Dimitrios Damopoulos
Dimitrios Damopoulos
Associate Professor Computer Science, University of South Alabama
Verified email at - Homepage
Cited by
Cited by
Introducing touchstroke: keystroke‐based authentication system for smartphones
G Kambourakis, D Damopoulos, D Papamartzivanos, E Pavlidakis
Security and Communication Networks 9 (6), 542-554, 2016
A critical review of 7 years of Mobile Device Forensics
K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos
Digital Investigation 10 (4), 323-349, 2013
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
From keyloggers to touchloggers: Take the rough with the smooth
D Damopoulos, G Kambourakis, S Gritzalis
Computers & security 32, 102-114, 2013
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones
D Damopoulos, G Kambourakis, G Portokalidis
Proceedings of the seventh european workshop on system security, 1-6, 2014
iSAM: an iPhone stealth airborne malware
D Damopoulos, G Kambourakis, S Gritzalis
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
A cloud-based architecture to crowdsource mobile app privacy leaks
D Papamartzivanos, D Damopoulos, G Kambourakis
Proceedings of the 18th panhellenic conference on informatics, 1-6, 2014
Location-enhanced authentication using the IoT: Because you cannot be in two places at once
I Agadakos, P Hallgren, D Damopoulos, A Sabelfeld, G Portokalidis
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Exposing mobile malware from the inside (or what is your mobile app really doing?)
D Damopoulos, G Kambourakis, S Gritzalis, SO Park
Peer-to-Peer Networking and Applications 7, 687-697, 2014
User privacy and modern mobile services: are they on the same path?
D Damopoulos, G Kambourakis, M Anagnostopoulos, S Gritzalis, JH Park
Personal and ubiquitous computing 17, 1437-1448, 2013
MILC: A secure and privacy-preserving mobile instant locator with chatting
A Loukas, D Damopoulos, SA Menesidou, ME Skarkala, G Kambourakis, ...
Information Systems Frontiers 14, 481-497, 2012
Hands-Free one-Time and continuous authentication using glass wearable devices
D Damopoulos, G Kambourakis
Journal of Information Security and Applications 46, 138-150, 2019
Let’s Meet! A participatory-based discovery and rendezvous mobile marketing framework
L Ntalkos, G Kambourakis, D Damopoulos
Telematics and Informatics 32 (4), 539-563, 2015
A competent post-authentication and non-repudiation biometric-based scheme for m-learning
G Kambourakis, D Damopoulos
Proceedings of the 10th IASTED International Conference on Web-based …, 2013
Automatic localization of the lumbar vertebral landmarks in CT images with context features
D Damopoulos, B Glocker, G Zheng
Computational Methods and Clinical Applications in Musculoskeletal Imaging …, 2018
Europe in the shadow of financial crisis: Policy Making via Stance Classification
L Spiliotopoulou, D Damopoulos, Y Charalabidis, M Maragoudakis, ...
Intrusion detection and prevention for mobile ecosystems
G Kambourakis, A Shabtai, C Kolias, D Damopoulos
CRC Press, 2017
User-privacy and modern smartphones: A Siri(ous) dilemma
D Damopoulos, G Kambourakis, M Anagnostopoulos, S Gritzalis, JH Park
FTRA AIM 2012 International Conference on Advanced IT, 2012
Wysisnwiv: What you scan is not what i visit
Q Yang, D Damopoulos, G Portokalidis
Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015
From fuzziness to criminal investigation: An inference system for Mobile Forensics
K Barmpatsalou, T Cruz, E Monteiro, P Simoes, G Kambourakis, ...
Intrusion Detection and Prevention for Mobile Ecosystems, 117-134, 2017
The system can't perform the operation now. Try again later.
Articles 1–20