Nikolaos Pitropakis
Nikolaos Pitropakis
Verified email at napier.ac.uk
Title
Cited by
Cited by
Year
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
882017
A taxonomy and survey of attacks against machine learning
N Pitropakis, E Panaousis, T Giannetsos, E Anastasiadis, G Loukas
Computer Science Review 34, 100199, 2019
482019
Cloud computing security: foundations and challenges
JR Vacca
CRC Press, 2016
272016
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments
N Pitropakis, A Pikrakis, C Lambrinoudakis
International Journal of Information Security 14 (4), 299-305, 2015
182015
Till all are one: Towards a unified cloud IDS
N Pitropakis, C Lambrinoudakis, D Geneiatakis
International Conference on Trust and Privacy in Digital Business, 136-149, 2015
142015
A Practical Steganographic Approach for Matroska Based High Quality Video Files
N Pitropakis, C Lambrinoudakis, D Geneiatakis, D Gritzalis
2013 27th International Conference on Advanced Information Networking and …, 2013
132013
Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier
AJ Hall, N Pitropakis, WJ Buchanan, N Moradpoor
2018 IEEE International Conference on Big Data (Big Data), 5034-5039, 2018
122018
An enhanced cyber attack attribution framework
N Pitropakis, E Panaousis, A Giannakoulias, G Kalpakis, RD Rodriguez, ...
International Conference on Trust and Privacy in Digital Business, 213-228, 2018
122018
It's All in the Cloud: Reviewing Cloud Security
N Pitropakis, E Darra, N Vrakas, C Lambrinoudakis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
112013
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments
N Pitropakis, D Anastasopoulou, A Pikrakis, C Lambrinoudakis
Journal of Cloud Computing 3 (1), 1-10, 2014
102014
The greater the power, the more dangerous the abuse: facing malicious insiders in the cloud
N Pitropakis, C Lyvas, C Lambrinoudakis
London South Bank University, 2017
72017
A Distributed Trust Framework for Privacy-Preserving Machine Learning
W Abramson, AJ Hall, P Papadopoulos, N Pitropakis, WJ Buchanan
International Conference on Trust and Privacy in Digital Business, 205-220, 2020
62020
Privacy-Preserving Passive DNS
P Papadopoulos, N Pitropakis, WJ Buchanan, O Lo, S Katsikas
Computers 9 (3), 64, 2020
42020
Phishing url detection through top-level domain analysis: A descriptive approach
O Christou, N Pitropakis, P Papadopoulos, S McKeown, WJ Buchanan
arXiv preprint arXiv:2005.06599, 2020
42020
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric
C Stamatellis, P Papadopoulos, N Pitropakis, S Katsikas, WJ Buchanan
Sensors 20 (22), 6587, 2020
42020
Review and critical analysis of privacy-preserving infection tracking and contact tracing
WJ Buchanan, MA Imran, MU Rehman, L Zhang, QH Abbasi, ...
Frontiers in Communications and Networks 1, 2, 2020
42020
Towards an augmented authenticator in the Cloud
N Pitropakis, N Yfantopoulos, D Geneiatakis, C Lambrinoudakis
2014 IEEE International Symposium on Signal Processing and Information …, 2014
32014
Privacy and trust redefined in federated machine learning
P Papadopoulos, W Abramson, AJ Hall, N Pitropakis, WJ Buchanan
Machine Learning and Knowledge Extraction 3 (2), 333-356, 2021
22021
Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection
P Kantartopoulos, N Pitropakis, A Mylonas, N Kylilis
Technologies 8 (4), 64, 2020
22020
Monitoring Users’ Behavior: Anti-Immigration Speech Detection on Twitter
N Pitropakis, K Kokot, D Gkatzia, R Ludwiniak, A Mylonas, M Kandias
Machine Learning and Knowledge Extraction 2 (3), 192-215, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20