default search action
Vasileios Vlachos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Vasileios Vlachos, Yannis C. Stamatiou, Sotiris E. Nikoletseas:
The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation. J. Cybersecur. Priv. 3(1): 26-43 (2023) - 2022
- [j7]Vasileios Vlachos, Yannis C. Stamatiou, Pantelis Tzamalis, Sotiris E. Nikoletseas:
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats. Int. J. Inf. Sec. 21(5): 1091-1106 (2022) - 2021
- [c21]Ioannis Bothos, Vasileios Vlachos, Dimitris M. Kyriazanos, Ioannis C. Stamatiou, Konstantinos Giorgios Thanos, Pantelis Tzamalis, Sotirios E. Nikoletseas, Stelios C. A. Thomopoulos:
Modelling Cyber-Risk in an Economic Perspective. CSR 2021: 372-377 - [c20]Vasileios Vlachos, Gerasimos Katevas, Ioannis Katsidimas, Emmanouil Kerimakis, Sotiris E. Nikoletseas, Stefanos Panagiotou, Paul G. Spirakis:
ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector. PCI 2021: 362-368 - [c19]Theodoros Siklafidis, Vasileios Vlachos:
LIDS - An easy to use and lightweight, infectious disease simaulator. SEEDA-CECNSM 2021: 1-6 - 2020
- [c18]Dimitrios Tsiostas, George Kittes, Nestoras Chouliaras, Ioanna Kantzavelou, Leandros Maglaras, Christos Douligeris, Vasileios Vlachos:
The Insider Threat: Reasons, Effects and Mitigation Techniques. PCI 2020: 340-345
2010 – 2019
- 2019
- [c17]Vasileios Vlachos, Theodoros Siklafidis, Kyriaki Chantzi:
GRATIS: A GRaph Tool for Information Systems Scientists. SEEDA-CECNSM 2019: 1-6 - 2017
- [c16]Vasileios Vlachos, Yannis C. Stamatiou, Adelina Madhja, Sotiris E. Nikoletseas:
Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks. PCI 2017: 27:1-27:4 - [c15]Ioannis P. Chochliouros, Sébastien Ziegler, Luca Bolognini, Nancy Alonistioti, Makis Stamatelatos, Panagiotis Kontopoulos, George Mourikas, Vasileios Vlachos, Nenad Gligoric, Marita Holst:
Enabling Crowd-sourcing-based Privacy Risk Assessment in EU: the Privacy Flag Project. PCI 2017: 31:1-31:2 - [e1]Vasileios Vlachos, Ilias K. Savvas, Cleo Sgouropoulou, Vassilis P. Plagianakos, Christos Douligeris, Ioannis Voyiatzis, Vassilis Tampakas, George Soultis:
Proceedings of the 21st Pan-Hellenic Conference on Informatics, Larissa, Greece, September 28-30, 2017. ACM 2017, ISBN 978-1-4503-5355-7 [contents] - 2016
- [c14]Iosif Androulidakis, Sergio Huerta, Vasileios Vlachos, Igor Santos:
Epidemic model for malware targeting telephony networks. ICT 2016: 1-5 - [c13]Maria Dimou, Theofilos Kossyvakis, Costas Chaikalis, Konstantinos P. Tsoukatos, Charalampos Liolios, Vasileios Vlachos:
Topology Experimentation in a Zigbee Wireless Sensor Network. PCI 2016: 51 - 2015
- [c12]Costas Chaikalis, Charalampos Liolios, Vasileios Vlachos:
An LTE reconfigurable SOVA/log-MAP turbo decoder for uncorrelated Rayleigh fading. CITS 2015: 1-5 - 2014
- [j6]Spyridon Kollias, Vasileios Vlachos, Alexandros Papanikolaou, Periklis Chatzimisios, Christos Ilioudis, Kostas S. Metaxiotis:
A global-local approach for estimating the Internet's threat level. J. Commun. Networks 16(4): 407-414 (2014) - [c11]Spyridon Kollias, Vasileios Vlachos, Alexandros Papanikolaou, Periklis Chatzimisios, Christos Ilioudis, Kostas S. Metaxiotis:
Measuring the Internet's threat level: A global-local approach. ISCC 2014: 1-6 - 2013
- [j5]Alexandros Papanikolaou, Vasileios Vlachos, Andreas Venieris, Christos Ilioudis, Konstantinos Papapanagiotou, Anastasios Stasinopoulos:
A framework for teaching network security in academic environments. Inf. Manag. Comput. Secur. 21(4): 315-338 (2013) - [c10]Iosif Androulidakis, Vasileios Vlachos, Alexandros Papanikolaou:
FIMESS: filtering mobile external SMS spam. BCI 2013: 221-227 - [c9]Anastasios Papathanasiou, Alexandros Papanikolaou, Vasileios Vlachos, Konstantinos Chaikalis, Maria Dimou, Magdalini Karadimou, Vaia Katsoula:
Legal and Social Aspects of Cyber Crime in Greece. e-Democracy 2013: 153-164 - [c8]Nicholas S. Samaras, Konstantinos Kokkinos, Costas Chaikalis, Vasileios Vlachos:
On intrusion detection in opportunistic networks. Panhellenic Conference on Informatics 2013: 67-74 - 2011
- [j4]Vasileios Vlachos, Marilena Minou, Vassilis Assimakopoulos, Androniki Toska:
The Landscape of Cybercrime in Greece. Inf. Manag. Comput. Secur. 19(2): 113-123 (2011) - [c7]Spyros K. Kollias, Vasileios Vlachos, Alexandros Papanikolaou, Vassilis Assimakopoulos:
Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security Data. SysSec@DIMVA 2011: 59-62 - [c6]Vasileios Vlachos, Christos Ilioudis, Alexandros Papanikolaou:
On the Evolution of Malware Species. ICGS3/e-Democracy 2011: 54-61 - [c5]Alexandros Papanikolaou, Vassilios Karakoidas, Vasileios Vlachos, Andreas Venieris, Christos Ilioudis, Georgios Zouganelis:
A Hacker's Perspective on Educating Future Security Experts. Panhellenic Conference on Informatics 2011: 68-72 - 2010
- [c4]Paul G. Spirakis, Vasileios Vlachos, Vassilios Karakoidas, Dimitrios Liappis, Dimitris Kalaitzis, Eftychios Valeontis, Spyros K. Kollias, George Argyros:
Blueprints for a Large-Scale Early Warning System. Panhellenic Conference on Informatics 2010: 7-11
2000 – 2009
- 2009
- [c3]Vasileios Vlachos, Diomidis Spinellis, Stephanos Androutsellis-Theotokis:
Biological Aspects of Computer Virology. e-Democracy 2009: 209-219 - 2008
- [j3]Panagiotis Louridas, Diomidis Spinellis, Vasileios Vlachos:
Power laws in software. ACM Trans. Softw. Eng. Methodol. 18(1): 2:1-2:26 (2008) - 2007
- [j2]Vasileios Vlachos, Diomidis Spinellis:
A PRoactive malware identification system based on the computer hygiene principles. Inf. Manag. Comput. Secur. 15(4): 295-312 (2007) - 2006
- [c2]Stephanos Androutsellis-Theotokis, Diomidis Spinellis, Vasileios Vlachos:
The MoR-Trust Distributed Trust Management System: Design and Simulation Results. STM 2006: 3-15 - 2005
- [c1]Vasileios Vlachos, Vassiliki Vouzi, Damianos Chatziantoniou, Diomidis Spinellis:
NGCE - Network Graphs for Computer Epidemiologists. Panhellenic Conference on Informatics 2005: 672-683 - 2004
- [j1]Vasileios Vlachos, Stephanos Androutsellis-Theotokis, Diomidis Spinellis:
Security applications of peer-to-peer networks. Comput. Networks 45(2): 195-205 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint