Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transforming malicious code to ROP gadgets for antivirus evasion., , , and . IET Inf. Secur., 13 (6): 570-578 (2019)Continuous Authorizations in SIP with Usage Control., , and . PDP, page 283-287. IEEE, (2012)OnionSIP: Preserving Privacy in SIP with Onion Routing., , and . J. Univers. Comput. Sci., 23 (10): 969-991 (2017)A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset., , , , and . CoRR, (2022)Secure mobile multimedia over all-IP wireless heterogeneous networks. University of the Aegean, Greece, (2009)National Archive of PhD Theses: oai:10442/25021.Towards trusted metering in the smart grid., , , and . CAMAD, page 1-5. IEEE, (2017)Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks., , and . Future Internet, 12 (5): 92 (2020)Bypassing antivirus detection: old-school malware, new tricks., , , and . ARES, page 150:1-150:10. ACM, (2023)The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP., , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 81-96. Springer, (2022)Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild., , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 177-190. Springer, (2022)