Dimitrios Damopoulos
Dimitrios Damopoulos
Associate Professor Computer Science, University of South Alabama
Verified email at aegean.gr - Homepage
Title
Cited by
Cited by
Year
Introducing touchstroke: keystroke‐based authentication system for smartphones
G Kambourakis, D Damopoulos, D Papamartzivanos, E Pavlidakis
Security and Communication Networks 9 (6), 542-554, 2016
1032016
A critical review of 7 years of Mobile Device Forensics
K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos
Digital Investigation 10 (4), 323-349, 2013
1012013
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
892012
From keyloggers to touchloggers: Take the rough with the smooth
D Damopoulos, G Kambourakis, S Gritzalis
Computers & security 32, 102-114, 2013
592013
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones
D Damopoulos, G Kambourakis, G Portokalidis
Proceedings of the seventh european workshop on system security, 1-6, 2014
462014
iSAM: an iPhone stealth airborne malware
D Damopoulos, G Kambourakis, S Gritzalis
IFIP International Information Security Conference, 17-28, 2011
432011
A cloud-based architecture to crowdsource mobile app privacy leaks
D Papamartzivanos, D Damopoulos, G Kambourakis
Proceedings of the 18th Panhellenic Conference on Informatics, 1-6, 2014
342014
Exposing mobile malware from the inside (or what is your mobile app really doing?)
D Damopoulos, G Kambourakis, S Gritzalis, SO Park
Peer-to-Peer Networking and Applications 7 (4), 687-697, 2014
292014
MILC: A secure and privacy-preserving mobile instant locator with chatting
A Loukas, D Damopoulos, SA Menesidou, ME Skarkala, G Kambourakis, ...
Information Systems Frontiers 14 (3), 481-497, 2012
282012
User privacy and modern mobile services: are they on the same path?
D Damopoulos, G Kambourakis, M Anagnostopoulos, S Gritzalis, JH Park
Personal and ubiquitous computing 17 (7), 1437-1448, 2013
272013
Location-enhanced authentication using the IoT: because you cannot be in two places at once
I Agadakos, P Hallgren, D Damopoulos, A Sabelfeld, G Portokalidis
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
142016
A competent post-authentication and non-repudiation biometric-based scheme for m-learning
G Kambourakis, D Damopoulos
Proceedings of the 10th IASTED International Conference on Web-based …, 2013
112013
Let’s Meet! A participatory-based discovery and rendezvous mobile marketing framework
L Ntalkos, G Kambourakis, D Damopoulos
Telematics and Informatics 32 (4), 539-563, 2015
102015
Hands-Free one-Time and continuous authentication using glass wearable devices
D Damopoulos, G Kambourakis
Journal of Information Security and Applications 46, 138-150, 2019
62019
Europe in the shadow of financial crisis: Policy Making via Stance Classification
L Spiliotopoulou, D Damopoulos, Y Charalabidis, M Maragoudakis, ...
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
32017
User-privacy and modern smartphones: A Siri(ous) dilemma
D Damopoulos, G Kambourakis, M Anagnostopoulos, S Gritzalis, JH Park
FTRA AIM 2012 International Conference on Advanced IT, 2012
32012
Intrusion Detection and Prevention for Mobile Ecosystems
G Kambourakis, A Shabtai, C Kolias, D Damopoulos
CRC Press, 2017
12017
From fuzziness to criminal investigation: An inference system for mobile forensics
K Barmpatsalou, T Cruz, E Monteiro, P Simoes, G Kambourakis, ...
Intrusion Detection and Prevention for Mobile Ecosystems, 2017
12017
Location-enhanced Authentication using the IoT
I Agadakos, P Hallgren, D Damopoulos, A Sabelfeld, G Portokalidis
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
12016
Introducing Research into the Undergraduate Curriculum in Cybersecurity
D Damopoulos, S Wetzel
IFIP World Conference on Information Security Education, 30-42, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20