Theodorakopoulos, George, Panaousis, Emmanouil, Liang, Kaitai and Loukas, George
2022.
On-the-fly privacy for location histograms.
IEEE Transactions on Dependable and Secure Computing
19
(1)
, pp. 566-578.
10.1109/TDSC.2020.2980270
![]() |
|
Bostanipour, Behnaz and Theodorakopoulos, Georgios 2021. Joint obfuscation of location and its semantic information for privacy protection. Computers and Security 107 , 102310. 10.1016/j.cose.2021.102310 |
|
Murakonda, Sasi Kumar, Shokri, Reza and Theodorakopoulos, Georgios
2021.
Quantifying the privacy risks of learning high-dimensional graphical models.
Presented at: 24th International Conference on Artificial Intelligence and Statistics (AISTATS),
virtual,
13-15 April 2021.
pp. 2287-2295.
![]() |
|
Barati, Masoud, Theodorakopoulos, George and Rana, Omer
2020.
Automating GDPR compliance verification for cloud-hosted services.
Presented at: 2020 International Symposium on Networks, Computers and Communications (ISNCC),
Virtual, Canada,
20-22 October 2020.
2020 International Symposium on Networks, Computers and Communications (ISNCC).
IEEE,
pp. 1-6.
10.1109/ISNCC49221.2020.9297309
![]() |
![]() |
Alodhyani, Fahad, Theodorakopoulos, Georgios and Reinecke, Philipp
2020.
Password managers—it’s all about trust and transparency.
Future Internet
12
(11)
, 189.
10.3390/fi12110189
![]() |
|
Xu, Yibin, Huang, Yangyu, Shao, Jianhua and Theodorakopoulos, Georgios
2020.
A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol.
Concurrency and Computation: Practice and Experience
32
(19)
, e5773.
10.1002/cpe.5773
![]() |
|
Pratomo, Baskoro, Burnap, Peter and Theodorakopoulos, Georgios
2020.
BLATTA: early exploit setection on network traffic with recurrent neural networks.
Security and Communication Networks
2020
, 8826038.
10.1155/2020/8826038
![]() |
|
Alrayes, Fatma, Abdelmoty, Alia and Theodorakopoulos, Georgios 2020. Modelling perceived risks to personal privacy from location disclosure on online social networks. International Journal of Geographical Information Science 34 (1) , pp. 150-176. 10.1080/13658816.2019.1654109 |
|
Loukides, Grigorios and Theodorakopoulos, Georgios
2020.
Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance.
Knowledge and Information Systems
62
, pp. 2613-2651.
10.1007/s10115-019-01432-4
![]() |
|
Barati, Masoud, Rana, Omer, Petri, Ioan and Theodorakopoulos, George
2020.
GDPR compliance verification in Internet of Things.
IEEE Access
8
, pp. 119697-119709.
10.1109/ACCESS.2020.3005509
![]() |
![]() |
Subahi, Alanoud and Theodorakopoulos, Georgios
2019.
Detecting IoT user behavior and sensitive information in encrypted IoT -app traffic.
Sensors
19
(21)
, 4777.
10.3390/s19214777
![]() |
![]() |
Anthi, Eirini, Williams, Lowri, Malgorzata, Slowinska, Theodorakopoulos, Georgios and Burnap, Peter
2019.
A supervised intrusion detection system for smart home IoT devices.
IEEE Internet of Things
6
(5)
, pp. 9042-9053.
10.1109/JIOT.2019.2926365
![]() |
|
Subahi, Alanoud and Theodorakopoulos, Georgios
2018.
Ensuring compliance of IoT devices with their Privacy Policy Agreement.
Presented at: 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud),
Barcelona, Spain,
6-8 August.
2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud).
Barcelona, Spain:
IEEE,
pp. 100-107.
10.1109/FiCloud.2018.00022
![]() |
![]() |
Anthi, Eirini, Ahmad, Shazaib, Rana, Omer, Burnap, Pete and Theodorakopoulos, Georgios 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp. 477-490. 10.1016/j.cose.2018.07.016 |
|
Mamais, Stylianos and Theodorakopoulos, Georgios 2017. Behavioural verification: preventing report fraud in decentralized advert distribution systems. Future Internet 9 (4) , 88. 10.3390/fi9040088 |
![]() |
Anthi, Eirini, Javed, Amir, Rana, Omer F. and Theodorakopoulos, Georgios 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017. Published in: Longo, Antonella, Zappatore, Marco, Villari, Massimo, Rana, Omer, Bruneo, Dario, Ranjan, Rajiv, Fazin, Maria and Massonet, Philippe eds. IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer, pp. 228-242. 10.1007/978-3-319-67636-4_24 |
|
Mamais, Stylianos and Theodorakopoulos, Georgios 2017. Private and secure distribution of targeted advertisements to mobile phones. Future Internet 9 (2) , 16. 10.3390/fi9020016 |
|
Theodorakopoulos, Georgios
2017.
