Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Christoforos Ntantogian"'
Autor:
Stylianos Karagiannis, Emmanouil Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theofanis Fotis
Publikováno v:
Applied Sciences, Vol 13, Iss 18, p 10072 (2023)
Medical imaging plays a crucial role in modern healthcare, providing essential information for accurate diagnosis and treatment planning. The Digital Imaging and Communications in Medicine (DICOM) standard has revolutionized the storage, transmission
Externí odkaz:
https://doaj.org/article/9aba1aa252124e88978b699612655d0b
Autor:
Stylianos Karagiannis, Luís Landeiro Ribeiro, Christoforos Ntantogian, Emmanouil Magkos, Luís Miguel Campos
Publikováno v:
Applied Sciences, Vol 13, Iss 5, p 3061 (2023)
The Internet of Medical Things (IoMT) is a growing trend that has led to the use of connected devices, known as the Internet of Health. The healthcare domain has been a target of cyberattacks, especially with a large number of IoMT devices connected
Externí odkaz:
https://doaj.org/article/b095ffa4e0554aeeb4e0159f776378ce
Autor:
Christoforos Ntantogian
Publikováno v:
Information, Vol 12, Iss 9, p 382 (2021)
Attackers who have a strong motivation to succeed in their nefarious goals are often able to breach the security of their targets and cause havoc [...]
Externí odkaz:
https://doaj.org/article/848833304be946acbc1d463ff7f62bfa
PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises
Autor:
Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Luís L. Ribeiro, Luís Campos
Publikováno v:
Information, Vol 12, Iss 8, p 318 (2021)
Capture the flag (CTF) challenges are broadly used for engaging trainees in the technical aspects of cybersecurity, maintaining hands-on lab exercises, and integrating gamification elements. However, deploying the appropriate digital environment for
Externí odkaz:
https://doaj.org/article/08f0366a1ccb4bb1b4a08922a6f899f1
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 3, Iss 9, Pp 1-8 (2016)
Mobile application developers are using cryptography in their products to protect sensitive data like passwords, short messages, documents etc. In this paper, we study whether cryptography and related techniques are employed in a proper way, in order
Externí odkaz:
https://doaj.org/article/eef47dd40e864be2a3b2784c3eee3ba7
Publikováno v:
Sensors, Vol 21, Iss 8, p 2686 (2021)
Due to its flexibility in terms of charging and billing, the smart grid is an enabler of many innovative energy consumption scenarios. One such example is when a landlord rents their property for a specific period to tenants. Then the electricity bil
Externí odkaz:
https://doaj.org/article/81d76958c2894e778da81b6f71e03406
Publikováno v:
Sensors, Vol 21, Iss 2, p 520 (2021)
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for
Externí odkaz:
https://doaj.org/article/f519c6b9806942c28224acc43a71895e
Publikováno v:
Future Generation Computer Systems. 134:219-235
Web Exploit Kits (EKs) are designed to exploit browsers and browsers plugins vulnerabilities, in order to serve malware without drawing user’s attention. Despite their longevity, EKs have adapted their modus operandi to new malware trends and pose
Autor:
Stylianos Karagiannis, Emmanouil Magkos, Eleutherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian
Due to the evolution of cyberattacks, the need to deploy modern cybersecurity learning environments is constantly increasing. Furthermore, the security challenges of the digital era are inevitably connected to the human factor, which urges personnel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::62ed26985c84e1f2d3759482a4bc2623
https://doi.org/10.21203/rs.3.rs-1902186/v1
https://doi.org/10.21203/rs.3.rs-1902186/v1
Publikováno v:
IET Information Security. 13:570-578
This study advances research in offensive technology by proposing return oriented programming (ROP) as a means to achieve code obfuscation. The key inspiration is that ROP's unique structure poses various challenges to malware analysis compared to tr