Showing
1 - 4
results of
4
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Vasilellis, Efstratios
Search Results - Vasilellis, Efstratios
Showing
1 - 4
results of
4
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Press play, install malware: a study of rhythm game-based malware dropping
by
Vasilellis, Efstratios
,
Gkionis, Grigoris
,
Gritzalis, Dimitris
Published in
International journal of information security
Get full text
Items that this one cites
Article
Save to List
Saved in:
2
Loading…
Gaming the system: tetromino-based covert channel and its impact on mobile security
by
Vasilellis, Efstratios
,
Botsos, Vasileios
,
Anagnostopoulou, Argiro
,
Gritzalis, Dimitris
Published in
International journal of information security
Get full text
Items that this one cites
Article
Save to List
Saved in:
3
Loading…
Dropping malware through sound injection: A comparative analysis on Android operating systems
by
Stergiopoulos, George
,
Gritzalis, Dimitris
,
Vasilellis, Efstratios
,
Anagnostopoulou, Argiro
Published in
Computers & security
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
4
Loading…
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis
by
Stergiopoulos, George
,
Kapetanas, Nick
,
Vasilellis, Efstratios
,
Gritzalis, Dimitris
Published in
Security and privacy
Get full text
Items that this one cites
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
4 results
4
Full Text
4 results
4
Format
Articles
4 results
4
Journal Title
International Journal Of Information Security
2 results
2
Computers & Security
1 results
1
Security And Privacy
1 results
1
Subjects
Computer Science
4 results
4
Computer Science, Information Systems
4 results
4
Science & Technology
4 results
4
Technology
4 results
4
Malware
3 results
3
Payloads
3 results
3
Algorithms
2 results
2
Coding And Information Theory
2 results
2
Communications Engineering
2 results
2
Computer Communication Networks
2 results
2
Computer Science, Software Engineering
2 results
2
Computer Science, Theory & Methods
2 results
2
Cryptology
2 results
2
Cybersecurity
2 results
2
Management Of Computing And Information Systems
2 results
2
Networks
2 results
2
Operating Systems
2 results
2
Regular Contribution
2 results
2
Threat Evaluation
2 results
2
Access Control
1 results
1
Year of Publication
From:
To:
Source
Ebscohost Business Source Ultimate
2 results
2
Social Science Premium Collection
2 results
2
Criminology Collection
2 results
2
Springer Nature
2 results
2
Abi/Inform Global
2 results
2
Criminal Justice Database
2 results
2
Springerlink Contemporary
2 results
2
Wiley-Blackwell Journals
1 results
1
Sciencedirect
1 results
1
Sciencedirect Freedom Collection
1 results
1
Wiley-Blackwell Read & Publish Collection
1 results
1
Backfile Package - Business, Management And Accounting Including Supplement 1 [Yub]
1 results
1
Ezb-Free-00999 Freely Available Ezb Journals
1 results
1
Backfile Package - Computer Science (Legacy) [Ycs]
1 results
1
Backfile Package - Business, Management And Accounting (Legacy) [Ybt]
1 results
1