default search action
Constantinos Patsakis
Person information
- affiliation: University of Piraeus, Department of Informatics, Greece
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j65]Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis:
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification. Comput. Secur. 149: 104193 (2025) - 2024
- [b3]Aristea Kontogianni, Efthimios Alepis, Maria Virvou, Constantinos Patsakis:
Smart Tourism-The Impact of Artificial Intelligence and Blockchain. Intelligent Systems Reference Library 249, Springer 2024, ISBN 978-3-031-50882-0, pp. 1-178 - [j64]Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis:
Hello me, meet the real me: Voice synthesis attacks on voice assistants. Comput. Secur. 137: 103617 (2024) - [j63]Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis:
The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign. Comput. Secur. 140: 103780 (2024) - [j62]Nikolaos Lykousas, Constantinos Patsakis:
Decoding developer password patterns: A comparative analysis of password extraction and selection practices. Comput. Secur. 145: 103974 (2024) - [j61]Constantinos Patsakis, Fran Casino, Nikolaos Lykousas:
Assessing LLMs in malicious code deobfuscation of real-world malware campaigns. Expert Syst. Appl. 256: 124912 (2024) - [j60]Constantinos Patsakis, Eugenia A. Politou, Efthimios Alepis, Julio C. Hernandez-Castro:
Cashing out crypto: state of practice in ransom payments. Int. J. Inf. Sec. 23(2): 699-712 (2024) - [j59]Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis:
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. Int. J. Inf. Sec. 23(4): 2691-2710 (2024) - [j58]Stephen Gilbert, Francesco Ricciardi, Tauseef Mehrali, Constantinos Patsakis:
Can we learn from an imagined ransomware attack on a hospital at home platform? npj Digit. Medicine 7(1) (2024) - [c73]Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang, Fran Casino:
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection. ESORICS (1) 2024: 271-289 - [i41]Constantinos Patsakis, Fran Casino, Nikolaos Lykousas:
Assessing LLMs in Malicious Code Deobfuscation of Real-world Malware Campaigns. CoRR abs/2404.19715 (2024) - [i40]Constantinos Patsakis, David Arroyo, Fran Casino:
The Malware as a Service ecosystem. CoRR abs/2405.04109 (2024) - [i39]Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang, Fran Casino:
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection. CoRR abs/2408.16400 (2024) - [i38]Daniel Gibert, Nikolaos Totosis, Constantinos Patsakis, Giulio Zizzo, Quan Le:
Assessing the Impact of Packing on Machine Learning-Based Malware Detection and Classification Systems. CoRR abs/2410.24017 (2024) - 2023
- [j57]Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis:
Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents. DTRAP 4(2): 26:1-26:19 (2023) - [j56]Alexandros Zacharis, Constantinos Patsakis:
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition. Int. J. Inf. Sec. 22(5): 1333-1354 (2023) - [c72]Alexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, Demosthenes Ikonomou:
AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict. CyCon 2023: 217-238 - [c71]Nikolaos Lykousas, Constantinos Patsakis:
Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices. EuroS&P Workshops 2023: 68-75 - [c70]Christos Karapapas, George C. Polyzos, Constantinos Patsakis:
What's Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass. SEC 2023: 149-162 - [c69]Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis:
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces. SOSE 2023: 161-171 - [i37]Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis:
Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants. CoRR abs/2302.10328 (2023) - [i36]Constantinos Patsakis, Nikolaos Lykousas:
Man vs the machine: The Struggle for Effective Text Anonymisation in the Age of Large Language Models. CoRR abs/2303.12429 (2023) - [i35]Christos Karapapas, George C. Polyzos, Constantinos Patsakis:
