GCC Publications

 

Project Deliverables

Publications in Journals & Conferences

  • Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, and Evangelos P. Markatos. CCSP: a Compressed Certificate Status Protocol. In proceedings of the IEEE International Conference on Computer Communications (INFOCOM '17). Atlanta, GA, USA, May 2017. Icon pdf (200.4 KB)
  • Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, and Evangelos P. Markatos. Provable Network Activity for Protecting Users against False Accusation. In proceedings of the 10th International Conference on Information Security Theory and Practice (WISTP'2016).  Heraklion, Crete, Greece, September 2016. Icon pdf (299.1 KB)
  • Eirini Degkleri, Antonios A. Chariton, Panagiotis Ilia, Panagiotis Papadopoulos, Evangelos P. Markatos. Leveraging DNS for timely SSL Certificate Revocation. In 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016). Linz, Austria, September 2016. Icon pdf (159.7 KB)
  • Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos. DCSP: Performant Certificate Revocation a DNS-based approach. In Proceedings of the 9th European Workshop on Systems Security (EuroSec). London, UK, April 2016. Icon pdf (291.4 KB)
  • Panagiotis Papadopoulos, Thanasis Petsas, Giorgos Christou and Giorgos Vasiliadis. MAD: A Middleware Framework for Multi-Step Attack Detection. In proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015). Kyoto, Japan, November 2015. Icon pdf (319.3 KB)
  • Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis. Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption. In proceedings of the 8th European Workshop on System Security (EUROSEC 2015). April 2015, Bordeaux, France. Icon pdf (431.8 KB)
  • Nikos Tsikoudis, Antonis Papadogiannakis, Evangelos P. Markatos. LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System. In IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber Security, Volume PP, Issue 99, pages 1, December, 2014. Icon pdf (4.4 MB)
  • Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos,Sotiris Ioannidis, Paraskevi  Fragopoulou. Think before RT: An Experimental Study of Abusing Twitter Trends. Workshop on Social Influence (SI), November 2014. Icon pdf (614.2 KB)
  • Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Deep Packet Inspection: Algorithms, Hardware, and Applications, Volume 32, Issue 10, pages 1-15. October 2014. PCI Icon pdf (332.4 KB)
  • Enes Göktas, Elias Athanasopoulos, Herbert Bos, Michalis Polychronakis, and Georgios Portokalidis. Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard. In Proceedings of the 23rd USENIX Security Symposium. San Diego, CA. August 2014. Icon pdf (454.5 KB)
  • V. Tsoulkas, D. Kostopoulos, G. Leventakis. Real Time Asset Monitoring and Risk Management of Critical Infrastructures. In Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management (ICVRAM) and the 6th International Symposium on Uncertainty, Modeling, and Analysis (ISUMA). July 2014. Liverpool, UK. ASCE Library
  • Philippe Jougleux, Tatiana Synodinou, Lilian Mitrou. New forms of cyber Attacks. In Proceedings of the 4th International Conference on Information Law and Ethics (ICIL). May 2014. Thessaloniki, Greece. Icon (855.5 KB)
  • Ioannis Iglezakis. Attacks on Information Systems. Legal Journal Synigoros, 2013 (in Greek). Icon (290.8 KB)
  • Ioannis Iglezakis. Interference with a personal data file. Poiniki Dikaiosyni, pages 929 - 933, 2013 (in Greek). Icon (133.7 KB)
  • Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos. The man who was there: Fortifying the Economy of Location-Based Services. In Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC). December 2013, New Orleans, LA, USA Icon pdf (392.0 KB)
  • Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC). October 2013, Barcelona, Spain Icon pdf (350.3 KB)
  • D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou: Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection using Semantics, Event Processing and Sequential AnalysisIn Proceedings of the 8th International Conference on Critical Information Infrastructures Security (CRITIS 2013), September 2013, Amsterdam, Springer LNCS

Presentations & Lectures

  • P. Drogkaris, G. Leventakis, A. Sfetsos: Promoting Law Enforcement Capabilities through Asynchronous Training and Serious Games in the Fight against Cybercrime. John Jay College Biennial International Conference. Athens, Greece. June, 2014. Icon pdf (2.0 MB)
  • Christoforos Ntantogian, Christos Xenakis: Acquisition and Analysis of Android Memory. 2013 Cybercrime Network Conference (CyNC). Dublin, Ireland. December 2013. Icon pdf (1.5 MB)
  • GCC consortium: Presentation about the Greek Cybercrime Center. 2013 Cybercrime Network Conference (CyNC). Dublin, Ireland. December 2013. Icon ppt (13.0 MB)
  • D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou: A Blend of Semantic Monitoring and Intrusion Detection Systems for the Protection of Critical Infrastructures: Research efforts within the Greek Cybercrime Center. 5th International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN 2013). Madrid, Spain. June 2013. Keynote speech  Icon pdf (4.0 MB) IEEE CPS Icon pdf (117.9 KB)
  • D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou: Semantic Systems Modeling and Monitoring for Real Time Decision Making: Results and Next Steps within the Greek Cyber Security Center of Excellence. AMSS 15th International Conference on Computer Modelling and Simulation (UK - SIM 2013).  Cambridge University, UK. April 2013. Keynote speech Icon ppt (8.6 MB) IEEE CPS  Icon pdf (433.1 KB)

Commentaries

  • Ioannis Iglezakis. Comment on Decision 837/2013 of the Court of Appeal (Three-Member) of Patras about illegal processing of personal data. Icon pdf (44.0 KB)