The big four-what we did wrong in advanced persistent threat detection? N Virvilis, D Gritzalis 2013 international conference on availability, reliability and security, 248-254, 2013 | 324 | 2013 |
An insider threat prediction model M Kandias, A Mylonas, N Virvilis, M Theoharidou, D Gritzalis Trust, Privacy and Security in Digital Business: 7th International …, 2010 | 260 | 2010 |
The insider threat in cloud computing M Kandias, N Virvilis, D Gritzalis International Workshop on Critical Information Infrastructures Security, 93-103, 2011 | 232 | 2011 |
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? N Virvilis, D Gritzalis, T Apostolopoulos 2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013 | 194 | 2013 |
Changing the game: The art of deceiving sophisticated attackers N Virvilis, B Vanautgaerden, OS Serrano 2014 6th International Conference On Cyber Conflict (CyCon 2014), 87-97, 2014 | 94 | 2014 |
Security Busters: Web browser security vs. rogue sites N Virvilis, A Mylonas, N Tsalis, D Gritzalis Computers & Security 52, 90-105, 2015 | 86 | 2015 |
Mobile devices: A phisher's paradise N Virvilis, N Tsalis, A Mylonas, D Gritzalis 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-9, 2014 | 72 | 2014 |
Browser blacklists: the Utopia of phishing protection N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis E-Business and Telecommunications: 11th International Joint Conference …, 2015 | 51 | 2015 |
Secure cloud storage: Available infrastructures and architectures review and evaluation N Virvilis, S Dritsas, D Gritzalis Trust, Privacy and Security in Digital Business: 8th International …, 2011 | 40 | 2011 |
A cloud provider-agnostic secure storage protocol N Virvilis, S Dritsas, D Gritzalis Critical Information Infrastructures Security: 5th International Workshop …, 2011 | 31 | 2011 |
Big data analytics for sophisticated attack detection N Virvilis, O Serrano, L Dandurand Isaca Journal 3, 22-25, 2014 | 24 | 2014 |
The Big Four-What we did wrong in protecting critical ICT infrastructures from Advanced Persistent Threat detection? N Virvilis, D Gritzalis Proc. of the 8th International Conference on Availability, Reliability …, 0 | 10 | |
Automatic defense against zero-day polymorphic worms in communication networks N Virvilis, D Gritzalis Computers & security, 191-192, 2014 | 3 | 2014 |
Advanced Persistent Threats: The Empire Strikes Back N Virvilis | 1 | 2015 |
Fighting an unfair battle: Unconventional defences against sophisticated threats N Virvilis | | 2015 |
Changing the game: The art of deception against sophisticated attackers N Virvilis, O Serrano | | |
A “human-or-bot” authentication means for VoIP systems in the AmI context N Virvilis, A Mylonas, Y Soupionis, D Gritzalis | | |