What's inside a node? Malicious IPFS nodes under the magnifying glass. CoRR abs/2306.05541 (2023) - [i34]Nikolaos Lykousas, Constantinos Patsakis:
Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices. CoRR abs/2307.00892 (2023) - [i33]Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis:
The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign. CoRR abs/2310.03498 (2023) - 2022
- [b2]Eugenia A. Politou, Efthimios Alepis, Maria Virvou, Constantinos Patsakis:
Privacy and Data Protection Challenges in the Distributed Era. Springer 2022, ISBN 978-3-030-85442-3, pp. 1-185 - [j55]Fran Casino, Thomas K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, István Böröcz, Agusti Solanas, Mauro Conti, Constantinos Patsakis:
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 10: 25464-25493 (2022) - [j54]Evangelos Mantas, Constantinos Patsakis:
Who watches the new watchmen? The challenges for drone digital forensics investigations. Array 14: 100135 (2022) - [j53]Vasilios Koutsokostas, Nikolaos Lykousas, Theodoros Apostolopoulos, Gabriele Orazi, Amrita Ghosal, Fran Casino, Mauro Conti, Constantinos Patsakis:
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents. Comput. Secur. 114: 102582 (2022) - [j52]Fran Casino, Claudia Pina, Pablo López-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis:
SoK: cross-border criminal investigations and digital evidence. J. Cybersecur. 8(1) (2022) - [j51]Aristea Kontogianni, Efthimios Alepis, Constantinos Patsakis:
Promoting smart tourism personalised services via a combination of deep learning techniques. Expert Syst. Appl. 187: 115964 (2022) - [j50]Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis:
On the effectiveness of binary emulation in malware classification. J. Inf. Secur. Appl. 68: 103258 (2022) - [j49]Darren Hurley-Smith, Constantinos Patsakis, Julio C. Hernandez-Castro:
On the Unbearable Lightness of FIPS 140-2 Randomness Tests. IEEE Trans. Inf. Forensics Secur. 17: 3946-3958 (2022) - [c68]Pablo López-Aguilar, Constantinos Patsakis, Agusti Solanas:
The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review. eCrime 2022: 1-10 - [c67]Vasileios Argyropoulos, Efthimios Alepis, Constantinos Patsakis:
Semi-Decentralized File Sharing as a Service. IISA 2022: 1-8 - [c66]Nikolaos Lykousas, Constantinos Patsakis:
Topic modeling approaches to counter online grooming. WebSci 2022: 471-475 - [i32]Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis:
On the Effectiveness of Binary Emulation in Malware Classification. CoRR abs/2204.04084 (2022) - [i31]Fran Casino, Claudia Pina, Pablo López-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis:
SoK: Cross-border Criminal Investigations and Digital Evidence. CoRR abs/2205.12911 (2022) - [i30]Alexandros Zacharis, Constantinos Patsakis:
AiCEF: An AI-assisted Cyber Exercise Content Generation Framework Using Named Entity Recognition. CoRR abs/2211.10806 (2022) - [i29]Angelos Michalas, Constantinos Patsakis, Dimitrios D. Vergados, Dimitrios J. Vergados:
From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem. CoRR abs/2212.09149 (2022) - 2021
- [j48]Fran Casino, Nikolaos Lykousas, Vasilios Katos, Constantinos Patsakis:
Unearthing malicious campaigns and actors from the blockchain DNS ecosystem. Comput. Commun. 179: 217-230 (2021) - [j47]Nikolaos Lykousas, Constantinos Patsakis:
Large-scale analysis of grooming in modern social networks. Expert Syst. Appl. 176: 114808 (2021) - [j46]Theodoros Apostolopoulos, Vasilios Katos, Kim-Kwang Raymond Choo, Constantinos Patsakis:
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. Future Gener. Comput. Syst. 116: 393-405 (2021) - [j45]Ioannis Tsantilis, Thomas K. Dasaklis, Christos Douligeris, Constantinos Patsakis:
Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets. Informatics 8(4): 86 (2021) - [j44]Constantinos Patsakis, Fran Casino:
