Follow
Alexios Mylonas
Alexios Mylonas
Hertfordshire University
Verified email at herts.ac.uk - Homepage
Title
Cited by
Cited by
Year
Delegate the smartphone user? Security awareness in smartphone platforms
A Mylonas, A Kastania, D Gritzalis
Computers & Security 34, 47-66, 2013
4242013
An insider threat prediction model
M Kandias, A Mylonas, N Virvilis, M Theoharidou, D Gritzalis
Trust, Privacy and Security in Digital Business: 7th International …, 2010
2592010
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
A Nisioti, A Mylonas, PD Yoo, V Katos
IEEE Communications Surveys & Tutorials 20 (4), 3369-3388, 2018
2332018
A risk assessment method for smartphones
M Theoharidou, A Mylonas, D Gritzalis
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
1762012
Smartphone sensor data as digital evidence
A Mylonas, V Meletiadis, L Mitrou, D Gritzalis
Computers & Security 38, 51-75, 2013
1232013
Smartphone security evaluation The malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
Proceedings of the International Conference on Security and Cryptography …, 2011
1122011
Exiting the risk assessment maze: A meta-survey
D Gritzalis, G Iseppi, A Mylonas, V Stavrou
ACM Computing Surveys (CSUR) 51 (1), 1-30, 2018
1052018
Assessing privacy risks in android: A user-centric approach
A Mylonas, M Theoharidou, D Gritzalis
Risk Assessment and Risk-Driven Testing: First International Workshop, RISK …, 2014
1052014
Security Busters: Web browser security vs. rogue sites
N Virvilis, A Mylonas, N Tsalis, D Gritzalis
Computers & Security 52, 90-105, 2015
862015
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
812012
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
Trust, Privacy, and Security in Digital Business: 10th International …, 2013
802013
Mobile devices: A phisher’s paradise
N Virvilis, N Tsalis, A Mylonas, D Gritzalis
722014
Towards lightweight url-based phishing detection
A Butnaru, A Mylonas, N Pitropakis
Future internet 13 (6), 154, 2021
612021
A comparative analysis of honeypots on different cloud platforms
C Kelly, N Pitropakis, A Mylonas, S McKeown, WJ Buchanan
Sensors 21 (7), 2433, 2021
582021
Launching adversarial attacks against network intrusion detection systems for iot
P Papadopoulos, O Thornewill von Essen, N Pitropakis, C Chrysoulas, ...
Journal of Cybersecurity and Privacy 1 (2), 252-273, 2021
522021
Browser blacklists: the Utopia of phishing protection
N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis
E-Business and Telecommunications: 11th International Joint Conference …, 2015
492015
A study on usability and security features of the android pattern lock screen
P Andriotis, G Oikonomou, A Mylonas, T Tryfonas
Information & Computer Security 24 (1), 53-72, 2016
442016
Exploring the protection of private browsing in desktop browsers
N Tsalis, A Mylonas, A Nisioti, D Gritzalis, V Katos
Computers & Security 67, 181-197, 2017
382017
An intensive analysis of security and privacy browser add-ons
N Tsalis, A Mylonas, D Gritzalis
382015
On the feasibility of malware attacks in smartphone platforms
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
E-Business and Telecommunications: International Joint Conference, ICETE …, 2012
352012
The system can't perform the operation now. Try again later.
Articles 1–20