​
Login / Signup
Nikos Vrakas
Publication Activity (10 Years)
Years Active: 2009-2019
Publications (10 Years): 2
Top Topics
Ip Multimedia Subsystem
Requirements Analysis
Competitive Environment
Intrusion Detection
Top Venues
UIC/ATC
CoRR
Comput. Secur.
EuCNC
</>
Publications
</>
Tilemachos Doukoglou
,
Velissarios G. Gezerlis
,
Konstantinos Trichias
,
Nikos Kostopoulos
,
Nikos Vrakas
,
Marios Bougioukos
,
Rodolphe Legouable
Vertical Industries Requirements Analysis & Targeted KPIs for Advanced 5G Trials.
CoRR
(2019)
Tilemachos Doukoglou
,
Velissarios G. Gezerlis
,
Konstantinos Trichias
,
Nikos Kostopoulos
,
Nikos Vrakas
,
Marios Bougioukos
,
Rodolphe Legouable
Vertical Industries Requirements Analysis & Targeted KPIs for Advanced 5G Trials.
EuCNC
(2019)
Nikos Vrakas
,
Dimitris Geneiatakis
,
Costas Lambrinoudakis
Obscuring users' identity in VoIP/IMS environments.
Comput. Secur.
43 (2014)
Nikos Vrakas
,
Dimitris Geneiatakis
,
Costas Lambrinoudakis
Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments.
IEEE Commun. Surv. Tutorials
15 (2) (2013)
Nikos Vrakas
,
Costas Lambrinoudakis
An intrusion detection and prevention system for IMS and VoIP services.
Int. J. Inf. Sec.
12 (3) (2013)
Nikolaos Pitropakis
,
Eleni Darra
,
Nikos Vrakas
,
Costas Lambrinoudakis
It's All in the Cloud: Reviewing Cloud Security.
UIC/ATC
(2013)
Nikos Vrakas
,
Dimitris Geneiatakis
,
Costas Lambrinoudakis
IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS.
SECRYPT
(2011)
Nikos Vrakas
,
Costas Lambrinoudakis
A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services.
Int. J. Inf. Technol. Syst. Approach
4 (2) (2011)
Nikos Vrakas
,
Christos Kalloniatis
,
Aggeliki Tsohou
,
Costas Lambrinoudakis
Privacy Requirements Engineering for Trustworthy e-Government Services.
TRUST
(2010)
Nikos Vrakas
,
Dimitris Geneiatakis
,
Costas Lambrinoudakis
A Call Conference Room Interception Attack and Its Detection.
TrustBus
(2010)
Dimitris Geneiatakis
,
Nikos Vrakas
,
Costas Lambrinoudakis
Utilizing bloom filters for detecting flooding attacks against SIP based services.
Comput. Secur.
28 (7) (2009)