Exploiting statistical and structural features for the detection of Domain Generation Algorithms. J. Inf. Secur. Appl. 58: 102725 (2021) - [j43]Christoforos Ntantogian, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis:
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation. J. Inf. Secur. Appl. 58: 102752 (2021) - [j42]Luca Calderoni, Paolo Palmieri, Constantinos Patsakis:
Introduction to the special issue on privacy and security for location-based services and devices. J. Inf. Secur. Appl. 59: 102800 (2021) - [j41]Fran Casino, Nikolaos Lykousas, Ivan Homoliak, Constantinos Patsakis, Julio C. Hernandez-Castro:
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains. J. Netw. Comput. Appl. 190: 103135 (2021) - [j40]George Karantzas, Constantinos Patsakis:
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors. J. Cybersecur. Priv. 1(3): 387-421 (2021) - [j39]Eugenia A. Politou, Fran Casino, Efthimios Alepis, Constantinos Patsakis:
Blockchain Mutability: Challenges and Proposed Solutions. IEEE Trans. Emerg. Top. Comput. 9(4): 1972-1986 (2021) - [c65]Vasilios Koutsokostas, Constantinos Patsakis:
Python and Malware: Developing Stealth and Evasive Malware without Obfuscation. SECRYPT 2021: 125-136 - [p2]Agusti Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, Constantinos Patsakis:
Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach. Security of Ubiquitous Computing Systems 2021: 201-213 - [i28]Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis:
Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents. CoRR abs/2103.16143 (2021) - [i27]Simon Joseph Aquilina, Fran Casino, Mark Vella, Joshua Ellul, Constantinos Patsakis:
EtherClue: Digital investigation of attacks on Ethereum smart contracts. CoRR abs/2104.05293 (2021) - [i26]Vasilios Koutsokostas, Constantinos Patsakis:
Python and Malware: Developing Stealth and Evasive Malware Without Obfuscation. CoRR abs/2105.00565 (2021) - [i25]Evangelos Mantas, Constantinos Patsakis:
Who Watches the New Watchmen? The Challenges for Drone Digital Forensics Investigations. CoRR abs/2105.10917 (2021) - [i24]Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis:
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces. CoRR abs/2105.11805 (2021) - [i23]Fran Casino, Tom K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, István Böröcz, Agusti Solanas, Mauro Conti, Constantinos Patsakis:
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics. CoRR abs/2108.04634 (2021) - [i22]George Karantzas, Constantinos Patsakis:
An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors. CoRR abs/2108.10422 (2021) - 2020
- [j38]Fran Casino, Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis:
Immutability and Decentralized Storage: An Analysis of Emerging Threats. IEEE Access 8: 4737-4744 (2020) - [j37]Athanasios Zigomitros, Fran Casino, Agusti Solanas, Constantinos Patsakis:
A Survey on Privacy Properties for Data Publishing of Relational Data. IEEE Access 8: 51071-51099 (2020) - [j36]Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos:
Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS. IEEE Access 8: 118559-118571 (2020) - [j35]Constantinos Patsakis, Fran Casino, Vasilios Katos:
Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Comput. Secur. 88 (2020) - [j34]Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis, Fran Casino, Mamoun Alazab:
Delegated content erasure in IPFS. Future Gener. Comput. Syst. 112: 956-964 (2020) - [j33]Fran Casino, Constantinos Patsakis:
An Efficient Blockchain-Based Privacy-Preserving Collaborative Filtering Architecture. IEEE Trans. Engineering Management 67(4): 1501-1513 (2020) - [c64]Alexandros Kostopoulos, Ioannis P. Chochliouros, Constantinos Patsakis, Miltos Anastasiadis, Alessandro Guarino:
Protocol Deployment for Employing Honeypot-as-a-Service. AIAI Workshops 2020: 105-115 - [c63]Thomas K. Dasaklis, Fran Casino, Constantinos Patsakis:
A traceability and auditing framework for electronic equipment reverse logistics based on blockchain: the case of mobile phones. IISA 2020: 1-7 - [c62]Effrosyni Sigala, Efthimios Alepis, Constantinos Patsakis:
Measuring the Quality of Street Surfaces in Smart Cities through Smartphone Crowdsensing. IISA 2020: 1-8 - [c61]Alexandros Kostopoulos, Ioannis P. Chochliouros, Theodoros Apostolopoulos, Constantinos Patsakis, George Tsatsanifos, Miltos Anastasiadis, Alessandro Guarino, Bao Tran:
Realising Honeypot-as-a-Service for Smart Home Solutions. SEEDA-CECNSM 2020: 1-6 - [c60]Nikolaos Lykousas, Fran Casino, Constantinos Patsakis:
Inside the X-Rated World of "Premium" Social Media Accounts. SocInfo 2020: 181-191 - [i21]Nikolaos Lykousas, Constantinos Patsakis:
Large-scale analysis of grooming in modern social networks. CoRR abs/2004.08205 (2020) - [i20]Thomas K. Dasaklis, Fran Casino, Constantinos Patsakis:
A traceability and auditing framework for electronic equipment reverse logistics based on blockchain: the case of mobile phones. CoRR abs/2005.11556 (2020) - [i19]Thomas K. Dasaklis, Fran Casino, Constantinos Patsakis:
SoK: Blockchain Solutions for Forensics. CoRR abs/2005.12640 (2020) - [i18]Fran Casino, Nikolaos Lykousas, Ivan Homoliak, Constantinos Patsakis, Julio C. Hernandez-Castro:
Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. CoRR abs/2008.02507 (2020) - [i17]Nikolaos Lykousas, Fran Casino, Constantinos Patsakis:
Inside the x-rated world of "premium" social media accounts. CoRR abs/2009.11952 (2020) - [i16]Constantinos Patsakis, Anargyros Chrysanthou:
Analysing the fall 2020 Emotet campaign. CoRR abs/2011.06479 (2020)
2010 – 2019
- 2019
- [j32]Evangelos Deirmentzoglou, Georgios Papakyriakopoulos, Constantinos Patsakis:
A Survey on Long-Range Attacks for Proof of Stake Protocols. IEEE Access 7: 28712-28725 (2019) - [j31]Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis:
Profiling tax and financial behaviour with big data under the GDPR. Comput. Law Secur. Rev. 35(3): 306-329 (2019) - [j30]Fran Casino, Constantinos Patsakis, Agusti Solanas:
Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation. Electron. Commer. Res. Appl. 38 (2019) - [j29]Constantinos Patsakis, Fran Casino:
Hydras and IPFS: a decentralised playground for malware. Int. J. Inf. Sec. 18(6): 787-799 (2019) - [j28]Efthimios Alepis, Constantinos Patsakis:
Unravelling Security Issues of Runtime Permissions in Android. J. Hardw. Syst. Secur. 3(1): 45-63 (2019) - [j27]Constantinos Patsakis, Kleanthis Dellios, José María de Fuentes, Fran Casino, Agusti Solanas:
External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security. J. Hardw. Syst. Secur. 3(3): 289-303 (2019) - [j26]Fran Casino, Thomas K. Dasaklis, Constantinos Patsakis:
A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics Informatics 36: 55-81 (2019) - [j25]Fran Casino, Kim-Kwang Raymond Choo, Constantinos Patsakis:
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. IEEE Trans. Inf. Forensics Secur. 14(11): 2916-2926 (2019) - [c59]Thomas K. Dasaklis, Fran Casino, Costas Patsakis, Christos Douligeris:
A Framework for Supply Chain Traceability Based on Blockchain Tokens. Business Process Management Workshops 2019: 704-716 - [c58]Thomas K. Dasaklis, Fran Casino, Constantinos Patsakis:
Defining granularity levels for supply chain traceability based on IoT and blockchain. COINS 2019: 184-190 - [c57]José Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis:
Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning. ICISSP 2019: 146-154 - [c56]José Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis:
User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones. ICISSP (Revised Selected Papers) 2019: 250-271 - [c55]Nikolaos Lykousas, Constantinos Patsakis, Andreas Kaltenbrunner, Vicenç Gómez:
Sharing Emotions at Scale: The Vent Dataset. ICWSM 2019: 611-619 - [c54]Charalampos Houlis, Constantinos Patsakis, Efthimios Alepis:
Smart Android Application using Self-Destructive Identities against Cyber Harassment. IISA 2019: 1-7 - [c53]Evangelos Mantas, Constantinos Patsakis:
GRYPHON: Drone Forensics in Dataflash and Telemetry Logs. IWSEC 2019: 377-390 - [c52]Fran Casino, Thomas K. Dasaklis, Constantinos Patsakis:
Enhanced Vendor-managed Inventory through Blockchain. SEEDA-CECNSM 2019: 1-8 - [i15]Nikolaos Lykousas, Constantinos Patsakis, Andreas Kaltenbrunner, Vicenç Gómez:
Sharing emotions at scale: The Vent dataset. CoRR abs/1901.04856 (2019) - [i14]Fran Casino, Kim-Kwang Raymond Choo, Constantinos Patsakis:
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. CoRR abs/1905.11873 (2019) - [i13]Constantinos Patsakis, Fran Casino:
Hydras and IPFS: A Decentralised Playground for Malware. CoRR abs/1905.11880 (2019) - [i12]Eugenia A. Politou, Fran Casino, Efthimios Alepis, Constantinos Patsakis:
Blockchain Mutability: Challenges and Proposed Solutions. CoRR abs/1907.07099 (2019) - [i11]Constantinos Patsakis, Fran Casino, Vasilios Katos:
Encrypted and Covert DNS Queries for Botnets: Challenges and Countermeasures. CoRR abs/1909.07099 (2019) - [i10]Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos:
Unravelling Ariadne's Thread: Exploring the Threats of Decentalised DNS. CoRR abs/1912.03552 (2019) - [i9]Constantinos Patsakis, Fran Casino:
Exploiting Statistical and Structural Features for the Detection of Domain Generation Algorithms. CoRR abs/1912.05849 (2019) - 2018
- [j24]Achilleas Papageorgiou, Michael Strigkos, Eugenia A. Politou, Efthimios Alepis, Agusti Solanas, Constantinos Patsakis:
Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice. IEEE Access 6: 9390-9403 (2018) - [j23]Eugenia A. Politou, Alexandra K. Michota, Efthimios Alepis, Matthias Pocs, Constantinos Patsakis:
Backups and the right to be forgotten in the GDPR: An uneasy relationship. Comput. Law Secur. Rev. 34(6): 1247-1257 (2018) - [j22]Constantinos Patsakis, Athanasios Charemis, Achilleas Papageorgiou, Dimitrios Mermigas, Sotirios Pirounias:
The market's response toward privacy and mass surveillance: The Snowden aftermath. Comput. Secur. 73: 194-206 (2018) - [j21]Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis:
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. J. Cybersecur. 4(1): tyy001 (2018) - [j20]Alexios Nikas, Efthimios Alepis, Constantinos Patsakis:
I know what you streamed last night: On the security and privacy of streaming. Digit. Investig. 25: 78-89 (2018) - [j19]Efthimios Alepis, Constantinos Patsakis:
Session Fingerprinting in Android via Web-to-App Intercommunication. Secur. Commun. Networks 2018: 7352030:1-7352030:13 (2018) - [c51]Francisco Falcone, Costas Patsakis, Agusti Solanas:
Context-Aware Environments in Passenger Train Transportation Systems: Ideas, Feasibility and Risks. ApplePies 2018: 279-285 - [c50]Nikolaos Lykousas, Constantinos Patsakis, Vicenç Gómez:
Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships. ASONAM 2018: 375-382 - [c49]Nikolaos Totosis, Constantinos Patsakis:
Android Hooking Revisited. DASC/PiCom/DataCom/CyberSciTech 2018: 552-559 - [c48]Constantinos Patsakis, Efthimios Alepis:
Knock-Knock: The Unbearable Lightness of Android Notifications. ICISSP 2018: 52-61 - [c47]Angelos Fasoulis, Maria Virvou, George A. Tsihrintzis, Constantinos Patsakis, Efthimios Alepis:
Sensus Vox: Sentiment Mapping Through Smartphone Multi-Sensory Crowdsourcing. ICTAI 2018: 438-444 - [c46]Fran Casino, Peio López-Iturri, Leyre Azpilicueta, Erik Aguirre, Francisco Falcone, Constantinos Patsakis, Agusti Solanas:
Efficient Wireless Channel Characterization in Medicalised Vehicles for Smart Health. IISA 2018: 1-6 - [c45]Thomas K. Dasaklis, Fran Casino, Constantinos Patsakis:
Blockchain Meets Smart Health: Towards Next Generation Healthcare Services. IISA 2018: 1-8 - [i8]Constantinos Patsakis, Efthimios Alepis:
Knock-Knock: The unbearable lightness of Android Notifications. CoRR abs/1801.08225 (2018) - [i7]Nikolaos Lykousas, Vicenç Gómez, Constantinos Patsakis:
