default search action
Emmanouil Magkos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro:
Mastering data privacy: leveraging K-anonymity for robust health data sharing. Int. J. Inf. Sec. 23(3): 2189-2201 (2024) - [j21]Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian:
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams. J. Netw. Syst. Manag. 32(2): 42 (2024) - [c34]Aristeidis Farao, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Alexandra Dritsa, Christos Xenakis:
NITRO: an Interconnected 5G-IoT Cyber Range. ARES 2024: 129:1-129:6 - [c33]Stylianos Karagiannis, Camilla Fusco, Leonidas Agathos, Wissam Mallouli, Valentina Casola, Christoforos Ntantogian, Emmanouil Magkos:
AI-Powered Penetration Testing using Shennina: From Simulation to Validation. ARES 2024: 169:1-169:7 - 2023
- [e2]Emmanouil Magkos, Stylianos Karagiannis, Luís Campos:
Proceedings of the Workshop on Research Projects Track @ RCIS 2023 co-located with RCIS 2023, Corfu, Greece, May 23, 2023. CEUR Workshop Proceedings 3601, CEUR-WS.org 2023 [contents] - 2022
- [c32]Christian Leka, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Vassilios S. Verykios:
A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities. IISA 2022: 1-6 - 2021
- [j20]Stylianos Karagiannis, Emmanouil Magkos:
Adapting CTF challenges into virtual cybersecurity learning environments. Inf. Comput. Secur. 29(1): 105-132 (2021) - [j19]Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Luís Landeiro Ribeiro, Luís Campos:
PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises. Inf. 12(8): 318 (2021) - [j18]Luca Piras, Mohammed Ghazi Al-Obeidallah, Michalis Pavlidis, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano:
A Data Scope Management Service to Support Privacy by Design and GDPR Compliance. J. Data Intell. 2(2): 136-165 (2021) - [c31]Stylianos Karagiannis, Marco Manso, Emmanouil Magkos, Luís Landeiro Ribeiro, Luís Campos:
Automated and On-Demand Cybersecurity Certification. CSR 2021: 174-179 - [c30]Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos, Günther Pernul:
A Digital Twin-Based Cyber Range for SOC Analysts. DBSec 2021: 293-311 - [c29]Stylianos Karagiannis, Alexandros Tokatlis, Sotiris Pelekis, Michael Kontoulis, George Doukas, Christos Ntanos, Emmanouil Magkos:
A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study. PCI 2021: 328-333 - 2020
- [j17]Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Inf. Comput. Secur. 28(4): 531-553 (2020) - [c28]Stylianos Karagiannis, Thanos Papaioannou, Emmanouil Magkos, Aggeliki Tsohou:
Game-Based Information Security/Privacy Education and Awareness: Theory and Practice. EMCIS 2020: 509-525 - [c27]Stylianos Karagiannis, Emmanouil Magkos, Christoforos Ntantogian, Luís Landeiro Ribeiro:
Sandboxing the Cyberspace for Cybersecurity Education and Learning. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 181-196 - [c26]Luca Piras, Mohammed Ghazi Al-Obeidallah, Michalis Pavlidis, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano, Annarita Iodice, Beatriz Gallego-Nicasio Crespo:
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance. TrustBus 2020: 186-201 - [c25]Stylianos Karagiannis, Elpidoforos Maragkos-Belmpas, Emmanouil Magkos:
An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools. WISE 2020: 61-77
2010 – 2019
- 2019
- [c24]Luca Piras, Mohammed Ghazi Al-Obeidallah, Andrea Praitano, Aggeliki Tsohou, Haralambos Mouratidis, Beatriz Gallego-Nicasio Crespo, Jean Baptiste Bernard, Marco Fiorani, Emmanouil Magkos, Andrès Castillo Sanz, Michalis Pavlidis, Roberto D'Addario, Giuseppe Giovanni Zorzino:
DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance. TrustBus 2019: 78-93 - 2017
- [c23]Chrysanthi Kosyfaki, Nelina P. Angelova, Aggeliki Tsohou, Emmanouil Magkos:
The Privacy Paradox in the Context of Online Health Data Disclosure by Users. EMCIS 2017: 421-428 - 2016
- [j16]Panayiotis Kotzanikolaou, Constantinos Patsakis, Emmanouil Magkos, Michalis Korakakis:
Lightweight private proximity testing for geospatial social networks. Comput. Commun. 73: 263-270 (2016) - [j15]Emmanouil Magkos, Panayiotis Kotzanikolaou:
SCN-SI-021 achieving privacy and access control in pervasive computing environments. Secur. Commun. Networks 9(2): 94-105 (2016) - [c22]Dimitris Gritzalis, George Stergiopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos, Georgia Lykou:
Critical Infrastructure Protection: A Holistic Methodology for Greece. CyberICPS@ESORICS 2016: 19-34 - 2014
- [c21]Dimitris Fronimos, Emmanouil Magkos, Vassilios Chrissikopoulos:
Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats. Panhellenic Conference on Informatics 2014: 5:1-5:2 - [c20]Emmanouil Magkos, Panayiotis Kotzanikolaou, Marios Magioladitis, Spyros Sioutas, Vassilios S. Verykios:
Towards Secure and Practical Location Privacy through Private Equality Testing. Privacy in Statistical Databases 2014: 312-325 - [c19]Michalis Korakakis, Emmanouil Magkos, Phivos Mylonas:
Automated CAPTCHA Solving: An Empirical Comparison of Selected Techniques. SMAP 2014: 44-47 - 2013
- [j14]Emmanouil Magkos, Markos Avlonitis, Panayiotis Kotzanikolaou, Michalis Stefanidakis:
Toward early warning against Internet worms based on critical-sized networks. Secur. Commun. Networks 6(1): 78-88 (2013) - [c18]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems. ISCC 2013: 143-148 - 2012
- [j13]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Secure and privacy-preserving, timed vehicular communications. Int. J. Ad Hoc Ubiquitous Comput. 10(4): 219-229 (2012) - [j12]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Modeling security in cyber-physical systems. Int. J. Crit. Infrastructure Prot. 5(3-4): 118-126 (2012) - [j11]Konstantinos Vlachopoulos, Emmanouil Magkos, Vassilios Chrissikopoulos:
A Model for Hybrid Evidence Investigation. Int. J. Digit. Crime Forensics 4(4): 47-62 (2012) - [c17]Panayiotis Kotzanikolaou, Emmanouil Magkos, Nikolaos Petrakos, Christos Douligeris, Vassilios Chrissikopoulos:
Fair Anonymous Authentication for Location Based Services. DPM/SETOP 2012: 1-14 - [c16]Kostas Vlachopoulos, Emmanouil Magkos, Vassilios Chrissikopoulos:
A Model for Hybrid Evidence Investigation. WDFIA 2012: 119-128 - 2011
- [j10]Emmanouil Magkos:
Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey. Int. J. Inf. Technol. Syst. Approach 4(2): 48-69 (2011) - [j9]Spyros Sioutas, Emmanouil Magkos, Ioannis Karydis, Vassilios S. Verykios:
Uncertainty for Privacy and 2-Dimensional Range Query Distortion. J. Comput. Sci. Eng. 5(3): 210-222 (2011) - 2010
- [c15]Emmanouil Magkos, Panayiotis Kotzanikolaou:
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments. MobiSec 2010: 53-64 - [c14]Spyros Sioutas, Emmanouil Magkos, Ioannis Karydis, Vassilios S. Verykios:
Uncertainty for Anonymity and 2-Dimensional Range Query Distortion. Privacy in Statistical Databases 2010: 85-96 - [c13]Emmanouil Magkos, Panayiotis Kotzanikolaou, Spyros Sioutas, Konstantinos Oikonomou:
A distributed privacy-preserving scheme for location-based queries. WOWMOM 2010: 1-6 - [e1]Josep Domingo-Ferrer, Emmanouil Magkos:
Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings. Lecture Notes in Computer Science 6344, Springer 2010, ISBN 978-3-642-15837-7 [contents]
