From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Polakis, Iasonas
add a person with the name Polakis, Iasonas
 

Другие публикации лиц с тем же именем

CAPTCHuring Automated (Smart)Phone Attacks., , и . EC2ND, стр. 60. IEEE Computer Society, (2011)D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks., , , , и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 663-678. Springer, (2010)An empirical study on the security of cross-domain policies in rich internet applications., , , и . EUROSEC, стр. 7. ACM, (2011)Think Before RT: An Experimental Study of Abusing Twitter Trends., , , , и . SocInfo Workshops, том 8852 из Lecture Notes in Computer Science, стр. 402-413. Springer, (2014)Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned., , , и . BADGERS@ESORICS, стр. 18-29. IEEE, (2014)dead.drop: URL-Based Stealthy Messaging., , , и . EC2ND, стр. 17-24. IEEE Computer Society, (2011)A Systematic Characterization of IM Threats using Honeypots., , , и . NDSS, The Internet Society, (2010)Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software., , , , и . DIMVA, том 9148 из Lecture Notes in Computer Science, стр. 165-184. Springer, (2015)The man who was there: validating check-ins in location-based services., , , и . ACSAC, стр. 19-28. ACM, (2013)The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information., , и . IEEE Symposium on Security and Privacy, стр. 724-742. IEEE Computer Society, (2016)