Adult content in Social Live Streaming Services: Characterizing deviant users and relationships. CoRR abs/1806.10577 (2018) - 2017
- [j18]Efthimios Alepis, Constantinos Patsakis:
Monkey Says, Monkey Does: Security and Privacy on Voice Assistants. IEEE Access 5: 17841-17851 (2017) - [j17]Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis:
A survey on mobile affective computing. Comput. Sci. Rev. 25: 79-100 (2017) - [j16]Alistair Morris, Constantinos Patsakis, Mélanie Bouroche, Vinny Cahill:
Context Dissemination for Dynamic Urban-Scale Applications. Mob. Networks Appl. 22(2): 305-317 (2017) - [j15]Fran Casino, Constantinos Patsakis, Edgar Batista, Frederic Borras, Antoni Martínez-Ballesté:
Healthy Routes in the Smart City: A Context-Aware Mobile Recommender. IEEE Softw. 34(6): 42-47 (2017) - [c44]Efthimios Alepis, Constantinos Patsakis:
There's Wally! Location Tracking in Android without Permissions. ICISSP 2017: 278-284 - [c43]Efthimios Alepis, Aristea Kontogianni, Constantinos Patsakis:
Mapping the Wireless Coverage Grid for Carrier and User Recommendations through Crowdsourcing. ICTAI 2017: 822-829 - [c42]Efthimios Alepis, Constantinos Patsakis:
Persistent vs Service IDs in Android: Session Fingerprinting from Apps. MONAMI 2017: 14-29 - [c41]Efthimios Alepis, Constantinos Patsakis:
Trapped by the UI: The Android Case. RAID 2017: 334-354 - [c40]Efthimios Alepis, Constantinos Patsakis:
The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android. SpaCCS 2017: 93-107 - [c39]Efthimios Alepis, Constantinos Patsakis:
Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era. SPACE 2017: 53-73 - [i6]Fran Casino, Constantinos Patsakis, Antoni Martínez-Ballesté, Frederic Borras, Edgar Batista:
Technical Report: Implementation and Validation of a Smart Health Application. CoRR abs/1706.04109 (2017) - 2016
- [j14]Panayiotis Kotzanikolaou, Constantinos Patsakis, Emmanouil Magkos, Michalis Korakakis:
Lightweight private proximity testing for geospatial social networks. Comput. Commun. 73: 263-270 (2016) - [j13]Kleanthis Dellios, Constantinos Patsakis, Despina Polemi:
Automobile 2.0: Reformulating the Automotive Platform as an IT System. IT Prof. 18(5): 48-56 (2016) - [c38]Athanasios Zigomitros, Achilleas Papageorgiou, Constantinos Patsakis:
A practical k-anonymous recommender system. IISA 2016: 1-4 - [c37]Vasilis Tsiakos, Constantinos Patsakis:
AndroPatchApp: Taming Rogue Ads in Android. MSPN 2016: 183-196 - 2015
- [j12]Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou, Agusti Solanas:
Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures. Comput. J. 58(4): 518-535 (2015) - [j11]Constantinos Patsakis, Paul Laird, Michael Clear, Mélanie Bouroche, Agusti Solanas:
Interoperable Privacy-Aware E-Participation within Smart Cities. Computer 48(1): 52-58 (2015) - [j10]Fran Casino, Josep Domingo-Ferrer, Constantinos Patsakis, Domenec Puig, Agusti Solanas:
A k-anonymous approach to privacy preserving collaborative filtering. J. Comput. Syst. Sci. 81(6): 1000-1011 (2015) - [c36]Constantinos Patsakis, Athanasios Zigomitros, Agusti Solanas:
Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching. CBMS 2015: 276-279 - [c35]Constantinos Patsakis, Jeroen van Rest, Michal Choras, Mélanie Bouroche:
Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption. DPM/QASA@ESORICS 2015: 169-182 - [c34]Alistair Morris, Constantinos Patsakis, Vinny Cahill, Mélanie Bouroche:
Snapcab: Urban Scale Context-Aware Smart Transport Using Adaptive Context Tries. ICCASA 2015: 31-40 - [c33]Achilleas Papageorgiou, Athanasios Zigomitros, Constantinos Patsakis:
Personalising and crowdsourcing stress management in urban environments via s-Health. IISA 2015: 1-4 - [c32]Edgar Galván López, Marc Schoenauer, Constantinos Patsakis:
