• Publications
  • Influence
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
TLDR
This paper gathers, categorizes, thoroughly evaluates the most popular attacks on 802.11 networks and analyzes their signatures. Expand
  • 167
  • 38
  • PDF
Addressing privacy requirements in system design: the PriS method
TLDR
This paper describes PriS, a security requirements engineering method for incorporating basic privacy requirements into the system design process. Expand
  • 214
  • 18
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
TLDR
We present a new approach, called the SCAP (Source Code Author Profiles) approach, based on byte-level n-gram profiles representing the source code author’s style. Expand
  • 108
  • 11
  • PDF
A framework to support selection of cloud providers based on security and privacy requirements
TLDR
We introduce a novel framework that supports security and privacy requirements elicitation and selection of a suitable cloud service provider based on the satisfiability of the service provider. Expand
  • 117
  • 10
  • PDF
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
TLDR
This paper demonstrates that the security services offered by Public Key Infrastructure (PKI) can be employed for fulfilling most of the identified security requirements for an integrated e-government platform. Expand
  • 145
  • 9
  • PDF
Survey of security vulnerabilities in session initiation protocol
TLDR
The open architecture of the Internet and the use of open standards like Session Initiation Protocol (SIP) constitute the provisioning of services vulnerable to known Internet attacks, while at the same time introducing new security problems based on these standards that cannot been tackled with current security mechanisms. Expand
  • 191
  • 8
  • PDF
Detecting DNS Amplification Attacks
TLDR
In this paper, we present and evaluate a novel and practical method that is able to distinguish between authentic and bogus DNS replies. Expand
  • 70
  • 6
  • PDF
Attacks and Countermeasures on 802.16: Analysis and Assessment
TLDR
This paper provides a comprehensive taxonomy of attacks and countermeasures on 802.16. Expand
  • 48
  • 6
  • PDF
Enhancing Web privacy and anonymity in the digital era
  • S. Gritzalis
  • Computer Science
  • Inf. Manag. Comput. Secur.
  • 1 July 2004
TLDR
GNUnet's Anonymity Protocol (GAP), Freedom, Hordes, Crowds, Onion Routing, Platform for Privacy Preferences (P3P), TRUSTe, Lucent Personalized Web Assistant (LPWA), and Anonymizer have been reviewed and compared. Expand
  • 81
  • 5
  • PDF
Effective identification of source code authors using byte-level information
TLDR
We present a new approach, called the SCAP (Source Code Author Profiles) approach, based on byte-level n-gram profiles in order to represent a source code author's style. Expand
  • 88
  • 5
  • PDF