Follow
Christoforos Dadoyan (Ntantogian)
Christoforos Dadoyan (Ntantogian)
Ionian University - Department of Informatics
Verified email at ionio.gr - Homepage
Title
Cited by
Cited by
Year
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks
C Panos, C Ntantogian, S Malliaros, C Xenakis
Computer Networks 113, 94-110, 2017
802017
Evaluating the privacy of Android mobile applications under forensic analysis
C Ntantogian, D Apostolopoulos, G Marinakis, C Xenakis
Computers & Security 42, 66-76, 2014
612014
Evaluation of cryptography usage in android applications
A Chatzikonstantinou, C Ntantogian, G Karopoulos, C Xenakis
Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016
572016
One-pass EAP-AKA authentication in 3G-WLAN integrated networks
C Ntantogian, C Xenakis
Wireless personal communications 48 (4), 569-584, 2009
412009
Evaluation of password hashing schemes in open source web platforms
C Ntantogian, S Malliaros, C Xenakis
Computers & Security 84, 206-224, 2019
402019
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
A Stasinopoulos, C Ntantogian, C Xenakis
International Journal of Information Security 18 (1), 49-72, 2019
402019
Discovering authentication credentials in volatile memory of android mobile devices
D Apostolopoulos, G Marinakis, C Ntantogian, C Xenakis
Conference on e-Business, e-Services and e-Society, 178-185, 2013
392013
Gaithashing: a two-factor authentication scheme based on gait features
C Ntantogian, S Malliaros, C Xenakis
Computers & Security 52, 17-32, 2015
292015
Secure edge computing with lightweight control-flow property-based attestation
N Koutroumpouchos, C Ntantogian, SA Menesidou, K Liang, P Gouvas, ...
2019 IEEE Conference on Network Softwarization (NetSoft), 84-92, 2019
282019
P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go
A Farao, E Veroni, C Ntantogian, C Xenakis
Sensors 21 (8), 2686, 2021
252021
CUREX: seCUre and pRivate hEalth data eXchange
F Mohammadi, A Panou, C Ntantogian, E Karapistoli, E Panaousis, ...
IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume …, 2019
252019
A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices
C Panos, S Malliaros, C Ntantogian, A Panou, C Xenakis
International Tyrrhenian Workshop on Digital Communication, 127-142, 2017
252017
Commix: Detecting and exploiting command injection flaws.
A Stasinopoulos, C Ntantogian, C Xenakis
Department of Digital Systems, University of Piraeus, BlackHat Europe, Nov …, 2015
252015
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
N Koutroumpouchos, C Ntantogian, C Xenakis
Sensors 21 (2), 520, 2021
242021
Attacking the baseband modem of mobile phones to breach the users' privacy and network security
C Xenakis, C Ntantogian
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
222015
ObjectMap: detecting insecure object deserialization
N Koutroumpouchos, G Lavdanis, E Veroni, C Ntantogian, C Xenakis
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 67-72, 2019
212019
Distributed key management in microgrids
V Bolgouras, C Ntantogian, E Panaousis, C Xenakis
IEEE Transactions on Industrial Informatics 16 (3), 2125-2133, 2019
212019
Transforming malicious code to ROP gadgets for antivirus evasion
C Ntantogian, G Poulios, G Karopoulos, C Xenakis
IET Information Security 13 (6), 570-578, 2019
202019
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem
G Karopoulos, C Ntantogian, C Xenakis
Computers & Security 73, 307-325, 2018
202018
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
C Xenakis, C Ntantogian
Computers & Security 40, 84-94, 2014
202014
The system can't perform the operation now. Try again later.
Articles 1–20