Design of an Autonomous Intelligent Demand-Side Management System by using Electric Vehicles as Mobile Energy Storage Units by Means of Evolutionary Algorithms. IJCCI (ECTA) 2015: 106-115 - [c31]Edgar Galván López, Marc Schoenauer, Constantinos Patsakis, Leonardo Trujillo:
Demand-Side Management: Optimising Through Differential Evolution Plug-in Electric Vehicles to Partially Fulfil Load Demand. IJCCI (Selected Papers) 2015: 155-174 - [c30]Fran Casino, Edgar Batista, Constantinos Patsakis, Agusti Solanas:
Context-aware recommender for smart health. ISC2 2015: 1-2 - [c29]Constantinos Patsakis, Achilleas Papageorgiou, Francisco Falcone, Agusti Solanas:
s-health as a driver towards better emergency response systems in urban environments. MeMeA 2015: 214-218 - [c28]Constantinos Patsakis, Athanasios Zigomitros, Agusti Solanas:
Analysis of Privacy and Security Exposure in Mobile Dating Applications. MSPN 2015: 151-162 - [c27]Alistair Morris, Constantinos Patsakis, Mauro Dragone, Atif Manzoor, Vinny Cahill, Mélanie Bouroche:
Urban Scale Context Dissemination in the Internet of Things: Challenge Accepted. NGMAST 2015: 84-89 - [c26]Agusti Solanas, Edgar Batista, Frederic Borras, Antoni Martínez-Ballesté, Constantinos Patsakis:
Wandering Analysis with Mobile Phones - On the Relation Between Randomness and Wandering. PECCS 2015: 168-173 - [c25]Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche:
Private Proximity Testing on Steroids: An NTRU-based Protocol. STM 2015: 172-184 - [i5]Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche:
Private Proximity Testing on Steroids: An NTRU-based Protocol. IACR Cryptol. ePrint Arch. 2015: 917 (2015) - 2014
- [j9]Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. Pérez-Martínez, Roberto Di Pietro, Despina N. Perrea, Antoni Martínez-Ballesté:
Smart health: A context-aware health paradigm within smart cities. IEEE Commun. Mag. 52(8): 74-81 (2014) - [j8]Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou, Edgar Galván López:
Distributing privacy policies over multimedia content across multiple online social networks. Comput. Networks 75: 531-543 (2014) - [j7]Constantinos Patsakis, Kleanthis Dellios, Mélanie Bouroche:
Towards a distributed secure in-vehicle communication architecture for modern vehicles. Comput. Secur. 40: 60-74 (2014) - [j6]Atif Manzoor, Constantinos Patsakis, Alistair Morris, Jessica McCarthy, Gabriel Mullarkey, Han Pham, Siobhán Clarke, Vinny Cahill, Mélanie Bouroche:
CityWatch: exploiting sensor data to manage cities better. Trans. Emerg. Telecommun. Technol. 25(1): 64-80 (2014) - [j5]Sotirios Pirounias, Dimitrios Mermigas, Constantinos Patsakis:
The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study. J. Inf. Secur. Appl. 19(4-5): 257-271 (2014) - [j4]Constantinos Patsakis, Nikolaos Aroukatos:
LSB and DCT steganographic detection using compressive sensing. J. Inf. Hiding Multim. Signal Process. 5(1): 20-32 (2014) - [c24]Constantinos Patsakis, Michael Clear, Paul Laird, Athanasios Zigomitros, Mélanie Bouroche:
Privacy-Aware Large-Scale Virological and Epidemiological Data Monitoring. CBMS 2014: 78-81 - [c23]Athanasios Zigomitros, Agusti Solanas, Constantinos Patsakis:
The Role of Inference in the Anonymization of Medical Records. CBMS 2014: 88-93 - [c22]Constantinos Patsakis, Michael Clear, Paul Laird:
Private Aggregation with Custom Collusion Tolerance. Inscrypt 2014: 72-89 - [c21]Edgar Galván López, Ruohua Li, Constantinos Patsakis, Siobhán Clarke, Vinny Cahill:
Heuristic-Based Multi-Agent Monte Carlo Tree Search. IISA 2014: 177-182 - [c20]Constantinos Patsakis, Riccardo Venanzi, Paolo Bellavista, Agusti Solanas, Mélanie Bouroche:
Personalized medical services using smart cities' infrastructures. MeMeA 2014: 665-669 - [c19]Guojun Qin, Constantinos Patsakis, Mélanie Bouroche:
Playing Hide and Seek with Mobile Dating Applications. SEC 2014: 185-196 - [i4]Michael Clear, Constantinos Patsakis, Paul Laird:
Lightweight Self-Bootstrapping Multiparty Computations of Time-Series Data with Custom Collusion Tolerance. CoRR abs/1402.7118 (2014) - 2013
