GCC Publications
Project Deliverables
- Deliverable D1.4: Web Site pdf (3.8 MB)
- Deliverable D3.4: Report on a Secure Repository for Education Material pdf (11.6 MB)
Publications in Journals & Conferences
- Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, and Evangelos P. Markatos. CCSP: a Compressed Certificate Status Protocol. In proceedings of the IEEE International Conference on Computer Communications (INFOCOM '17). Atlanta, GA, USA, May 2017. pdf (200.4 KB)
- Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, and Evangelos P. Markatos. Provable Network Activity for Protecting Users against False Accusation. In proceedings of the 10th International Conference on Information Security Theory and Practice (WISTP'2016). Heraklion, Crete, Greece, September 2016. pdf (299.1 KB)
- Eirini Degkleri, Antonios A. Chariton, Panagiotis Ilia, Panagiotis Papadopoulos, Evangelos P. Markatos. Leveraging DNS for timely SSL Certificate Revocation. In 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016). Linz, Austria, September 2016. pdf (159.7 KB)
- Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos. DCSP: Performant Certificate Revocation a DNS-based approach. In Proceedings of the 9th European Workshop on Systems Security (EuroSec). London, UK, April 2016. pdf (291.4 KB)
- Panagiotis Papadopoulos, Thanasis Petsas, Giorgos Christou and Giorgos Vasiliadis. MAD: A Middleware Framework for Multi-Step Attack Detection. In proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015). Kyoto, Japan, November 2015. pdf (319.3 KB)
- Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis. Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption. In proceedings of the 8th European Workshop on System Security (EUROSEC 2015). April 2015, Bordeaux, France. pdf (431.8 KB)
- Nikos Tsikoudis, Antonis Papadogiannakis, Evangelos P. Markatos. LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System. In IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber Security, Volume PP, Issue 99, pages 1, December, 2014. pdf (4.4 MB)
- Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos,Sotiris Ioannidis, Paraskevi Fragopoulou. Think before RT: An Experimental Study of Abusing Twitter Trends. Workshop on Social Influence (SI), November 2014. pdf (614.2 KB)
- Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Deep Packet Inspection: Algorithms, Hardware, and Applications, Volume 32, Issue 10, pages 1-15. October 2014. PCI pdf (332.4 KB)
- Enes Göktas, Elias Athanasopoulos, Herbert Bos, Michalis Polychronakis, and Georgios Portokalidis. Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard. In Proceedings of the 23rd USENIX Security Symposium. San Diego, CA. August 2014. pdf (454.5 KB)
- V. Tsoulkas, D. Kostopoulos, G. Leventakis. Real Time Asset Monitoring and Risk Management of Critical Infrastructures. In Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management (ICVRAM) and the 6th International Symposium on Uncertainty, Modeling, and Analysis (ISUMA). July 2014. Liverpool, UK. ASCE Library
- Philippe Jougleux, Tatiana Synodinou, Lilian Mitrou. New forms of cyber Attacks. In Proceedings of the 4th International Conference on Information Law and Ethics (ICIL). May 2014. Thessaloniki, Greece. (855.5 KB)
- Ioannis Iglezakis. Attacks on Information Systems. Legal Journal Synigoros, 2013 (in Greek). (290.8 KB)
- Ioannis Iglezakis. Interference with a personal data file. Poiniki Dikaiosyni, pages 929 - 933, 2013 (in Greek). (133.7 KB)
- Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos. The man who was there: Fortifying the Economy of Location-Based Services. In Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC). December 2013, New Orleans, LA, USA pdf (392.0 KB)
- Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC). October 2013, Barcelona, Spain pdf (350.3 KB)
- D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou: Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection using Semantics, Event Processing and Sequential Analysis. In Proceedings of the 8th International Conference on Critical Information Infrastructures Security (CRITIS 2013), September 2013, Amsterdam, Springer LNCS
Presentations & Lectures
- P. Drogkaris, G. Leventakis, A. Sfetsos: Promoting Law Enforcement Capabilities through Asynchronous Training and Serious Games in the Fight against Cybercrime. John Jay College Biennial International Conference. Athens, Greece. June, 2014. pdf (2.0 MB)
- Christoforos Ntantogian, Christos Xenakis: Acquisition and Analysis of Android Memory. 2013 Cybercrime Network Conference (CyNC). Dublin, Ireland. December 2013. pdf (1.5 MB)
- GCC consortium: Presentation about the Greek Cybercrime Center. 2013 Cybercrime Network Conference (CyNC). Dublin, Ireland. December 2013. ppt (13.0 MB)
- D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou: A Blend of Semantic Monitoring and Intrusion Detection Systems for the Protection of Critical Infrastructures: Research efforts within the Greek Cybercrime Center. 5th International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN 2013). Madrid, Spain. June 2013. Keynote speech pdf (4.0 MB) IEEE CPS pdf (117.9 KB)
- D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou: Semantic Systems Modeling and Monitoring for Real Time Decision Making: Results and Next Steps within the Greek Cyber Security Center of Excellence. AMSS 15th International Conference on Computer Modelling and Simulation (UK - SIM 2013). Cambridge University, UK. April 2013. Keynote speech ppt (8.6 MB) IEEE CPS pdf (433.1 KB)
Commentaries
- Ioannis Iglezakis. Comment on Decision 837/2013 of the Court of Appeal (Three-Member) of Patras about illegal processing of personal data. pdf (44.0 KB)