaluation methodology K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014 | 52 | 2014 |
Parallel computation for streamflow prediction with distributed hydrologic models TK Apostolopoulos, KP Georgakakos Journal of Hydrology 197 (1-4), 1-24, 1997 | 50 | 1997 |
Browser blacklists: the Utopia of phishing protection N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis E-Business and Telecommunications: 11th International Joint Conference …, 2015 | 46 | 2015 |
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos Information & Computer Security 24 (1), 38-52, 2016 | 35 | 2016 |
Queueing analysis of buffered slotted multiple access protocols TK Apostolopoulos, EN Protonotarios computer communications 8 (1), 9-21, 1985 | 29 | 1985 |
A taxonomy of side channel attacks on critical infrastructures and relevant systems N Tsalis, E Vasilellis, D Mentzelioti, T Apostolopoulos Critical Infrastructure Security and Resilience: Theories, Methods, Tools …, 2019 | 21 | 2019 |
Cyber-Attacks evaluation using simple additive weighting method on the basis of schmitt's analysis K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos | 20 | 2016 |
An e-learning service management architecture TK Apostolopoulos, A Kefala Proceedings 3rd IEEE International Conference on Advanced Technologies, 140-144, 2003 | 20 | 2003 |
Temporal network management model: Concepts and implementation issues TK Apostolopoulos, VC Daskalou Computer Communications 20 (8), 694-708, 1997 | 16 | 1997 |
The inverse scattering problem for a rigid ellipsoid in linear elasticity T Apostolopoulos, K Kiriaki, D Polyzos Inverse Problems 6 (1), 1, 1990 | 16 | 1990 |
Analysis of a new retransmission control algorithm for slotted CSMA/CD LAN's Apostolopoulos, Sykas, Protonotarios IEEE transactions on computers 100 (6), 692-701, 1987 | 14 | 1987 |
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. N Tsalis, G Stergiopoulos, E Bitsikas, D Gritzalis, TK Apostolopoulos ICETE (2), 219-229, 2018 | 13 | 2018 |
DHTbd: A reliable block-based storage system for high performance clusters G Parisis, G Xylomenos, T Apostolopoulos 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2011 | 11 | 2011 |