A Digital Twin for the 5G Era: the SPIDER Cyber Range F Rebecchi, A Pastor, A Mozo, C Lombardo, R Bruschi, I Aliferis, ... 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and …, 2022 | 24 | 2022 |
Trusted and Secure Self-Sovereign Identity framework V Bolgouras, A Angelogianni, I Politis, C Xenakis Proceedings of the 17th International Conference on Availability …, 2022 | 22 | 2022 |
A forensic investigation of Android mobile applications TI Kitsaki, A Angelogianni, C Ntantogian, C Xenakis Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 58-63, 2018 | 18 | 2018 |
On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats A Angelogianni, I Politis, F Mohammadi, C Xenakis IEEE Access 8, 224677-224701, 2020 | 14 | 2020 |
How many FIDO protocols are needed? Surveying the design, security and market perspectives A Angelogianni, I Politis, C Xenakis arXiv preprint arXiv:2107.00577, 2021 | 11 | 2021 |
Unveiling the user requirements of a cyber range for 5G security testing and training A Angelogianni, I Politis, PL Polvanesi, A Pastor, C Xenakis 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design …, 2021 | 7 | 2021 |
Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security A Angelogianni, I Krontiris, T Giannetsos 2023 IEEE Vehicular Networking Conference (VNC), 199-206, 2023 | 5 | 2023 |
Towards building a Self-Sovereign Identity Framework for Healthcare EG Spanakis, I Politis, E Markakis, D Papatsaroucha, ... 2023 45th Annual International Conference of the IEEE Engineering in …, 2023 | 3 | 2023 |
Towards Privacy-First Security Enablers for 6G Networks: The PRIVATEER Approach D Masouros, D Soudris, G Gardikis, V Katsarou, M Christopoulou, ... International Conference on Embedded Computer Systems, 379-391, 2023 | 3 | 2023 |
Analysis and Implementation of the FIDO Protocol in a Trusted Environment A Angelogianni https://dione.lib.unipi.gr/xmlui/handle/unipi/11387, 2018 | 3 | 2018 |
How many FIDO protocols are needed? Analysing the technology, security and compliance A Angelogianni, I Politis, C Xenakis ACM Computing Surveys 56 (8), 1-51, 2024 | 1 | 2024 |
Analysis and implementation of the FIDO protocol in a trusted environment Ά Αγγελογιάννη Πανεπιστήμιο Πειραιώς, 2018 | | 2018 |
2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)| 978-1-6654-0876-9/22/$31.00© 2022 IEEE| DOI: 10.1109/WoWMoM54355. 2022.00097 R Abozariba, M Ait Mesbah, M Ajmone Marsan, W Akbar, MM Alammar, ... | | |
The SPIDER concept C Xenakis, A Angelogianni, E Veroni, E Karapistoli, M Ghering, ... | | |