Delegate the smartphone user? Security awareness in smartphone platforms A Mylonas, A Kastania, D Gritzalis Computers & Security 34, 47-66, 2013 | 411 | 2013 |
An insider threat prediction model M Kandias, A Mylonas, N Virvilis, M Theoharidou, D Gritzalis Trust, Privacy and Security in Digital Business: 7th International …, 2010 | 251 | 2010 |
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods A Nisioti, A Mylonas, PD Yoo, V Katos IEEE Communications Surveys & Tutorials 20 (4), 3369-3388, 2018 | 213 | 2018 |
A risk assessment method for smartphones M Theoharidou, A Mylonas, D Gritzalis Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 172 | 2012 |
Smartphone sensor data as digital evidence A Mylonas, V Meletiadis, L Mitrou, D Gritzalis Computers & Security 38, 51-75, 2013 | 122 | 2013 |
Smartphone security evaluation The malware attack case A Mylonas, S Dritsas, B Tsoumas, D Gritzalis Proceedings of the International Conference on Security and Cryptography …, 2011 | 110 | 2011 |
Exiting the risk assessment maze: A meta-survey D Gritzalis, G Iseppi, A Mylonas, V Stavrou ACM Computing Surveys (CSUR) 51 (1), 1-30, 2018 | 100 | 2018 |
Assessing privacy risks in android: A user-centric approach A Mylonas, M Theoharidou, D Gritzalis Risk Assessment and Risk-Driven Testing: First International Workshop, RISK …, 2014 | 99 | 2014 |
Security Busters: Web browser security vs. rogue sites N Virvilis, A Mylonas, N Tsalis, D Gritzalis Computers & Security 52, 90-105, 2015 | 85 | 2015 |
Smartphone forensics: A proactive investigation scheme for evidence acquisition A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 79 | 2012 |
A qualitative metrics vector for the awareness of smartphone security users A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos Trust, Privacy, and Security in Digital Business: 10th International …, 2013 | 77 | 2013 |
Mobile devices: A phisher’s paradise N Virvilis, N Tsalis, A Mylonas, D Gritzalis | 72 | 2014 |
Towards lightweight url-based phishing detection A Butnaru, A Mylonas, N Pitropakis Future internet 13 (6), 154, 2021 | 48 | 2021 |
A comparative analysis of honeypots on different cloud platforms C Kelly, N Pitropakis, A Mylonas, S McKeown, WJ Buchanan Sensors 21 (7), 2433, 2021 | 47 | 2021 |
Browser blacklists: the Utopia of phishing protection N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis E-Business and Telecommunications: 11th International Joint Conference …, 2015 | 47 | 2015 |
Launching adversarial attacks against network intrusion detection systems for iot P Papadopoulos, O Thornewill von Essen, N Pitropakis, C Chrysoulas, ... Journal of Cybersecurity and Privacy 1 (2), 252-273, 2021 | 43 | 2021 |
A study on usability and security features of the android pattern lock screen P Andriotis, G Oikonomou, A Mylonas, T Tryfonas Information & Computer Security 24 (1), 53-72, 2016 | 41 | 2016 |
An intensive analysis of security and privacy browser add-ons N Tsalis, A Mylonas, D Gritzalis | 37 | 2015 |
Exploring the protection of private browsing in desktop browsers N Tsalis, A Mylonas, A Nisioti, D Gritzalis, V Katos Computers & Security 67, 181-197, 2017 | 35 | 2017 |
On the feasibility of malware attacks in smartphone platforms A Mylonas, S Dritsas, B Tsoumas, D Gritzalis E-Business and Telecommunications: International Joint Conference, ICETE …, 2012 | 35 | 2012 |