Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Iasonas Polakis"'
Autor:
Sotiris Ioannidis, Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Paraskevi Fragopoulou
Publikováno v:
Social Network Analysis and Mining. 6
Twitter is an online social network (OSN) with approximately 650 million users. It has been fairly characterized as one of the most influential OSNs since it includes public figures, organizations, news media and official authorities. Twitter has an
Publikováno v:
IEEE Symposium on Security and Privacy
The widespread demand for online privacy, also fueled by widely-publicized demonstrations of session hijacking attacks against popular websites, has spearheaded the increasing deployment of HTTPS. However, many websites still avoid ubiquitous encrypt
Publikováno v:
EuroS&P
Since their inception, captchas have been widely used for preventing fraudsters from performing illicit actions. Nevertheless, economic incentives have resulted in an arms race, where fraudsters develop automated solvers and, in turn, captcha service
Autor:
Sotiris Ioannidis, Iasonas Polakis, Zacharias Tzermias, Panagiotis Ilia, Paraskevi Fragopoulou
Publikováno v:
BADGERS@RAID
The use of online social networks and other digital communication services has become a prevalent activity of everyday life. As such, users' social footprints contain a massive amount of data, including exchanged messages, location information and ph
Publikováno v:
ACM Conference on Computer and Communications Security
Location proximity schemes have been adopted by social networks and other smartphone apps as a means of balancing user privacy with utility. However, misconceptions about the privacy offered by proximity services have rendered users vulnerable to tri
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319205496
DIMVA
DIMVA
Battery technology seems unable to keep up with the rapid evolution of smartphones and their applications, which continuously demand more and more energy. Modern smartphones, with their plethora of application scenarios and usage habits, are setting
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4a66ff3438c0af80c0fa14af14d40437
https://doi.org/10.1007/978-3-319-20550-2_9
https://doi.org/10.1007/978-3-319-20550-2_9
Publikováno v:
ACM Conference on Computer and Communications Security
The capabilities of modern devices, coupled with the almost ubiquitous availability of Internet connectivity, have resulted in photos being shared online at an unprecedented scale. This is further amplified by the popularity of social networks and th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2ec924c0fe1d1a8a5819a4bac57352d7
http://hdl.handle.net/11311/988649
http://hdl.handle.net/11311/988649
Autor:
Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Paraskevi Fragopoulou, Sotiris Ioannidis
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319151670
SocInfo Workshops
SocInfo Workshops
Twitter is one of the most influential Online Social Networks (OSNs), adopted not only by hundreds of millions of users but also by public figures, organizations, news media, and official authorities. One of the factors contributing to this success i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c20cef542e1c2e924b15b9300aff32cd
https://doi.org/10.1007/978-3-319-15168-7_49
https://doi.org/10.1007/978-3-319-15168-7_49
Publikováno v:
BADGERS@ESORICS
We describe our experience gained while exploring practical security and privacy problems in a real-world, large- scale social network (i.e., Facebook), and summarize our conclusions in a series of "lessons learned". We first conclude that it is bett
Autor:
Angelos D. Keromytis, Federico Maggi, Marco Lancini, Sotiris Ioannidis, Stefano Zanero, Panagiotis Ilia, Iasonas Polakis, Georgios Kontaxis
Publikováno v:
ACM Conference on Computer and Communications Security
In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called social authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Rece
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c635d055f5247e6c1d8f3536cde627fa
http://hdl.handle.net/11311/881383
http://hdl.handle.net/11311/881383