ITE - ΙΝΣΤΙΤΟΥΤΟ ΠΛΗΡΟΦΟΡΙΚΗΣ
ITE - ΙΝΣΤΙΤΟΥΤΟ ΠΛΗΡΟΦΟΡΙΚΗΣ
|  Publications of (DiSCS)  |  Periodicals

Publications

Publications of (DiSCS)

Periodicals (137)

Journal Articles

  1. Marchioro, T., Kazlouski, A., & Markatos, E.P. (2022). How to Publish Wearables’ Data: Practical Guidelines to Protect User Privacy. Studies in Health Technology and Informatics294, 949-950, (pdf).
  2. Pachilakis, M, Papadopoulos, P., Laoutaris, N., Markatos, E.P., & Kourtellis, N. (2021). YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy. ACM on Measurement and Analysis of Computing Systems5(3), 1-26, (pdf).
  3. Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Pitsillides, A., & Akyildiz, I. (2021). Realizing Ambient Backscatter Communications with Intelligent Surfaces in 6G Wireless SystemsIEEE Wireless Communications, 1-8.
  4. Humphries, G., Nordvik, R., Manifavas, H., Cobley, P., & Sorell, M. (2021). Law Enforcement educational challenges for mobile forensicsForensic Science International: Digital Investigation38.
  5. Paschalides, D., Christodoulou, C., Orphanou, K., Andreou, R., Kornilakis, A., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2021). Check-It: A plugin for detecting fake news on the webOnline Social Networks and Media25.
  6. Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Pitsillides, A., & Akyildiz, I. (2021). Next Generation Connected Materials for Intelligent Energy Propagation in Multiphysics SystemsIEEE Communications Magazine59(8), 100-106.
  7. Fischer-Hübner, S., Alcaraz, C., Ferreira, A., Fernandez-Gago, C., Lopez, J., Markatos, E.P., Islami, L., & Akil, M. (2021). Stakeholder perspectives and requirements on cybersecurity in EuropeJournal of Information Security and Applications61.
  8. Papadogiannaki, E., & Ioannidis, S. (2021). A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and CountermeasuresACM Computing Surveys54(6), 1-35.
  9. Antonakaki, D., Fragopoulou, P., & Ioannidis, S. (2021). A survey of Twitter research: Data model, graph structure, sentiment analysis and attacksExpert Systems with Applications164.
  10. Papadogiannaki, E., & Ioannidis, S. (2021). Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous HardwareSensors21(4).
  11. Smyrlis, M., Somarakis, I., Spanoudakis, G., Hatzivasilis, G., & Ioannidis, S. (2021). CYRA: A Model-Driven CYber Range Assurance PlatformApplied Sciences11(11).
  12. Hatzivasilis, G., Fysarakis, K., Hatzakis, I, Vardakis, G., Papadakis, N., & Spanoudakis, G. (2021). SPD-Safe: Secure Administration of Railway Intelligent Transportation SystemsElectronics10(1).
  13. Hatzivasilis, G., Ioannidis, S., Fysarakis, K., Spanoudakis, G., & Papadakis, N. (2021). The green blockchains of circular economyElectronics10(16).
  14. Papoutsakis, M., Fysarakis, K., Spanoudakis, G., Ioannidis, S., & Koloutsou, K. (2021). Towards a Collection of Security and Privacy PatternsApplied Sciences11(4).
  15. Papoutsakis, M., Fysarakis, K., Spanoudakis, G., Ioannidis, S., & Koloutsou, K. (2021). Towards a Collection of Security and Privacy PatternsApplied Sciences11(4).
  16. Aivazoglou, M., Roussos, A., Margaris, D., Vassilakis, C., Ioannidis, S., Polakis, I., & Spiliotopoulos, D. (2020). A fine-grained social network recommender systemSocial Network Analysis and Mining10(1), 1-18.
  17. Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2020). Do you know who is talking to your wearable smartband?. EFMI-STC 2020 275, 142-146, ( 10.3233/SHTI200711), (pdf).
  18. Christou, G., Vasiliadis, G., Papaefstathiou, V., Papadogiannakis, A., & Ioannidis, S. (2020). On Architectural Support for Instruction Set RandomizationACM Transactions on Architecture and Code Optimization (TACO)17(4), 1-26.
  19. Pachilakis, M, Chariton, A. A. , Papadopoulos, P., Ilia, P., Degkleri, E., & Markatos, E.P. (2020). Design and Implementation of a Compressed Certificate Status ProtocolACM Transactions on Internet Technology20(4), 1-25.
  20. Kokolaki, E., Daskalaki, E., Psaroudaki, K., Christodoulaki, M., & Fragopoulou, P. (2020). Investigating the dynamics of illegal online activity: The power of reporting, dark web, and related legislation. , 48.
  21. Tsilipakos, O., & Et, al. (2020). Toward intelligent metasurfaces: the progress from globally tunable metasurfaces to software‐defined metasurfaces with an embedded network of controllersAdvanced Optical Materials8(17).
  22. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2020). End-to-end wireless path deployment with intelligent surfaces using interpretable neural networksIEEE Transactions on Communications68(11), 6792-6806.
  23. Diamantaris, M., Marcantoni, F., Ioannidis, S., & Polakis, I. (2020). The seven deadly sins of the HTML5 WebAPI: a large-scale study on the risks of mobile sensor-based attacksACM Transactions on Privacy and Security (TOPS)23(4), 1-31.
  24. Miaoudakis, A., Fysarakis, K., Petroulakis, N.E., Alexaki, S., Alexandirs, G., Ioannidis, S., Spanoudakis, G., Katos, V., & Verikoukis, C. (2020). Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of? Looping Smart Assets?IEEE Vehicular Technology Magazine15(3), 20-31.
  25. Paschalides, D., Stephanidis, D., Andreou, A., Orphanou, K., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2020). MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech. ACM Transactions on Internet Technology20(2).
  26. Hatzivasilis, G., Soultatos, O., Ioannidis, S., Spanoudakis, G., Katos, V., & Demetriou, G. (2020). MobileTrust: Secure knowledge integration in VANETsACM Transactions on Cyber-Physical Systems4(3), 1-25.
  27. Hatzivasilis, G., Papadakis, N., Hatzakis, I, Ioannidis, S., & Vardakis, G. (2020). Artificial intelligence-driven composition and security validation of an internet of things ecosystemApplied Sciences10(14).
  28. Drivas, G., Maglaras, L., Janicke, H., & Ioannidis, S. (2020). Assessing Cyber Security Threats and Risks in the Public Sector of GreeceJournal of Information Warfare19(1).
  29. Petroulakis, N.E., & Et, al. (2020). Pattern-driven Security, Privacy, Dependability and Interoperability in IoTSECURITY RISK MANAGEMENT.
  30. Hatzivasilis, G., & Et, al. (2020). Modern aspects of cyber-security training and continuous adaptation of Programmes to traineesApplied Sciences10(16).
  31. Kritikos, K., Magoutis, K., Papoutsakis, M., & Ioannidis, S. (2019). A survey on vulnerability assessment tools and databases for cloud-based web applicationsArray3.
  32. Drivas, G., Maglaras, L., Janicke, H., & Ioannidis, S. (2019). Cybersecurity assessment of the public sector in greeceECCWS 2019 18th European Conference on Cyber Warfare and Security, Academic Conferences and publishing limited.
  33. Hatzivasilis, G., Christodoulakis, N., Tzagkarakis, Ch., Ioannidis, S., Demetriou, G., Fysarakis, K., & Panayiotou, M. (2019). The CE-IoT framework for green ICT organizationsEEE DCOSS.
  34. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2019). A Novel Communication Paradigm for High Capacity and Security via Programmable Indoor Wireless Environments in Next Generation Wireless SystemsAd Hoc Networks87, 1-16, (pdf).
  35. Tasolamprou, A., Pitilakis, A., Abadal, S., Tsilipakos, O., Timoneda, X., Taghvaee, H., Mirmoosa, M., Liu, F., Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Kantartzis, N. , Manessis, D., Georgiou, J., Cabellos-Aparicio, A., Alarcón, E., Pitsillides, A., Akyildiz, I., Tretyakov, S., Economou, E., & Kafesaki, M. , Soukoulis, C.  (2019). Exploration of Intercell Wireless Millimeter-Wave Communication in the Landscape of Intelligent MetasurfacesIEEE Access7, 122931-122948, IEEE.
  36. Liaskos, C. K., Tsioliaridou, N. A., Nie, S., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2019). On the Network-Layer Modeling and Configuration of Programmable Wireless EnvironmentsIEEE/ACM Transactions on Networking27(4), 1696-1713, IEEE.
  37. Antonakaki, D., Ioannidis, S., & Fragopoulou, P. (2018). Utilizing the average node degree to assess the temporal growth rate of TwitterP. Social Network Analysis and Mining (SNAM)8(12).
  38. Liaskos, C. K., & Ioannidis, S. (2018). Network Topology Effects on the Detectability of Crossfire Attacks IEEE Transactions on Information Forensics and Security13(7), 1682-1695, IEEE (pdf).
  39. Liaskos, C. K., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2018). Using any Surface to Realize a New Paradigm for Wireless CommunicationsCommunications of the ACM61(11), 30-33, ACM (pdf).
  40. Abadal, S., Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Pitsillides, A., Pareta, J.S., Alarcón, E., & Cabellos-Aparicio, A. (2017). Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context AnalysisIEEE Access: The Multidisciplinary Open Access Journal IEEE Access5(1), 6225-6235, (pdf).
  41. Antonakaki, D., Spiliotopoulos, D., Samaras, C., Pratikakis , P., Ioannidis, S., & Fragopoulou, P. (2017). Social media analysis during political turbulencePLoS ONE 12(10).
  42. Tsioliaridou, N. A., Liaskos, C. K., Dedu, E., & Ioannidis, S. (2017). Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path Scheme. Nano Communication Networks (Elsevier) Journal12, 63-71, (pdf).
  43. Papadogiannaki, E., Koromilas, L., Vasiliadis, G., & Ioannidis, S. (2017). Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures. IEEE/ACM Transactions on Networking. PP(99), 1-14.
  44. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2017). Measurement, Modeling, and Analysis of the Mobile App Ecosystem. ACM Transactions on on Modeling and Performance Evaluation of Computing Systems (ACM TOPECS)2(2), 1-33.
  45. Abadal, S., Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Pitsillides, A., Pareta, J.S., Alarcón, E., & Cabellos-Aparicio, A. (2017). Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context AnalysisIEEE Access5, 6225-6235, (pdf).
  46. Tsioliaridou, N. A., Liaskos, C. K., Dedu, E., & Ioannidis, S. (2017). Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path SchemeNano Communication Networks (Elsevier)32, 63-71, (pdf).
  47. Papadakis, H., Panagiotakis, C., & Fragopoulou, P. (2017). SCoR: A Synthetic Coordinate based Recommender systemExpert Systems with Applications79, 8-19, Elsevier.
  48. Antonakaki, D., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Fragopoulou, P. (2016). Exploiting abused trending topics to identify spam campaigns in TwitterSocial Network Analysis and Mining6(48), 1-11.
  49. Tsioliaridou, N. A., Liaskos, C. K., Ioannidis, S., & Pitsillides, A. (2016). Lightweight, Self-tuning Data Dissemination for Dense Nanonetworks. Nano Communication Networks (Elsevier) Journal, Special Issue on Electromagnetic Communication in Nano-scale8, 2-15, (pdf).
  50. Tsikoudis, N., Papadogiannakis, A., & Markatos, E.P. (2016). LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System. IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber Security4(1), 142-155.
  51. Tsioliaridou, N. A., Zhang, C., Liaskos, C. K., & Tsaoussidis , V. (2016). On the Fair Handling of TCP Flows. International Journal of Communication Networks and Distributed Systems,  (pdf).
  52. Liaskos, C. K., & Tsioliaridou, N. A. (2016). Service Ratio-Optimal, Content Coherence-Aware Data Push Systems. ACM Transactions on Management Information Systems6(4), 1-23, (pdf).
  53. Liaskos, C. K., Tsioliaridou, N. A., Pitsillides, A., Akyildiz, I., Kantartzis, N. , Lalas, A. , Dimitropoulos, X. , Ioannidis, S., & Kafesaki, M. , Soukoulis, C.  (2015). Design and Development of Software Defined Metamaterials for Nanonetworks. IEEE Circuits and Systems Magazine15(4), 12-25, (pdf).
  54. Tsioliaridou, N. A., Liaskos, C. K., Ioannidis, S., & Pitsillides, A. (2015). Lightweight, Self-tuning Data Dissemination for Nanonetworks. Elsevier NanoCommunication Networks – Special Issue,  (pdf).
