I. I. Androulidakis

Learn More
Telecommunication networks have long ago entered the Critical Infrastructure domain. The contribution of this work focuses on a malware effectively targeting Private Branch eXchanges (PBXs). Such an occurrence would have a devastating effect on the communication confidentiality, integrity and availability. This effect can further be amplified in warlike(More)
The wide proliferation of mobile devices has attracted the attention of cyber-criminals, who exploit their functionality for malevolent purposes. One of the most popular approaches is the exploitation of sms for generating unsolicited electronic messages, also known as spam. The paper describes the peculiarities of the mobile unsolicited message traffic and(More)
  • 1