


default search action
Alexandros Papanikolaou
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Alexandros Papanikolaou, Aggelos Alevizopoulos
, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos:
An autoML network traffic analyzer for cyber threat detection. Int. J. Inf. Sec. 22(5): 1511-1530 (2023) - [c17]Alexandros Papanikolaou
, Christos Ilioudis
, Vasilis Katos
:
Introducing responsibly self-healing into the incident management lifecycle. PETRA 2023: 335-337 - [c16]Alexandros Papanikolaou, Christos Ilioudis, Vasilis Katos:
Cyber-pi: Intelligent cyberthreat detection and supervised response. RCIS (Research Projects) 2023 - [i1]Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos:
A Cyber Threat Intelligence Management Platform for Industrial Environments. CoRR abs/2301.03445 (2023) - 2020
- [j7]Konstantinos Rantos
, Arnolnt Spyros
, Alexandros Papanikolaou
, Antonios Kritsas
, Christos Ilioudis
, Vasilios Katos
:
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Comput. 9(1): 18 (2020) - [c15]Arnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou
, Christos Ilioudis
:
An Innovative Self-Healing Approach with STIX Data Utilisation. ICETE (2) 2020: 645-651
2010 – 2019
- 2019
- [j6]Konstantinos Rantos
, George Drosatos
, Antonios Kritsas
, Christos Ilioudis
, Alexandros Papanikolaou
, Adam P. Filippidis:
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem. Secur. Commun. Networks 2019: 1431578:1-1431578:15 (2019) - [c14]Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos
, Arnolnt Spyros, Alexandros Papanikolaou
, Christos Ilioudis
, Gerald Quirchmayr:
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. ARES 2019: 83:1-83:10 - 2018
- [c13]Konstantinos Rantos, George Drosatos
, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou:
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem. ICETE (2) 2018: 738-743 - [c12]Konstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou, Antonios Kritsas:
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology. SecITC 2018: 300-313 - 2015
- [j5]Charalampos Manifavas, Konstantinos Fysarakis
, Alexandros Papanikolaou
, Ioannis Papaefstathiou
:
Embedded Systems Security: A Survey of EU Research Efforts. Secur. Commun. Networks 8(11): 2016-2036 (2015) - 2014
- [j4]Spyridon Kollias, Vasileios Vlachos
, Alexandros Papanikolaou
, Periklis Chatzimisios
, Christos Ilioudis
, Kostas S. Metaxiotis:
A global-local approach for estimating the Internet's threat level. J. Commun. Networks 16(4): 407-414 (2014) - [c11]Spyridon Kollias, Vasileios Vlachos
, Alexandros Papanikolaou
, Periklis Chatzimisios
, Christos Ilioudis
, Kostas S. Metaxiotis:
Measuring the Internet's threat level: A global-local approach. ISCC 2014: 1-6 - [c10]Konstantinos Fysarakis, George Hatzivasilis, Konstantinos Rantos, Alexandros Papanikolaou
, Charalampos Manifavas:
Embedded Systems Security Challenges. PECCS 2014: 255-266 - 2013
- [j3]Alexandros Papanikolaou
, Vasileios Vlachos
, Andreas Venieris, Christos Ilioudis
, Konstantinos Papapanagiotou, Anastasios Stasinopoulos:
A framework for teaching network security in academic environments. Inf. Manag. Comput. Secur. 21(4): 315-338 (2013) - [c9]Iosif Androulidakis
, Vasileios Vlachos
, Alexandros Papanikolaou
:
FIMESS: filtering mobile external SMS spam. BCI 2013: 221-227 - [c8]Anastasios Papathanasiou, Alexandros Papanikolaou
, Vasileios Vlachos
, Konstantinos Chaikalis
, Maria Dimou, Magdalini Karadimou, Vaia Katsoula:
Legal and Social Aspects of Cyber Crime in Greece. e-Democracy 2013: 153-164 - [c7]Konstantinos Rantos
, Alexandros Papanikolaou
, Charalampos Manifavas:
IPsec over IEEE 802.15.4 for low power and lossy networks. MOBIWAC 2013: 59-64 - [c6]Konstantinos Rantos
, Alexandros Papanikolaou
, Charalampos Manifavas, Ioannis Papaefstathiou
:
IPv6 security for low power and lossy networks. Wireless Days 2013: 1-8 - 2012
- [j2]Thanasis Vafeiadis
, Alexandros Papanikolaou
, Christos Ilioudis
, Stefanos Charchalakis:
Real-time network data analysis using time series models. Simul. Model. Pract. Theory 29: 173-180 (2012) - [c5]Konstantinos Rantos, Alexandros Papanikolaou, Konstantinos Fysarakis, Charalampos Manifavas:
Secure policy-based management solutions in heterogeneous embedded systems networks. TEMU 2012: 227-232 - 2011
- [c4]Spyros K. Kollias, Vasileios Vlachos
, Alexandros Papanikolaou
, Vassilis Assimakopoulos:
Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security Data. SysSec@DIMVA 2011: 59-62 - [c3]Vasileios Vlachos
, Christos Ilioudis
, Alexandros Papanikolaou
:
On the Evolution of Malware Species. ICGS3/e-Democracy 2011: 54-61 - [c2]Alexandros Papanikolaou
, Vassilios Karakoidas, Vasileios Vlachos
, Andreas Venieris, Christos Ilioudis
, Georgios Zouganelis:
A Hacker's Perspective on Educating Future Security Experts. Panhellenic Conference on Informatics 2011: 68-72
2000 – 2009
- 2008
- [c1]Alexandros Papanikolaou
, Christos Ilioudis, Christos K. Georgiadis, Elias Pimenidis:
The importance of biometric sensor continuous secure monitoring. ICDIM 2008: 569-574 - 2006
- [b1]Alexandros Papanikolaou:
A combined approach for hiding partial information in RSA. Aston University, Birmingham, UK, 2006 - 2002
- [j1]Alexandros Papanikolaou
, Song Y. Yan:
Prime Number Generation Based On Pocklington's Theorem. Int. J. Comput. Math. 79(10): 1049-1056 (2002)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint