|
Title |
Creator |
Date |
|
3.
|
The evolution of cybercrime through the lens of cryptocurrencies
|
Αρακάς, Ιωάννης Γ.
|
2024-03-22 |
|
4.
|
Full stack protection leveraging user-level enclaves
|
Ντεγιάννης, Δημήτριος Α
|
2023-12-01 |
|
5.
|
Hardware-assisted security mechanisms for memory vulnerabilities
|
Χρήστου, Γεώργιος Χ
|
2023-12-01 |
|
6.
|
Proportional fairness and isolation for serverless applications over FaaS platforms
|
Κελαντωνάκης, Γιώργος Ζ.
|
2023-12-01 |
|
7.
|
Decentralized privacy-preserving data sharing : the case of wearable data
|
Marchioro, Thomas S.
|
2023-07-21 |
|
8.
|
Encryption workarounds for Android
|
Μπάσα, Σκέρντι Μ.
|
2023-07-21 |
|
9.
|
Exploration and analysis of online political ad libraries
|
Βιτσαξάκη, Αικατερίνη Ι.
|
2023-07-21 |
|
10.
|
Mitigation of cyber attacks in wearable devices
|
Kazlouski, Andrei M.
|
2023-07-21 |
|
11.
|
RED : a Reputation Dashboard that displays the geolocation of bots and malicious computers, utilizing OSINT data
|
Σπυριδάκης, Κωνσταντίνος Ν.
|
2023-07-21 |
|
12.
|
Android’s security and privacy journey through the lens of access control policies
|
Διαμαντάρης, Μιχάλης Η
|
2023-04-07 |
|