Automated generation of attack trees

R Vigo, F Nielson, HR Nielson - 2014 IEEE 27th computer …, 2014 - ieeexplore.ieee.org
Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner,
suitable for conveying security information to non-experts. The manual construction of such …

A sip-oriented spit management framework

D Gritzalis, Y Mallios - Computers & Security, 2008 - Elsevier
Voice over IP (VoIP) telephony is increasingly gaining popularity among home and business
users alike, as a viable alternative to traditional telephony, and is expected to achieve a …

OntoSPIT: SPIT management through ontologies

S Dritsas, V Dritsou, B Tsoumas… - Computer …, 2009 - Elsevier
VoIP enables new ways for communication. At the same time, it provides new means, in
terms of transmitting bulk unsolicited messages and calls, namely SPam over Internet …

An adaptive policy-based approach to SPIT management

Y Soupionis, S Dritsas, D Gritzalis - … Security, Málaga, Spain, October 6-8 …, 2008 - Springer
Voice over IP (VoIP) is a key enabling technology, which provides new ways of
communication. VoIP technologies take advantage of existing data networks to provide …

Aspf: Adaptive anti-spit policy-based framework

Y Soupionis, D Gritzalis - 2011 Sixth International Conference …, 2011 - ieeexplore.ieee.org
SPam over Internet Telephony (SPIT) is a rising IP voice telephony threat. Voice over IP
enables the transmission of telephone calls over the Internet, as opposed to plain old …

Making genome expression data meaningful: Prediction and discovery of classes of cancer through a connectionist learning approach

F Azuaje - Proceedings IEEE International Symposium on Bio …, 2000 - ieeexplore.ieee.org
Despite more than 30 years of experimental research, there have been no generic models to
classify tumours and identify new types of cancer. Similarly, advances in the molecular …

Countering Unsolicited Calls in the Internet Telephony: An anti-SPIT Architecture.

P Stamatiou, D Gritzalis - Hellenic Open University Journal …, 2009 - search.ebscohost.com
Abstract Internet Telephony (Voice over Internet Protocol, VoIP), a telephony service which
is based in packet transmission through IP networks, is becoming increasingly popular …

An ontology-driven antiSPIT architecture

S Dritsas, D Gritzalis - Next Generation Society. Technological and Legal …, 2010 - Springer
Over the last years Voice-over-IP (VoIP) is getting widespread a dop tion from business and
residential customers. The preference towards VoIP ser vices stems from the fact that VoIP …

A comparative study of some network subsystem organizations

DV Ponomarev, K Ghose - Proceedings. Fifth International …, 1998 - ieeexplore.ieee.org
The impact of alternative network subsystem design for realizing low end-to-end latencies
and high network throughput in a switched LAN are studied in detail through simulation …

[PDF][PDF] AUEB-InfoSec: Cybersecurity Publications and Research 2021

C Lepeniotis - infosec.aueb.gr
This report includes a list of publications, in which at least one of the authors is a researcher
and member of the Information Security and Critical Infrastructure Protection (InfoSec) …