Dimitris Geneiatakis
Dimitris Geneiatakis
European Commission Directorate General for Informatics
Verified email at
Cited by
Cited by
Survey of security vulnerabilities in session initiation protocol
D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ...
IEEE Communications Surveys & Tutorials 8 (3), 68-81, 2006
Security and privacy issues for an IoT based smart home
D Geneiatakis, I Kounelis, R Neisse, I Nai-Fovino, G Steri, G Baldini
2017 40th international convention on information and communication …, 2017
Detecting DNS amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
Critical Information Infrastructures Security: Second International Workshop …, 2008
Survey of network security systems to counter SIP-based denial-of-service attacks
S Ehlert, D Geneiatakis, T Magedanz
computers & security 29 (2), 225-243, 2010
A Permission verification approach for android mobile applications
D Geneiatakis, IN Fovino, I Kounelis, P Stirparo
Computers & Security 49, 192-205, 2015
A framework for protecting a SIP-based infrastructure against malformed message attacks
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Computer Networks 51 (10), 2580-2593, 2007
A fair solution to DNS amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
Second International Workshop on Digital Forensics and Incident Analysis …, 2007
Fostering consumers' energy market through smart contracts
I Kounelis, G Steri, R Giuliani, D Geneiatakis, R Neisse, I Nai-Fovino
2017 international conference in energy and sustainability in small …, 2017
SIP Security Mechanisms: A state-of-the-art review
D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ...
Proceedings of the Fifth International Network Conference (INC 2005), 147-155, 2005
Utilizing bloom filters for detecting flooding attacks against SIP based services
D Geneiatakis, N Vrakas, C Lambrinoudakis
computers & security 28 (7), 578-591, 2009
Blockchain performance analysis for supporting cross-border E-government services
D Geneiatakis, Y Soupionis, G Steri, I Kounelis, R Neisse, I Nai-Fovino
IEEE Transactions on Engineering Management 67 (4), 1310-1322, 2020
An ontology description for SIP security flaws
D Geneiatakis, C Lambrinoudakis
Computer Communications 30 (6), 1367-1374, 2007
Two layer Denial of Service prevention on SIP VoIP infrastructures
S Ehlert, G Zhang, D Geneiatakis, G Kambourakis, T Dagiuklas, J Markl, ...
Computer Communications 31 (10), 2443-2456, 2008
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
D Geneiatakis, C Lambrinoudakis
Telecommunication Systems 36, 153-159, 2007
On machine learning effectiveness for malware detection in Android OS using static analysis data
V Syrris, D Geneiatakis
Journal of Information Security and Applications 59, 102794, 2021
A framework for detecting malformed messages in SIP networks
D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ...
2005 14th IEEE Workshop on Local & Metropolitan Area Networks, 5 pp.-5, 2005
SIP message tampering: The SQL code injection attack
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Proceedings of 13th International Conference on Software, Telecommunications …, 2005
Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation
JL Hernández-Ramos, G Karopoulos, D Geneiatakis, T Martin, ...
Wireless Communications and Mobile Computing 2021 (1), 2427896, 2021
Two anatomists are better than one—dual-level android malware detection
V Kouliaridis, G Kambourakis, D Geneiatakis, N Potha
Symmetry 12 (7), 1128, 2020
A performance evaluation on distance measures in KNN for mobile malware detection
G Baldini, D Geneiatakis
2019 6th international conference on control, decision and information …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20