Dimitris Geneiatakis
Dimitris Geneiatakis
European Commission Directorate General for Informatics
Verified email at
Cited by
Cited by
Survey of security vulnerabilities in session initiation protocol
D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ...
IEEE Communications Surveys & Tutorials 8 (3), 68-81, 2006
Security and privacy issues for an IoT based smart home
D Geneiatakis, I Kounelis, R Neisse, I Nai-Fovino, G Steri, G Baldini
2017 40th international convention on information and communication …, 2017
Detecting DNS amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
Critical Information Infrastructures Security: Second International Workshop …, 2008
Survey of network security systems to counter SIP-based denial-of-service attacks
S Ehlert, D Geneiatakis, T Magedanz
computers & security 29 (2), 225-243, 2010
A framework for protecting a SIP-based infrastructure against malformed message attacks
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Computer Networks 51 (10), 2580-2593, 2007
A Permission verification approach for android mobile applications
D Geneiatakis, IN Fovino, I Kounelis, P Stirparo
Computers & Security 49, 192-205, 2015
Utilizing bloom filters for detecting flooding attacks against SIP based services
D Geneiatakis, N Vrakas, C Lambrinoudakis
computers & security 28 (7), 578-591, 2009
A fair solution to dns amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
Second International Workshop on Digital Forensics and Incident Analysis …, 2007
SIP Security Mechanisms: A state-of-the-art review
D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ...
Proceedings of the Fifth International Network Conference (INC 2005), 147-155, 2005
Fostering consumers' energy market through smart contracts
I Kounelis, G Steri, R Giuliani, D Geneiatakis, R Neisse, I Nai-Fovino
2017 international conference in energy and sustainability in small …, 2017
An ontology description for SIP security flaws
D Geneiatakis, C Lambrinoudakis
Computer Communications 30 (6), 1367-1374, 2007
Two layer Denial of Service prevention on SIP VoIP infrastructures
S Ehlert, G Zhang, D Geneiatakis, G Kambourakis, T Dagiuklas, J Markl, ...
Computer Communications 31 (10), 2443-2456, 2008
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
D Geneiatakis, C Lambrinoudakis
Telecommunication Systems 36, 153-159, 2007
Blockchain performance analysis for supporting cross-border E-government services
D Geneiatakis, Y Soupionis, G Steri, I Kounelis, R Neisse, I Nai-Fovino
IEEE Transactions on Engineering Management 67 (4), 1310-1322, 2020
A framework for detecting malformed messages in SIP networks
D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ...
2005 14th IEEE Workshop on Local & Metropolitan Area Networks, 5 pp.-5, 2005
SIP message tampering: The SQL code injection attack
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Proceedings of 13th International Conference on Software, Telecommunications …, 2005
Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation
JL Hernández-Ramos, G Karopoulos, D Geneiatakis, T Martin, ...
Wireless Communications and Mobile Computing 2021, 1-12, 2021
Two anatomists are better than one—dual-level android malware detection
V Kouliaridis, G Kambourakis, D Geneiatakis, N Potha
Symmetry 12 (7), 1128, 2020
Adaptive defenses for commodity software through virtual application partitioning
D Geneiatakis, G Portokalidis, VP Kemerlis, AD Keromytis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Dissecting contact tracing apps in the Android platform
V Kouliaridis, G Kambourakis, E Chatzoglou, D Geneiatakis, H Wang
Plos one 16 (5), e0251867, 2021
The system can't perform the operation now. Try again later.
Articles 1–20