Follow
Nikolaos Pitropakis
Nikolaos Pitropakis
Associate Professor of Cyber Security at Edinburgh Napier University
Verified email at napier.ac.uk - Homepage
Title
Cited by
Cited by
Year
A taxonomy and survey of attacks against machine learning
N Pitropakis, E Panaousis, T Giannetsos, E Anastasiadis, G Loukas
Computer Science Review 34, 100199, 2019
1872019
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1382017
A privacy-preserving healthcare framework using hyperledger fabric
C Stamatellis, P Papadopoulos, N Pitropakis, S Katsikas, WJ Buchanan
Sensors 20 (22), 6587, 2020
752020
A deep learning-based intrusion detection system for mqtt enabled iot
MA Khan, MA Khan, SU Jan, J Ahmad, SS Jamal, AA Shah, N Pitropakis, ...
Sensors 21 (21), 7016, 2021
342021
Privacy and trust redefined in federated machine learning
P Papadopoulos, W Abramson, AJ Hall, N Pitropakis, WJ Buchanan
Machine Learning and Knowledge Extraction 3 (2), 333-356, 2021
302021
A comparative analysis of honeypots on different cloud platforms
C Kelly, N Pitropakis, A Mylonas, S McKeown, WJ Buchanan
Sensors 21 (7), 2433, 2021
282021
An enhanced cyber attack attribution framework
N Pitropakis, E Panaousis, A Giannakoulias, G Kalpakis, RD Rodriguez, ...
Trust, Privacy and Security in Digital Business: 15th International …, 2018
282018
A distributed trust framework for privacy-preserving machine learning
W Abramson, AJ Hall, P Papadopoulos, N Pitropakis, WJ Buchanan
Trust, Privacy and Security in Digital Business: 17th International …, 2020
262020
HDL-IDS: a hybrid deep learning architecture for intrusion detection in the Internet of Vehicles
S Ullah, MA Khan, J Ahmad, SS Jamal, Z e Huma, MT Hassan, ...
Sensors 22 (4), 1340, 2022
252022
Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier
AJ Hall, N Pitropakis, WJ Buchanan, N Moradpoor
2018 IEEE International Conference on Big Data (Big Data), 5034-5039, 2018
232018
Towards lightweight url-based phishing detection
A Butnaru, A Mylonas, N Pitropakis
Future internet 13 (6), 154, 2021
222021
Testing and hardening IoT devices against the Mirai botnet
C Kelly, N Pitropakis, S McKeown, C Lambrinoudakis
2020 International conference on cyber security and protection of digital …, 2020
202020
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments
N Pitropakis, A Pikrakis, C Lambrinoudakis
International Journal of Information Security 14, 299-305, 2015
202015
Launching adversarial attacks against network intrusion detection systems for iot
P Papadopoulos, O Thornewill von Essen, N Pitropakis, C Chrysoulas, ...
Journal of Cybersecurity and Privacy 1 (2), 252-273, 2021
182021
Review and critical analysis of privacy-preserving infection tracking and contact tracing
WJ Buchanan, MA Imran, M Ur-Rehman, L Zhang, QH Abbasi, ...
Frontiers in Communications and Networks 1, 583376, 2020
182020
Phishing url detection through top-level domain analysis: A descriptive approach
O Christou, N Pitropakis, P Papadopoulos, S McKeown, WJ Buchanan
arXiv preprint arXiv:2005.06599, 2020
172020
Till all are one: Towards a unified cloud IDS
N Pitropakis, C Lambrinoudakis, D Geneiatakis
Trust, Privacy and Security in Digital Business: 12th International …, 2015
172015
Monitoring users’ behavior: anti-immigration speech detection on Twitter
N Pitropakis, K Kokot, D Gkatzia, R Ludwiniak, A Mylonas, M Kandias
Machine Learning and Knowledge Extraction 2 (3), 11, 2020
162020
It's All in the Cloud: Reviewing Cloud Security
N Pitropakis, E Darra, N Vrakas, C Lambrinoudakis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
162013
A Practical Steganographic Approach for Matroska Based High Quality Video Files
N Pitropakis, C Lambrinoudakis, D Geneiatakis, D Gritzalis
2013 27th International Conference on Advanced Information Networking and …, 2013
162013
The system can't perform the operation now. Try again later.
Articles 1–20