  55. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2014). Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. IEEE Journal of Selected Areas in Comunications (JSAC)32(10), 1849-1863.
  56. Papadakis, H., Panagiotakis, C., & Fragopoulou, P. (2014).  Distributed detection of communities in complex networks using synthetic coordinatesJournal of Statistical Mechanics: Theory and Experiment, IOP.
  57. Liaskos, C. K., Tsioliaridou, N. A., Pitsillides, A., Akyildiz, I., Kantartzis, N. , Lalas, A. , Dimitropoulos, X. , Ioannidis, S., & Kafesaki, M. , Soukoulis, C.  (2014). Design and Development of Software Defined Metamaterials for Nanonetworks. IEEE Circuits and Systems Magazine15(4), 12-25, (pdf).
  58. Tsikoudis, N., Papadogiannakis, A., & Markatos, E.P. (2014). LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System.IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber SecurityPP(99), 1-1.
  59. Liaskos, C. K., & Tsioliaridou, N. A. (2014). A Promise of Realizable, Ultra-Scalable Communications at nano-Scale: A multi-Modal nano-Machine ArchitectureIEEE Transactions on Computers, 1-14, IEEE.
  60. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2014). GPU-assisted malwareIn International Journal of Information Security (IJIS).
  61. Liaskos, C. K., & Tsioliaridou, N. A. (2014). Minimal Wireless Broadcast Schedules for Multi-objective PursuitsIEEE Transactions on Vehicular Technology, IEEE.
  62. Liaskos, C. K., & Tsioliaridou, N. A. (2014). Minimal Wireless Broadcast Schedules for Multi-objective PursuitsIn Proceedings of the IEEE Transactions on Vehicular Technology, IEEE.
  63. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2014). Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Deep Packet Inspection: Algorithms, Hardware, and Applications32(10), 1-15, (pdf).
  64. Panagiotakis, C., Papadakis, H., Grinias, E., Komodakis, N., Fragopoulou, P., & Tziritas, G. (2013). Interactive image segmentation based on synthetic graph coordinatesPattern Recognition46(11), 2940-2952, Elsevier.
  65. Papadakis, H., Fragopoulou, P., Markatos, E.P., & Roussopoulos, M. (2013). ITA: Innocuous Topology Awareness for Unstructured P2P NetworksIEEE Transactions on Parallel and Distributed Systems24(8), 1589-1601.
  66. Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2012). Minimizing information disclosure to third parties in social login platformsIn International Journal of Information Security (IJIS)11(5), 321-332.
  67. Papadogiannakis, A., Vasiliadis, G., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2012). Improving the Performance of Passive Network Monitoring Applications with Memory Locality EnhancementsIn Computer Communications Journal (COMCOM)(available from Science Direct)35(1), 129-140, (pdf).
  68. Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2012). ITA: Innocuous Topology Awareness for Unstructured P2P Networks. Transactions on Parallel and Distributed Systems.
  69. Webb, R.P., Dailey, J.M., Manning, R.J., Maxwell, G.D., Poustie, A.J., Lardenois, S., Harmon, R., Harrison, J., Kopidakis, G., Athanasopoulos, E., Krithinakis, A., Doukhan, F., Omar, M., Vaillant, D., Di Nallo, F., Koyabe, M., & Di Cairano-Gilfedder, C. (2011). All-Optical Header Processing in a 42.6 Gb/s Optoelectronic FirewallIn IEEE Journal of Selected Topics in Quantum Electronics. (available from IEEE Xplore) , (99), 1-8.
  70. Makridakis, A., Athanasopoulos, E., Antonatos, S., Antoniades, D., Ioannidis, S., & Markatos, E.P. (2010). Designing malicious applications in social networks. IEEE Network Special Issue on Online Social Networks,  (pdf).
  71. Christodoulaki, M., & Fragopoulou, P. (2010). SafeLine: reporting illegal internet contentIn Information Management & Computer Security. (available from Emerald Insight)18(1), 54-65.
  72. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Polychronakis, M., Keromytis, A.D., & Markatos, E.P. (2010). Shadow Honeypots. In International Journal of Computer and Network Security (IJCNS)2(9), 1-16, (pdf).
