default search action
Christoforos Ntantogian
Person information
- affiliation: Ionian University, Department of Informatics, Corfu, Greece
- affiliation (PhD 2009): National and Kapodistrian University of Athens, Greece
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro:
Mastering data privacy: leveraging K-anonymity for robust health data sharing. Int. J. Inf. Sec. 23(3): 2189-2201 (2024) - [j27]Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian:
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams. J. Netw. Syst. Manag. 32(2): 42 (2024) - [c25]Aristeidis Farao, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Alexandra Dritsa, Christos Xenakis:
NITRO: an Interconnected 5G-IoT Cyber Range. ARES 2024: 129:1-129:6 - [c24]Stylianos Karagiannis, Camilla Fusco, Leonidas Agathos, Wissam Mallouli, Valentina Casola, Christoforos Ntantogian, Emmanouil Magkos:
AI-Powered Penetration Testing using Shennina: From Simulation to Validation. ARES 2024: 169:1-169:7 - 2022
- [j26]Panagiotis Bountakas, Christoforos Ntantogian, Christos Xenakis:
EKnad: Exploit Kits' network activity detection. Future Gener. Comput. Syst. 134: 219-235 (2022) - [j25]Christos Lyvas, Christoforos Ntantogian, Christos Xenakis:
[m]allotROPism: a metamorphic engine for malicious software variation development. Int. J. Inf. Sec. 21(1): 61-78 (2022) - [j24]Eleni Veroni, Christoforos Ntantogian, Christos Xenakis:
A large-scale analysis of Wi-Fi passwords. J. Inf. Secur. Appl. 67: 103190 (2022) - [c23]Christian Leka, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Vassilios S. Verykios:
A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities. IISA 2022: 1-6 - 2021
- [j23]Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Luís Landeiro Ribeiro, Luís Campos:
PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises. Inf. 12(8): 318 (2021) - [j22]Christoforos Ntantogian:
Editorial for Special Issue Detecting Attack and Incident Zone System. Inf. 12(9): 382 (2021) - [j21]Christoforos Ntantogian, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis:
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation. J. Inf. Secur. Appl. 58: 102752 (2021) - [j20]Nikolaos Koutroumpouchos, Christoforos Ntantogian, Christos Xenakis:
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone. Sensors 21(2): 520 (2021) - [j19]Aristeidis Farao, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis:
P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go. Sensors 21(8): 2686 (2021) - 2020
- [j18]Vaios Bolgouras, Christoforos Ntantogian, Emmanouil Panaousis, Christos Xenakis:
Distributed Key Management in Microgrids. IEEE Trans. Ind. Informatics 16(3): 2125-2133 (2020) - [c22]Stylianos Karagiannis, Emmanouil Magkos, Christoforos Ntantogian, Luís Landeiro Ribeiro:
Sandboxing the Cyberspace for Cybersecurity Education and Learning. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 181-196 - [e1]Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, M. Angela Sasse:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents]
2010 – 2019
- 2019
- [j17]Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis:
A survey of voice and communication protection solutions against wiretapping. Comput. Electr. Eng. 77: 163-178 (2019) - [j16]Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis:
Evaluation of password hashing schemes in open source web platforms. Comput. Secur. 84: 206-224 (2019) - [j15]Christoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis:
Transforming malicious code to ROP gadgets for antivirus evasion. IET Inf. Secur. 13(6): 570-578 (2019) - [j14]Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis:
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications. Int. J. Inf. Sec. 18(1): 49-72 (2019) - [c21]Aristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier López:
SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications. CRITIS 2019: 169-175 - [c20]Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos:
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation. NetSoft 2019: 84-92 - [c19]Nikolaos Koutroumpouchos, Georgios Lavdanis, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis:
ObjectMap: detecting insecure object deserialization. PCI 2019: 67-72 - [c18]Michail Bampatsikos, Christoforos Ntantogian, Christos Xenakis, Stelios C. A. Thomopoulos:
BARRETT BlockchAin Regulated REmote aTTestation. WI (Companion) 2019: 256-262 - [c17]Farnaz Mohammadi, Angeliki Panou, Christoforos Ntantogian, Eirini D. Karapistoli, Emmanouil Panaousis, Christos Xenakis:
CUREX: seCUre and pRivate hEalth data eXchange. WI (Companion) 2019: 263-268 - 2018
- [j13]Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis:
