|
Τίτλος |
Δημιουργός |
Ημερομηνία |
|
5.
|
Hardware-assisted security mechanisms for memory vulnerabilities
|
Χρήστου, Γεώργιος Χ
|
2023-12-01 |
|
6.
|
Proportional fairness and isolation for serverless applications over FaaS platforms
|
Κελαντωνάκης, Γιώργος Ζ.
|
2023-12-01 |
|
7.
|
Decentralized privacy-preserving data sharing : the case of wearable data
|
Marchioro, Thomas S.
|
2023-07-21 |
|
8.
|
Encryption workarounds for Android
|
Μπάσα, Σκέρντι Μ.
|
2023-07-21 |
|
9.
|
Exploration and analysis of online political ad libraries
|
Βιτσαξάκη, Αικατερίνη Ι.
|
2023-07-21 |
|
10.
|
Mitigation of cyber attacks in wearable devices
|
Kazlouski, Andrei M.
|
2023-07-21 |
|
11.
|
RED : a Reputation Dashboard that displays the geolocation of bots and malicious computers, utilizing OSINT data
|
Σπυριδάκης, Κωνσταντίνος Ν.
|
2023-07-21 |
|
12.
|
Android’s security and privacy journey through the lens of access control policies
|
Διαμαντάρης, Μιχάλης Η
|
2023-04-07 |
|
13.
|
The Hitchhiker’s guide to facebook web tracking with invisible pixels and click IDs
|
Μπέκος, Πασχάλης Ν.
|
2023-04-07 |
|
14.
|
BPHS: a BGP prefix hijacking simulation tool supporting RPKI filtering
|
Επταμηνιτάκης, Γεώργιος Ε.
|
2022-07-29 |
|