- [j3]Constantinos Patsakis, Agusti Solanas:
Privacy-aware event data recorders: cryptography meets the automotive industry again. IEEE Commun. Mag. 51(12): 122-128 (2013) - [c18]Constantinos Patsakis:
A cryptographic approach for monitoring patients with mild cognitive impairment and dementia. CBMS 2013: 502-505 - [c17]Dimitrios Mermigas, Constantinos Patsakis, Sotirios Pirounias:
Quantification of information systems security with stochastic calculus. CSIIRW 2013: 47 - [c16]Fran Casino, Constantinos Patsakis, Domenec Puig, Agusti Solanas:
On Privacy Preserving Collaborative Filtering: Current Trends, Open Problems, and New Issues. ICEBE 2013: 244-249 - [c15]Constantinos Patsakis, Agusti Solanas:
Trading Privacy in the Cloud: A Fairer Way to Share Private Information. ICEBE 2013: 413-418 - [c14]Fran Casino, Josep Domingo-Ferrer, Constantinos Patsakis, Domenec Puig, Agusti Solanas:
Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation. ICEBE 2013: 490-497 - [c13]Constantinos Patsakis, Agusti Solanas:
Privacy as a Product: A case study in the m-Health sector. IISA 2013: 1-6 - [c12]Atif Manzoor, Constantinos Patsakis, Jessica McCarthy, Gabriel Mullarkey, Siobhán Clarke, Vinny Cahill, Mélanie Bouroche:
Data Sensing and Dissemination Framework for Smart Cities. MOBILWARE 2013: 156-165 - [c11]Athanasios Zigomitros, Constantinos Patsakis:
Storing Metadata as QR Codes in Multimedia Streams. MTSR 2013: 152-162 - [c10]Constantinos Patsakis:
Recovering RSA Private Keys on Implementations with Tampered LSBs. SECRYPT 2013: 453-460 - [i3]Constantinos Patsakis:
RSA private key reconstruction from random bits using SAT solvers. IACR Cryptol. ePrint Arch. 2013: 26 (2013) - [i2]Constantinos Patsakis, Agusti Solanas:
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments. IACR Cryptol. ePrint Arch. 2013: 489 (2013) - [i1]Constantinos Patsakis:
Anonymous aggregation for lightweight multiparty computations. IACR Cryptol. ePrint Arch. 2013: 661 (2013) - 2012
- [j2]Constantinos Patsakis:
Number Theoretic SETUPs for RSA Like Factoring Based Algorithms. J. Inf. Hiding Multim. Signal Process. 3(2): 191-204 (2012) - [c9]Constantinos Patsakis:
Steganalysis of Statistical Restored Stegoimages with Compressive Sensing. IIH-MSP 2012: 498-501 - [c8]Constantinos Patsakis, Kleanthis Dellios:
Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer. SECRYPT 2012: 221-226 - [c7]Athanasios Zigomitros, Achilleas Papageorgiou, Constantinos Patsakis:
Social Network Content Management through Watermarking. TrustCom 2012: 1381-1386 - 2011
- [c6]Constantinos Patsakis, Nikolaos Aroukatos:
A DCT Steganographic Classifier Based on Compressive Sensing. IIH-MSP 2011: 169-172 - 2010
- [j1]Constantinos Patsakis, Nikolaos Alexandris:
Enhancing 2D GUIs with 3D input devices. Intell. Decis. Technol. 4(3): 211-216 (2010) - [c5]Constantinos Patsakis, Nikolaos Alexandris:
A New SETUP for Factoring Based Algorithms. IIH-MSP 2010: 200-203
2000 – 2009
- 2009
- [c4]Constantinos Patsakis, Alexandros Asthenidis, Abraham Chatzidimitriou:
Social Networks as an Attack Platform: Facebook Case Study. ICN 2009: 245-247 - [c3]Constantinos Patsakis, Evangellos Fountas:
Creating RSA Trapdoors Using Lagrange Four Square Theorem. IIH-MSP 2009: 779-782 - [c2]Constantinos Patsakis, Nikolaos Alexandris, Elina Flerianou:
Enhancing 2D environments with 3D data input. KES IIMSS 2009: 321-326 - 2008
- [b1]Constantinos Patsakis:
Κρυπτανάλυση αλγορίθμων και εφαρμογές της κρυπτογραφίας σε κακόβουλο λογισμικό. University of Piraeus, Greece, 2008 - [c1]Constantinos Patsakis, Nikolaos Alexandris:
Torrent worms. JCKBSE 2008: 108-112 - [p1]Constantinos Patsakis, Nikolaos Alexandris:
Histographic Steganographic System. New Directions in Intelligent Interactive Multimedia 2008: 67-73
Coauthor Index
aka: Efthimios Alepis
aka: Tom K. Dasaklis
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint