Christos Ilioudis
Christos Ilioudis
Professor in Internet Security, International Hellenic University - Greece
Verified email at - Homepage
Cited by
Cited by
ADvoCATE: a consent management platform for personal data processing in the IoT using blockchain technology
K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou, A Kritsas
Innovative Security Solutions for Information Technology and Communications …, 2019
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem.
K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou
ICETE (2) 298, 572-577, 2018
A quantitative evaluation of trust in the quality of cyber threat intelligence sources
T Schaberreiter, V Kupfersberger, K Rantos, A Spyros, A Papanikolaou, ...
Proceedings of the 14th international conference on availability …, 2019
Interoperability challenges in the cybersecurity information sharing ecosystem
K Rantos, A Spyros, A Papanikolaou, A Kritsas, C Ilioudis, V Katos
Computers 9 (1), 18, 2020
The importance of corporate forensic readiness in the information security framework
G Pangalos, C Ilioudis, I Pagkalos
2010 19th IEEE International Workshops on Enabling Technologies …, 2010
A blockchain-based platform for consent management of personal data processing in the IoT ecosystem
K Rantos, G Drosatos, A Kritsas, C Ilioudis, A Papanikolaou, AP Filippidis
Security and Communication Networks 2019, 1-15, 2019
Insider threats in corporate environments: a case study for data leakage prevention
V Stamati-Koromina, C Ilioudis, R Overill, CK Georgiadis, D Stamatis
Proceedings of the Fifth Balkan Conference in Informatics, 271-274, 2012
Improving forensic triage efficiency through cyber threat intelligence
N Serketzis, V Katos, C Ilioudis, D Baltatzis, G Pangalos
Future Internet 11 (7), 162, 2019
Developing a Public Key Infrastructure for a secure regional e-Health environment
G Pangalos, I Mavridis, C Ilioudis, C Georgiadis
Methods of information in medicine 41 (05), 414-418, 2002
A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet
C Ilioudis, G Pangalos
Journal of Medical Internet Research 3 (2), e836, 2001
Actionable threat intelligence for digital forensics readiness
N Serketzis, V Katos, C Ilioudis, D Baltatzis, GJ Pangalos
Information & Computer Security 27 (2), 273-291, 2019
Real-time network data analysis using time series models
T Vafeiadis, A Papanikolaou, C Ilioudis, S Charchalakis
Simulation Modelling Practice and Theory 29, 173-180, 2012
A Hacker's Perspective on Educating Future Security Experts
A Papanikolaou, V Karakoidas, V Vlachos, A Venieris, C Ilioudis, ...
2011 15th Panhellenic Conference on Informatics, 68-72, 2011
Detecting and manipulating compressed alternate data streams in a forensics investigation
AI Martini, A Zaharis, C Ilioudis
2008 Third International Annual Workshop on Digital Forensics and Incident …, 2008
A framework for teaching network security in academic environments
A Papanikolaou, V Vlachos, A Venieris, C Ilioudis, K Papapanagiotou, ...
Information Management & Computer Security 21 (4), 315-338, 2013
On the evolution of malware species
V Vlachos, C Ilioudis, A Papanikolaou
International Conference on e-Democracy, 54-61, 2011
State of vulnerabilities 2018/2019
V Katos, S Rostami, P Bellonias, N Davies, A Kleszcz, S Faily, A Spyros, ...
European Union Agency for Cybersecurity (ENISA), Technical Report, 2019
Analyzing the selection and dynamic composition of web services in e-commerce transactions
N Vesyropoulos, CK Georgiadis, C Ilioudis
Proceedings of the Fifth Balkan Conference in Informatics, 130-135, 2012
Lightweight steganalysis based on image reconstruction and lead digit distribution analysis
A Zaharis, A Martini, T Tryfonas, C Ilioudis, G Pangalos
International Journal of Digital Crime and Forensics (IJDCF) 3 (4), 29-41, 2011
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time
I Mavridis, A Mattas, I Pagkalos, I Kotini, C Ilioudis
International Journal of Information and Computer Security 2 (4), 328-352, 2008
The system can't perform the operation now. Try again later.
Articles 1–20