Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Polakis, Iasonas
add a person with the name Polakis, Iasonas
 

Other publications of authors with the same name

Evaluating the Privacy Guarantees of Location Proximity Services., , , , and . ACM Trans. Priv. Secur., 19 (4): 12:1-12:31 (2017)CAPTCHuring Automated (Smart)Phone Attacks., , and . EC2ND, page 60. IEEE Computer Society, (2011)The man who was there: validating check-ins in location-based services., , , and . ACSAC, page 19-28. ACM, (2013)Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software., , , , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 165-184. Springer, (2015)A Systematic Characterization of IM Threats using Honeypots., , , and . NDSS, The Internet Society, (2010)The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information., , and . IEEE Symposium on Security and Privacy, page 724-742. IEEE Computer Society, (2016)D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks., , , , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 663-678. Springer, (2010)Exploiting abused trending topics to identify spam campaigns in Twitter., , , , and . Soc. Netw. Anal. Min., 6 (1): 48:1-48:11 (2016)An empirical study on the security of cross-domain policies in rich internet applications., , , and . EUROSEC, page 7. ACM, (2011)Think Before RT: An Experimental Study of Abusing Twitter Trends., , , , and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 402-413. Springer, (2014)