  73. Makridakis, A., Athanasopoulos, E., Antonatos, S., Antoniades, D., Ioannidis, S., & Markatos, E.P. (2010). Understanding the behavior of malicious applications in social networksIn IEEE Network. (available from IEEE Xplore) 24(5), 14-19, (08908044).
  74. Goodell, G., Roussopoulos, M., & Bradner, S. (2009). A Directory Service for Perspective Access NetworkIn IEEE/ACM Transactions on Networking, (available from IEEE Xplore) 17(2), 501-514.
  75. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2009). Hash-Based Overlay Partitioning in Unstructured Peer-to-Peer SystemsIn Parallel Processing Letters, (available from World Scientific) 19(1), 57-71, (0129-6264).
  76. Zimeo, E., Troisi, A., Papadakis, H., Fragopoulou, P., Forestiero, A., & Mastroianni, C. (2008). Cooperative self-composition and discovery of grid services in P2P networks. Parallel Process Letters18(3), 329-346, (01296264).
  77. Miltchev, S., Smith, J.M., Prevelakis, V., Keromytis, A.D., & Ioannidis, S. (2008). Decentralized Access Control in Distributed File Systems. In ACM Computing Surveys40(3), (03600300), (pdf).
  78. Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2007). Defending against hitlist worms using network address space randomization. In Computer Networks51(12), 3471-3490, (1389-1286), (pdf).
  79. Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2007). Failure Management in Grids: the Case of the EGEE InfrastructureIn Parallel Processing Letters, (available from World Scientific)17(4), 391-410.
  80. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Network-level polymorphic shellcode detection using emulation. Journal in Computer Virology2(4), 257-274, (pdf).
  81. Trunfio, P., Talia, D., Papadakis, H., Fragopoulou, P., Mordacchini, M., Pennanen, M., Popov, K., Vlassov, V., & Haridi, S. (2007). Peer-to-Peer resource discovery in Grids: Models and systems. Future Generation Computer Systems23(7), 864-878, (0167-739X).
  82. Lam, V.T., Antonatos, S., Akritidis, P., & Anagnostakis, K.G. (2007). Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. In ACM Transactions on Information and System Security (TISSEC),  (pdf).
  83. Xinidis, K., Charitakis, I., Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2006). An active splitter architecture for intrusion detection and prevention. IEEE Trans.Dependable Secure Comput.3(1), 31-44, (15455971), (pdf).
  84. Houstis, C.E., Lalis, S., Pitikakis, M., Vasilakis, G.V., Kritikos, K., & Smardas, A. (2003). A grid service-based infrastructure for accessing scientific collections: The case of the arion system. Int J High Perform Comput Appl17(3), 269-280, (10943420).
  85. Vavalis, M. (2002). Runtime support for collaborative air pollution models. Syst Anal Modell Simul42(11), 1575-1599, (02329298).
  86. Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2002). Web-Conscious Storage Management for Web Proxies In IEEE/ACM Transactions on Networking, (available from IEEE Xplore)10(6), 735-748.
  87. Markatos, E.P. (2001). On Caching Search Engine Query Results. In Computer Communications,Elsevier Science, 137-143, (pdf).
  88. Lalis, S., Papadakis, D., & Marazakis, M. (2000). Decentralized resource acquisition from autonomous markets in a QoS-capable environment. Decis Support Syst28(1), 89-100, Amsterdam, Netherlands: Elsevier Science Publishers B.V. (01679236).
  89. Karvounarakis, G., & Kapidakis, S. (2000). Submission and repository management of digital libraries, using WWW. Comput.Networks34(6), 861-872, Amsterdam, Netherlands: Elsevier Sci B.V. (13891286).
  90. Dramitinos, G., & Markatos, E.P. (1999). Adaptive and Reliable Paging to Remote Main MemoryIn Journal of Parallel and Distributed Computing (available from Science Direct)58(3), 357-388.
  91. Pnevmatikatos, D., Markatos, E.P., Maglis, Gr., & Ioannidis, S. (1999). On Using Network RAM as a non-volatile Buffer In Cluster Computing Journal on Networks, Software, and Applications, Baltzer Science Publishers. (available from Springer Link) 2(4), 295-303.
  92. Ioannidis, S., Papathanasiou, A E., Maglis, Gr., Pnevmatikatos, D., Markatos, E.P., & Sevaslidou, J.E. (1999). On Using Reliable Network RAM in Networks of Workstations In Parallel and Distributed Computing Practices, Special Issue on High Performance Computing on Clusters, Nova Science Publishers, USA, accepted for publication. (available from SCPE).
