Paper published in Journal of Information Security and Applications
C. Ntantogian, P. Bountakas, D. Antonaropoulos, C.Patsakis, C. Xenakis NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation Full Paper
Paper published in Journal of Information Security and Applications
C.Patsakis, F. Casino Exploiting statistical and structural features for the detection of Domain Generation Algorithms Full Paper
Paper published in 2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)
A. Kostopoulos, I. P. Chochliouros, T. Apostolopoulos, C.Patsakis, G. Tsatsanifos, M. Anastasiadis, A.Guarino, B. Tran Realising Honeypot-as-a-Service for Smart Home Solutions Full Paper
Paper published in Future Generation Computer Systems
T. Apostolopoulos, V. Katos, K. Choo, C. Patsakis Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks Full Paper
Paper published in 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
T. Dasaklis, F. Casino Improving Vendor-managed Inventory Strategy Based on Internet of Things (IoT) Applications and Blockchain Technology Full Paper
Paper published in Computers & Security
C. Patsakis, F.Casino, V. Katos Encrypted and covert DNS queries for botnets: Challenges and countermeasures Full Paper
Chapter published in Artificial Intelligence Applications and Innovations. AIAI 2020 IFIP WG 12.5 International Workshops – MHDW 2020 and 5G-PINE 2020, Neos Marmaras, Greece, June 5–7, 2020, Proceedings
A. Kostopoulos, I. P. Chochliouros, C. Patsakis, M. Anastasiadis, A. Guarino Protocol Deployment for Employing Honeypot-as-a-Service Full Paper
Paper published in Electronic Commerce Research and Applications
F. Casino, C. Patsakis, A. Solanas Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation Full Paper
Paper published in Arxiv
C. Patsakis, A. Chrysanthou Analysing the fall 2020 Emotet campaign
Chapter published in Advances in Information and Computer Security – 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings
E. Mantas, C. Patsakis, GRYPHON: Drone Forensics in Dataflash and Telemetry Logs Full Paper
Paper published in International Journal of Information Security
( June 2019, pages 1–13)
C. Patsakis, F. Casino, Hydras and IPFS: A Decentralised Playground for Malware Full Paper
Paper published in IEEE Transactions on Information Forensics and Security
(April 2019)
F. Casino, K.R. Choo, C. Patsakis, HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets Full Paper
Paper published in Digital Investigation
(Volume 25, June 2018, Pages 78-89)
A. Nikas, E. Alepis, C. Patsaki, I know what you streamed last night: On the security and privacy of streaming Full Paper
