Follow
Zisis Tsiatsikas
Zisis Tsiatsikas
Verified email at aegean.gr - Homepage
Title
Cited by
Cited by
Year
An efficient and easily deployable method for dealing with DoS in SIP services
Z Tsiatsikas, D Geneiatakis, G Kambourakis, AD Keromytis
Computer Communications 57, 50-63, 2015
252015
Battling against DDoS in SIP. Is machine learning-based detection an effective weapon?
Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ...
252015
The devil is in the detail: SDP-driven malformed message attacks and mitigation in SIP ecosystems
Z Tsiatsikas, G Kambourakis, D Geneiatakis, H Wang
IEEE Access 7, 2401-2417, 2018
232018
Hidden in plain sight. sdp-based covert channel for botnet communication
Z Tsiatsikas, M Anagnostopoulos, G Kambourakis, S Lambrou, ...
Trust, Privacy and Security in Digital Business: 12th International …, 2015
162015
Realtime ddos detection in sip ecosystems: Machine learning tools of the trade
Z Tsiatsikas, D Geneiatakis, G Kambourakis, S Gritzalis
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
122016
Measuring the adoption of TLS encrypted client hello extension and its forebear in the wild
Z Tsiatsikas, G Karopoulos, G Kambourakis
European Symposium on Research in Computer Security, 177-190, 2022
62022
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP
Z Tsiatsikas, D Geneiatakis, G Kambourakis, AD Keromytis
2013 International Conference on Availability, Reliability and Security, 224-229, 2013
62013
Bypassing antivirus detection: old-school malware, new tricks
E Chatzoglou, G Karopoulos, G Kambourakis, Z Tsiatsikas
Proceedings of the 18th International Conference on Availability …, 2023
52023
Exposing resource consumption attacks in internet multimedia services
Z Tsiatsikas, G Kambourakis, D Geneiatakis
2014 IEEE International Symposium on Signal Processing and Information …, 2014
52014
At your service 24/7 or not? denial of service on esinet systems
Z Tsiatsikas, G Kambourakis, D Geneiatakis
International Conference on Trust and Privacy in Digital Business, 35-49, 2021
32021
Why Snoopy loves online services: An Analysis of (lack of) Privacy in Online Services
V Cozza, Z Tsiatsikas, M Conti, G Kambourakis
International Conference on Information Systems Security and Privacy 2, 431-438, 2017
22017
Method and network system for defeating media-coordinated attacks on emergency call networks
Z Tsiatsikas
US Patent 12,035,138, 2024
2024
Method and a system for silent and non-exposing alerting of previously abandoned calls
E Michopanou, Z Tsiatsikas, M Botsis
US Patent App. 18/545,203, 2024
2024
Method and system for optimizing blockchain complexity
Z Tsiatsikas
US Patent App. 18/346,919, 2024
2024
Method and system for efficient callback functionality using signal coverage data
Z Tsiatsikas, A Pagonis, S Anagnostou
US Patent App. 18/346,902, 2024
2024
Computer-implemented method of processing an emergency call and emergency communication network
A Pagonis, Z Tsiatsikas, M Mikrouli, S Anagnostou
US Patent 11,956,706, 2024
2024
Keep your memory dump shut: Unveiling data leaks in password managers
E Chatzoglou, V Kampourakis, Z Tsiatsikas, G Karopoulos, ...
arXiv preprint arXiv:2404.00423, 2024
2024
Computer-implemented method of processing an emergency incident and emergency communication network
Z Tsiatsikas, S Anagnostou
US Patent 11,843,974, 2023
2023
Computer-implemented method of optimizing bandwidth in a PSAP environment and communication network
Z Tsiatsikas, E Michopanou, A Karanasiou, S Anagnostou
US Patent 11,805,399, 2023
2023
Computer-implemented method of processing an emergency incident and emergency communication network
A Pagonis, Z Tsiatsikas, M Mikrouli, S Anagnostou
US Patent 11,800,344, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20