  93. Flouris, M.D., & Markatos, E.P. (1999). The Network RamDisk: using remote memory on heterogeneous NOWs In Cluster Computing Journal on Networks, Software, and Applications, Baltzer Science Publishers. (available from Springer Link) 2(4), 281-293.
  94. Houstis, C.E., Nikolaou, Ch., & Lalis, S. (1999). Towards a next generation of open scientific data repositories and services. CWI Quarterly12(2), 111-132.
  95. Markatos, E.P., Papathanasiou, A E., & Papadakakis, N. (1999). Visualizing Traffic on the World Wide WebIn WebNet Journal: Internet Technologies, Applications and Issues (available from Ed/ITLib)1(2), 57-65.
  96. Katevenis, M.G.H., Markatos, E.P., Kalokairinos, G., & Dollas, A. (1997). Telegraphos: a substrate for high-performance computing on workstation clustersJournal of Parallel and Distributed Computing43(2), 94-108, (0743-7315).
  97. Houstis, C.E., Kapidakis, S., Markatos, E.P., & Gelenbe, E. (1997). Execution of Compute Intensive Applications into Parallel Machines In Information Sciences, special issue on load balancing in distributed systems, Elsevier Science. (available from Science Direct) 97(1-2), 83-124.
  98. Houstis, C.E., Nikolaou, Ch., Marazakis, M., Patrikalakis, N., Sairamesh, J., & Tomasic, A. (1997). THETIS: Design of a data management and data visualization system for coastal zone management of the Mediterranean sea1. D-Lib Mag.3(11), 18-28, (10829873).
  99. Nikolaou, Ch., Marazakis, M., & Georgiannakis, G.Y. (1997). Transaction routing for distributed OLTP systems: Survey and recent results. Inf.Sci.97(1-2), 45-82, (00200255).
  100. Sairamesh, J., Nikolaou, Ch., & Kapidakis, S. (1996). Architectures for QoS based Retrieval in Digital Libraries. , 7, CEUR-WS.org.
  101. Markatos, E.P. (1996). Main Memory Caching of Web DocumentsIn Computer Networks and ISDN Systems. Also appeared in Proceedings of the Fifth International World Wide Web Conference, Paris, France, May 199628(7-11), 893-906.
  102. Markatos, E.P., & Leblanc, Th.J. (1994). Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors.  In IEEE Transactions on Parallel and Distributed Processing,5(4), 379-400, (pdf).

Magazine article

  1. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2018). A New Wireless Communication Paradigm through Software-controlled MetasurfacesIEEE Communications Magazine56(9), 162-169, (pdf).
  2. Christodoulaki, M., & Fragopoulou, P. (2010). SafeLine: reporting illegal internet content. Information Management & Computer Security18(1), 54-65.
  3. Athanasopoulos, E., & Christodoulaki, M. (2010). Think B4 U postThe Economist (Kathimerini)3(74), 58-59.
  4. Ioannidis, S., Markatos, E.P., Kirda, E., & Kruegel, Ch. (2009). Drivers of Emerging and Future Threats in ICT Infrastructures . , 5(3),  http://www.ics.forth.gr/dcs/Activities/forward-enisa-quarterly-2009.3.pdf.
  5. Markatos, E.P., & Anagnostakis, K.G. (2008). NoAH: A European Network of Affined Honeypots for cyber-attack Tracking and Alerting. , (262).
  6. Antonatos, S., Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@Home: Παγιδεύοντας τις επιθέσεις από το διαδίκτυο. The Economist (Kathimerini)9.
  7. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). LOBSTER: Ανίχνευση επιθέσεων στο διαδίκτυο. The Economist (Kathimerini)9.
  8. Markatos, E.P., Anagnostakis, K.G., Antonatos, S., & Polychronakis, M. (2007). Real-time Monitoring and Detection of Cyberattacks. , 3(1),  http://www.ics.forth.gr/_pdf/brochures/noah-lobster-enisa-quarterly-2007.1.pdf.
  9. Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2007). Ανάπτυξη ασφαλών οπτικών δικτύων. The Economist (Kathimerini)9.