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem. Comput. Secur. 73: 307-325 (2018) - [c16]Theodoula-Ioanna Kitsaki, Anna Angelogianni, Christoforos Ntantogian, Christos Xenakis:
A forensic investigation of Android mobile applications. PCI 2018: 58-63 - 2017
- [j12]Christoforos Panos, Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis:
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Comput. Networks 113: 94-110 (2017) - [c15]Angeliki Panou, Christoforos Ntantogian, Christos Xenakis:
RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance. PCI 2017: 32:1-32:6 - [c14]Christoforos Panos, Stefanos Malliaros, Christoforos Ntantogian, Angeliki Panou, Christos Xenakis:
A Security Evaluation of FIDO's UAF Protocol in Mobile and Embedded Devices. TIWDC 2017: 127-142 - 2016
- [j11]Christos Xenakis, Christoforos Ntantogian, Orestis Panos:
(U)SimMonitor: A mobile application for security evaluation of cellular networks. Comput. Secur. 60: 62-78 (2016) - [j10]Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis:
Evaluation of Cryptography Usage in Android Applications. EAI Endorsed Trans. Security Safety 3(9): e4 (2016) - [c13]Stefanos Malliaros, Christoforos Ntantogian, Christos Xenakis:
Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks. ARES 2016: 687-693 - 2015
- [j9]Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis:
Gaithashing: A two-factor authentication scheme based on gait features. Comput. Secur. 52: 17-32 (2015) - [c12]Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis:
Evaluation of Cryptography Usage in Android Applications. BICT 2015: 83-90 - [c11]Christos Xenakis, Christoforos Ntantogian:
Attacking the baseband modem of mobile phones to breach the users' privacy and network security. CyCon 2015: 231-244 - [c10]Christoforos Ntantogian, Grigoris Valtas, Nikos Kapetanakis, Faidon Lalagiannis, Georgios Karopoulos, Christos Xenakis:
Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software. TrustBus 2015: 73-86 - 2014
- [j8]Christos Xenakis, Christoforos Ntantogian:
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks. Comput. Secur. 40: 84-94 (2014) - [j7]Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis:
Evaluating the privacy of Android mobile applications under forensic analysis. Comput. Secur. 42: 66-76 (2014) - [c9]Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis:
Bypassing XSS Auditor: Taking advantage of badly written PHP code. ISSPIT 2014: 290-295 - 2013
- [c8]Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis:
Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices. I3E 2013: 178-185 - [c7]Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis:
The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks. ISSPIT 2013: 135-139 - [c6]Charalampos Petrou, Christoforos Ntantogian, Christos Xenakis:
A Better Time Approximation Scheme for e-Passports. TrustBus 2013: 13-23 - 2012
- [j6]Christoforos Ntantogian, Christos Xenakis:
Questioning the Feasibility of UMTS-GSM Interworking Attacks. Wirel. Pers. Commun. 65(1): 157-163 (2012) - [c5]Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis:
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks. SEC 2012: 475-488 - 2011
- [j5]Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis:
Reducing False Synchronizations in 3G-WLAN Integrated Networks. IEEE Trans. Wirel. Commun. 10(11): 3765-3773 (2011) - [c4]Eleni Darra, Christoforos Ntantogian, Christos Xenakis, Sokratis K. Katsikas:
A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks. TrustBus 2011: 138-149 - 2010
- [j4]Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis:
A generic mechanism for efficient authentication in B3G networks. Comput. Secur. 29(4): 460-475 (2010)
2000 – 2009
- 2009
- [b1]Christoforos Ntantogian:
Μελέτη και σχεδιασμός μηχανισμού δρομολόγησης για δίκτυα αισθητήρων. National and Kapodistrian University of Athens, Greece, 2009 - [j3]Christoforos Ntantogian, Christos Xenakis:
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks. Wirel. Pers. Commun. 48(4): 569-584 (2009) - 2008
- [j2]Christos Xenakis, Christoforos Ntantogian, Ioannis Stavrakakis:
A network-assisted mobile VPN for securing users data in UMTS. Comput. Commun. 31(14): 3315-3327 (2008) - 2007
- [j1]Christos Xenakis, Christoforos Ntantogian:
Security architectures for B3G mobile networks. Telecommun. Syst. 35(3-4): 123-139 (2007) - [c3]Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis:
Efficient Authentication for Users Autonomy in Next Generation All-IP Networks. BIONETICS 2007: 295-300 - [c2]Christoforos Ntantogian, Christos Xenakis:
A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks. PIMRC 2007: 1-5 - [c1]Christoforos Ntantogian, Christos Xenakis:
Reducing Authentication Traffic in 3G-WLAN Integrated Networks. PIMRC 2007: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint