Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? N Virvilis, D Gritzalis, T Apostolopoulos 2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013 | 185 | 2013 |
An open financial services architecture based on the use of intelligent mobile devices A Kousaridas, G Parissis, T Apostolopoulos Electronic Commerce Research and Applications 7 (2), 232-246, 2008 | 125 | 2008 |
Information technology investment evaluation: investments in telecommunication infrastructure TK Apostolopoulos, KC Pramataris International Journal of Information Management 17 (4), 287-296, 1997 | 101 | 1997 |
A qualitative metrics vector for the awareness of smartphone security users A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos Trust, Privacy, and Security in Digital Business: 10th International …, 2013 | 74 | 2013 |
Queueing analysis of buffered CSMA/CD protocols T Apostolopoulos, E Protonotarios IEEE Transactions On Communications 34 (9), 898-905, 1986 | 56 | 1986 |
A cyber attack evaluation methodology K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014 | 51 | 2014 |
Parallel computation for streamflow prediction with distributed hydrologic models TK Apostolopoulos, KP Georgakakos Journal of Hydrology 197 (1-4), 1-24, 1997 | 50 | 1997 |
Browser blacklists: the Utopia of phishing protection N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis E-Business and Telecommunications: 11th International Joint Conference …, 2015 | 46 | 2015 |
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos Computers & Security 74, 371-383, 2018 | 44 | 2018 |
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos Information & Computer Security 24 (1), 38-52, 2016 | 36 | 2016 |
Queueing analysis of buffered slotted multiple access protocols TK Apostolopoulos, EN Protonotarios computer communications 8 (1), 9-21, 1985 | 31 | 1985 |
An e-learning service management architecture TK Apostolopoulos, A Kefala Proceedings 3rd IEEE International Conference on Advanced Technologies, 140-144, 2003 | 20 | 2003 |
Cyber-attacks evaluation using simple additive weighting method on the basis of Schmitt's analysis K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos | 17 | 2016 |
Temporal network management model: Concepts and implementation issues TK Apostolopoulos, VC Daskalou Computer Communications 20 (8), 694-708, 1997 | 16 | 1997 |
The inverse scattering problem for a rigid ellipsoid in linear elasticity T Apostolopoulos, K Kiriaki, D Polyzos Inverse Problems 6 (1), 1, 1990 | 16 | 1990 |
A taxonomy of side channel attacks on critical infrastructures and relevant systems N Tsalis, E Vasilellis, D Mentzelioti, T Apostolopoulos Critical Infrastructure Security and Resilience: Theories, Methods, Tools …, 2019 | 15 | 2019 |
Analysis of a new retransmission control algorithm for slotted CSMA/CD LAN's Apostolopoulos, Sykas, Protonotarios IEEE transactions on computers 100 (6), 692-701, 1987 | 14 | 1987 |
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. N Tsalis, G Stergiopoulos, E Bitsikas, D Gritzalis, TK Apostolopoulos ICETE (2), 219-229, 2018 | 11 | 2018 |
DHTbd: A reliable block-based storage system for high performance clusters G Parisis, G Xylomenos, T Apostolopoulos 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2011 | 11 | 2011 |
On the implementation of a prototype for performance management services TK Apostolopoulos, VC Daskalou Proceedings IEEE Symposium on Computers and Communications, 57-63, 1995 | 11 | 1995 |