  10. Markatos, E.P., Antonatos, S., & Anagnostakis, K.G. (2006). Discovering Hackers, with a honeypot as bait. ,  http://www.ics.forth.gr/_pdf/brochures/naftemporiki_Dec2006.2.pdf.
  11. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2006). Μία Ευρωπαϊκή Πλατφόρμα ανίχνευσης & αναχαίτισης ηλεκτρονικών επιθέσεων στο Διαδίκτυο. The Economist (Kathimerini)4, 89.

ERCIM News

  1. Daskalaki, E., Psaroudaki, K., & Fragopoulou, P. (2018). EL-SIC: Focus on Better and Safer Online Experiences for KidsERCIM NEWS - Special theme: Digital Twins, (115), 52-52, October 2018.
  2. Dikaiakos D., M., Pallis, G., & Markatos, E.P. (2016). Mandola: Monitoring and Detecting Online Hate SpeechERCIM NEWS , (107), 49-50, October 2016.
  3. Markatos, E.P., Versinskiene, E., & Bruze, E. (2016). SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, training, and EducationERCIM NEWS , (106), 48-48, July 2016.
  4. Kalogiros, C., Tountopoulos, V., Ioannidis, S., Keller, S., & Bisson, P. (2015). Operational Trustworthiness Enabling Technologies - The OPTET ProjectERCIM News102, July 2015.
  5. Maggi, F, Zanero, S., & Markatos, E.P. (2015). European Cyber-Security Research and InnovationERCIM NEWS, (100), 43-43, January 2015.
  6. Zanero, S., Ioannidis, S., & Markatos, E.P. (2012). i-Code: Real-Time Malicious Code IdentificationERCIM News90, 19-20, July.
  7. Markatos, E.P., & Bos, H. (2012). SysSec: Managing Theats and Vulnerabilities in the Future InternetERCIM News90, 13-14, July.
  8. Ioannidis, S., Markatos, E.P., & Kruegel, Ch. (2009). On looking FORWARDERCIM News76, January 2009.
  9. Anagnostakis, K.G., & Markatos, E.P. (2005). Towards a European Malware Containment InfrastructureERCIM News63, 16-17, October 2005.
  10. Bilas, A., & Markatos, E.P. (2003). Wearable Systems for Everyday UseERCIM News52, 15-16, January 2003.
  11. Markatos, E.P. (2001). ServerGrids: Available and Scalable Global Computing PlatformsERCIM News45, April 2001.
  12. Markatos, E.P., & Papathanasiou, A E. (1999). Monitoring and Displaying Traffic on the World Wide WebERCIM News37, April 1999.
  13. Houstis, C.E. (1999). THETIS - A Data Management and Visualization System for the Support of Coastal Zone Management in the Mediterranean SeaERCIM News39, October 1999.
  14. Nikolaou, Ch. (1998). EU-NSF Working Group on Intellectual Property Rights (IPR) and Economic IssuesERCIM News32, January 1998.
  15. Markatos, E.P. (1998). TeachWEB - Novel Learning Approaches using the World-Wide WebERCIM News33, April 1998.
  16. Doerr, M., & Fundulaki, I. (1998). The Aquarelle Terminology ServiceERCIM News33, April 1998.
  17. Papadakis, D., Marazakis, M., & Nikolaou, Ch. (1997). Middleware Services to support Electronic CommerceERCIM News30, July 1997.
  18. Markatos, E.P., & Chronaki, C. (1996). Caching, Prefetching and Coherence in the World Wide WebERCIM News25, April 1996.
  19. Sairamesh, J., Kapidakis, S., & Nikolaou, Ch. (1996). Digital Library Research at ICS-FORTHERCIM News27, October 1996.
  20. Nikolaou, Ch. (1996). European Union endorses ERCIM Digital Document InitiativeERCIM News24, January 1996.
  21. Constanta Fanouraki , P., & Tsironis, G. (1996). European Week for Scientific and Technological Culture 1995ERCIM News25, April 1996.
  22. Nikolaou, Ch., Saridakis, T., & Markatos, E.P. (1995). ArrayTracerERCIM News23, April 1995.
  23. Nikolaou, Ch., & Karavassili, M. (1995). First LYDIA Workshop on Load BalancingERCIM News21, April 1995.
  24. Marazakis, M. (1995). TPsim - A Simulator for Transaction Processing SystemsERCIM News23, April 1995.
Found: 137 publications