An open framework for flexible plug-in privacy mechanisms in crowdsensing applications.
Presented at: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops),
Kona, HI, USA,
13-17 March 2017.
Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on.
IEEE,
pp. 237-242.
10.1109/PERCOMW.2017.7917564
![]() |
![]() |
Anthi, Eirini and Theodorakopoulos, Georgios 2017. Sensitive data in Smartphone Applications: Where does it go? Can it be intercepted? [Technical Report]. Springer. |
![]() |
Shokri, Reza, Theodorakopoulos, Georgios and Troncoso, Carmela
2016.
Privacy games along location traces: a game-theoretic framework for optimizing location privacy.
ACM Transactions on Privacy and Security
19
(4)
, 11.
10.1145/3009908
![]() |
|
Galini, Tsoukaneri, Theodorakopoulos, Georgios, Hugh, Leather and Mahesh, Marina 2016. On the inference of user paths from anonymized mobility data. Presented at: 1st IEEE European Symposium on Security and Privacy, Saarbrücken, Germany, 21-24 March 2016. |
![]() |
Theodorakopoulos, Georgios 2015. The same-origin attack against location privacy. Presented at: 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, USA, 12-126 October 2015. Published in: Ray, Indrajit, Hopper, Nicholas and Jansen, Rob eds. WPES '15 Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society. ACM, pp. 49-53. 10.1145/2808138.2808150 |
![]() |
Shokri, Reza, Theodorakopoulos, Georgios, Papadimitratos, Panos, Kazemi, Ehsan and Hubaux, Jean-Pierre
2014.
Hiding in the mobile crowd: location privacy through collaboration.
IEEE Transactions on Dependable and Secure Computing
11
(3)
, pp. 266-279.
10.1109/TDSC.2013.57
![]() |
|
Petri, Ioan, Punceva, Magdalena, Rana, Omer Farooq, Theodorakopoulos, Georgios and Rezgui, Yacine 2014. A broker based consumption mechanism for social clouds. International Journal of Cloud Computing 2 (1) , pp. 45-57. |
|
Theodorakopoulos, Georgios, Le Boudec, J. Y. and Baras, J. S. 2013. Selfish response to epidemic propagation. IEEE Transactions on Automatic Control 58 (2) , pp. 363-376. 10.1109/TAC.2012.2209949 |
![]() |
Shokri, Reza, Theodorakopoulos, Georgios, Troncoso, Carmela, Hubaux, Jean-Pierre and Le Boudec, Jean-Yves 2012. Protecting location privacy: Optimal strategy against localization attacks. Presented at: 19th ACM Conference on Computer and Communications Security (CCS 2012), Raleigh, NC, USA, 16-18 October 2012. Published in: Yu, Ting, Danezis, George and Gligor, Virgil D. eds. Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012. New York, NY: ACM, pp. 617-627. 10.1145/2382196.2382261 |
![]() |
Shokri, Reza, Theodorakopoulos, Georgios, Le Boudec, Jean-Yves and Hubaux, Jean-Pierre 2011. Quantifying location privacy. Presented at: 2011 IEEE Symposium on Security and Privacy (SP), Berkeley, CA, USA, 22-25 May 2011. Published in: O’Conner, L. ed. Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA: IEEE, pp. 247-262. 10.1109/SP.2011.18 |
|
Baras, John and Theodorakopoulos, Georgios 2010. Path problems in networks. Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers. 10.2200/S00245ED1V01Y201001CNT003 |
![]() |
Theodorakopoulos, Georgios and Baras, John 2008. Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications 26 (7) , pp. 1317-1327. 10.1109/JSAC.2008.080928 |
![]() |
Theodorakopoulos, Georgios 2007. Robust network trust establishment for collaborative applications and protocols. PhD Thesis, University of Maryland, College Park. |
![]() |
Theodorakopoulos, Georgios and Baras, J. S. 2006. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24 (2) , pp. 318-328. 10.1109/JSAC.2005.861390 |
![]() |
Theodorakopoulos, Georgios and Baras, John S. 2004. Trust evaluation in ad-hoc networks. Presented at: WiSe '04:3rd ACM workshop on Wireless security, 1 October 2004, Published in: Jakobsson, M. and Perrig, A. eds. WiSe '04 Proceedings of the 3rd ACM workshop on Wireless security. New York, NY: ACM, pp. 1-10. 10.1145/1023646.1023648 |
![]() |