Nikos Virvilis
Nikos Virvilis
Verified email at
Cited by
Cited by
The big four-what we did wrong in advanced persistent threat detection?
N Virvilis, D Gritzalis
2013 international conference on availability, reliability and security, 248-254, 2013
An insider threat prediction model
M Kandias, A Mylonas, N Virvilis, M Theoharidou, D Gritzalis
Trust, Privacy and Security in Digital Business: 7th International …, 2010
The insider threat in cloud computing
M Kandias, N Virvilis, D Gritzalis
Critical Information Infrastructure Security: 6th International Workshop …, 2013
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
N Virvilis, D Gritzalis, T Apostolopoulos
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
Changing the game: The art of deceiving sophisticated attackers
N Virvilis, B Vanautgaerden, OS Serrano
2014 6th International Conference On Cyber Conflict (CyCon 2014), 87-97, 2014
Security Busters: Web browser security vs. rogue sites
N Virvilis, A Mylonas, N Tsalis, D Gritzalis
Computers & Security 52, 90-105, 2015
Mobile devices: A phisher's paradise
N Virvilis, N Tsalis, A Mylonas, D Gritzalis
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-9, 2014
Browser blacklists: the Utopia of phishing protection
N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis
E-Business and Telecommunications: 11th International Joint Conference …, 2015
Secure cloud storage: Available infrastructures and architectures review and evaluation
N Virvilis, S Dritsas, D Gritzalis
Trust, Privacy and Security in Digital Business: 8th International …, 2011
A cloud provider-agnostic secure storage protocol
N Virvilis, S Dritsas, D Gritzalis
Critical Information Infrastructures Security: 5th International Workshop …, 2011
Big data analytics for sophisticated attack detection
N Virvilis, O Serrano, L Dandurand
Isaca Journal 3, 22-25, 2014
The Big Four-What we did wrong in protecting critical ICT infrastructures from Advanced Persistent Threat detection?
N Virvilis, D Gritzalis
Proc. of the 8th International Conference on Availability, Reliability …, 0
Automatic defense against zero-day polymorphic worms in communication networks
N Virvilis, D Gritzalis
Computers & security, 191-192, 2014
Advanced Persistent Threats: The Empire Strikes Back
N Virvilis
Fighting an unfair battle: Unconventional defences against sophisticated threats
N Virvilis
Changing the game: The art of deception against sophisticated attackers
N Virvilis, O Serrano
A “human-or-bot” authentication means for VoIP systems in the AmI context
N Virvilis, A Mylonas, Y Soupionis, D Gritzalis
The system can't perform the operation now. Try again later.
Articles 1–17