2000 – 2009
- 2009
- [j8]Emmanouil Magkos, Manolis Maragoudakis, Vassilios Chrissikopoulos, Stefanos Gritzalis:
Accurate and large-scale privacy-preserving data mining using the election paradigm. Data Knowl. Eng. 68(11): 1224-1236 (2009) - [j7]Panayiotis Kotzanikolaou, Emmanouil Magkos, Dimitrios D. Vergados, Michalis Stefanidakis:
Secure and practical key establishment for distributed sensor networks. Secur. Commun. Networks 2(6): 595-610 (2009) - [j6]Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
Treating scalability and modelling human countermeasures against local preference worms via gradient models. J. Comput. Virol. 5(4): 357-364 (2009) - [c12]Katia Kermanidis, Emmanouil Magkos:
Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography. CICLing 2009: 535-546 - [c11]Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
A Novel Stochastic Approach for Modeling Random Scanning Worms. Panhellenic Conference on Informatics 2009: 176-179 - 2008
- [j5]Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
Secure log management for privacy assurance in electronic communications. Comput. Secur. 27(7-8): 298-308 (2008) - [j4]Panayiotis Kotzanikolaou, Dimitrios D. Vergados, Giannis Stergiou, Emmanouil Magkos:
Multilayer key establishment for large-scale sensor networks. Int. J. Secur. Networks 3(1): 1-9 (2008) - [c10]Emmanouil Magkos, Manolis Maragoudakis, Vassilios Chrissikopoulos, Stefanos Gritzalis:
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections. Privacy in Statistical Databases 2008: 284-297 - [c9]Emmanouil Magkos, Vassilios Chrissikopoulos:
Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems. WEBIST (1) 2008: 301-304 - [c8]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Strengthening Privacy Protection in VANETs. WiMob 2008: 508-513 - 2007
- [j3]Emmanouil Magkos, Panayiotis Kotzanikolaou, Christos Douligeris:
Towards secure online elections: models, primitives and open issues. Electron. Gov. an Int. J. 4(3): 249-268 (2007) - [j2]Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
A spatial stochastic model for worm propagation: scale effects. J. Comput. Virol. 3(2): 87-92 (2007) - 2006
- [c7]Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
A Framework for Secure and Verifiable Logging in Public Communication Networks. CRITIS 2006: 273-284 - 2005
- [c6]Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos:
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. WOWMOM 2005: 581-587 - 2004
- [j1]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Uncoercible e-Bidding Games. Electron. Commer. Res. 4(1-2): 113-125 (2004) - 2003
- [b1]Emmanouil Magkos:
Ασφαλή ηλεκτρονικά συστήματα συναλλαγών στο διαδίκτυο. University of Piraeus, Greece, 2003 - [p1]Mike Burmester, Emmanouil Magkos:
Towards Secure and Practical E-Elections in the New Era. Secure Electronic Voting 2003: 63-76 - 2001
- [c5]Emmanouil Magkos, Panayiotis Kotzanikolaou, Vassilios Chrissikopoulos:
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions. EC-Web 2001: 186-195 - [c4]Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos:
Receipt-Freeness in Large-Scale Elections without Untappable Channels. I3E 2001: 683-693 - [c3]Nikos Alexandris, Emmanouil Magkos, Vassilios Chrissikopoulos:
Software-Based Receipt-Freeness in On-Line Elections. Network Security 2001: 33-43 - [c2]Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
Strong Forward Security. SEC 2001: 109-122 - 2000
- [c1]Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos:
An Equitably Fair On-line Auction Scheme. EC-Web 2000: 72-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint