Christoforos Dadoyan (Ntantogian)
Christoforos Dadoyan (Ntantogian)
Ionian University - Department of Informatics
Verified email at - Homepage
Cited by
Cited by
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks
C Panos, C Ntantogian, S Malliaros, C Xenakis
Computer Networks 113, 94-110, 2017
Evaluating the privacy of Android mobile applications under forensic analysis
C Ntantogian, D Apostolopoulos, G Marinakis, C Xenakis
Computers & Security 42, 66-76, 2014
Evaluation of cryptography usage in android applications
A Chatzikonstantinou, C Ntantogian, G Karopoulos, C Xenakis
Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016
Evaluation of password hashing schemes in open source web platforms
C Ntantogian, S Malliaros, C Xenakis
Computers & Security 84, 206-224, 2019
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
A Stasinopoulos, C Ntantogian, C Xenakis
International Journal of Information Security 18 (1), 49-72, 2019
Discovering authentication credentials in volatile memory of android mobile devices
D Apostolopoulos, G Marinakis, C Ntantogian, C Xenakis
Conference on e-Business, e-Services and e-Society, 178-185, 2013
One-pass EAP-AKA authentication in 3G-WLAN integrated networks
C Ntantogian, C Xenakis
Wireless personal communications 48 (4), 569-584, 2009
Gaithashing: a two-factor authentication scheme based on gait features
C Ntantogian, S Malliaros, C Xenakis
Computers & Security 52, 17-32, 2015
P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go
A Farao, E Veroni, C Ntantogian, C Xenakis
Sensors 21 (8), 2686, 2021
Secure edge computing with lightweight control-flow property-based attestation
N Koutroumpouchos, C Ntantogian, SA Menesidou, K Liang, P Gouvas, ...
2019 IEEE Conference on Network Softwarization (NetSoft), 84-92, 2019
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
N Koutroumpouchos, C Ntantogian, C Xenakis
Sensors 21 (2), 520, 2021
A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices
C Panos, S Malliaros, C Ntantogian, A Panou, C Xenakis
International Tyrrhenian Workshop on Digital Communication, 127-142, 2017
Commix: Detecting and exploiting command injection flaws.
A Stasinopoulos, C Ntantogian, C Xenakis
Department of Digital Systems, University of Piraeus, BlackHat Europe, Nov …, 2015
CUREX: seCUre and pRivate hEalth data eXchange
F Mohammadi, A Panou, C Ntantogian, E Karapistoli, E Panaousis, ...
IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume …, 2019
ObjectMap: detecting insecure object deserialization
N Koutroumpouchos, G Lavdanis, E Veroni, C Ntantogian, C Xenakis
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 67-72, 2019
Attacking the baseband modem of mobile phones to breach the users' privacy and network security
C Xenakis, C Ntantogian
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
Distributed key management in microgrids
V Bolgouras, C Ntantogian, E Panaousis, C Xenakis
IEEE Transactions on Industrial Informatics 16 (3), 2125-2133, 2019
Ropinjector: Using return oriented programming for polymorphism and antivirus evasion
G Poulios, C Ntantogian, C Xenakis
Blackhat USA, 2015
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem
G Karopoulos, C Ntantogian, C Xenakis
Computers & Security 73, 307-325, 2018
NodeXP: NOde. js server-side JavaScript injection vulnerability DEtection and eXPloitation
C Ntantogian, P Bountakas, D Antonaropoulos, C Patsakis, C Xenakis
Journal of Information Security and Applications 58, 102752, 2021
The system can't perform the operation now. Try again later.
Articles 1–20