Author of the publication

Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security Data.

, , , and . SysSec@DIMVA, page 59-62. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On intrusion detection in opportunistic networks., , , and . Panhellenic Conference on Informatics, page 67-74. ACM, (2013)Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks., , , and . PCI, page 27:1-27:4. ACM, (2017)Security applications of peer-to-peer networks., , and . Comput. Networks, 45 (2): 195-205 (2004)The MoR-Trust Distributed Trust Management System: Design and Simulation Results., , and . STM, volume 179 of Electronic Notes in Theoretical Computer Science, page 3-15. Elsevier, (2006)Biological Aspects of Computer Virology., , and . e-Democracy, volume 26 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 209-219. Springer, (2009)The Insider Threat: Reasons, Effects and Mitigation Techniques., , , , , , and . PCI, page 340-345. ACM, (2020)An LTE reconfigurable SOVA/log-MAP turbo decoder for uncorrelated Rayleigh fading., , and . CITS, page 1-5. IEEE, (2015)The Landscape of Cybercrime in Greece., , , and . Inf. Manag. Comput. Secur., 19 (2): 113-123 (2011)Epidemic model for malware targeting telephony networks., , , and . ICT, page 1-5. IEEE, (2016)Modelling Cyber-Risk in an Economic Perspective., , , , , , , and . CSR, page 372-377. IEEE, (2021)