SCIENTIFIC PUBLICATIONS


JOURNAL

 # Year Authors Title Venue
1 2022 Pablo López-Aguilar, Edgar Batista , Antoni Martínez-Ballesté, and Agusti Solanas Information Security and Privacy in Railway Transportation: A Systematic Review Sensors (MDPI)​
2 2023 Elena Almaraz Luengo, Bittorlaña Olivares, Luis Javier García Villalba, Julio Hernandez-Castro Further Analysis of the Statistical Independence of the NIST SP 800-22 Randomness Tests Applied Mathematics and Computation
3 2023 Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda K. Toscano-Medina , Hector Perez-Meana, Jesus Olivares-Mercado, Jose Portillo-Portillo , Gibran Benitez-Garcia , Ana Lucila Sandoval Orozco and Luis Javier García Villalba ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning Sensors (MDPI)​
4 2023 Alejandra Guadalupe Silva-Trujillo, Mauricio Jacobo González González, Luis Pablo Rocha Pérez, Luis Javier García Villalba Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack Sensors (MDPI)​
5 2023 Gabriel Arquelau Pimenta Rodrigues, Andr. Luiz Marques Serrano, Amanda Nunes Lopes Espi.eira Lemos, Edna Dias Canedo, F.bio L.cio Lopes de Mendon, Robson de Oliveira Albuquerque, Ana Lucila Sandoval Orozco and Luis Javier Garc.a Villalba Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review Data​
6 2023 Yuejun Guo, Seifeddine Bettaieb & Fran Casino A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead
International Journal of Information Security
7 2023 Alexandros Zacharis & Constantinos Patsakis AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition
International Journal of Information Security
8 2023 P.L.S. Jayalaxmi, Rahul Saha , Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng PIGNUS: A Deep Learning model for IDS in industrial internet-of-things Computers & Security
9 2023 Rekha Goyat; Gulshan Kumar; Mauro Conti; Tannishtha Devgun; Rahul Saha; Reji Thomas BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT IEEE Internet of Things Journal
10 2024 Constantinos Patsakis & Nikolaos Lykousas Man vs the machine in the struggle for effective text anonymisation in the age of large language models Scientific Reports​
11 2024 Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis Hello me, meet the real me: Voice synthesis attacks on voice assistants Computers & Security​
12 2024 Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Robson de Oliveira Albuquerque, Gabriela Mayumi Saiki, Sara Santedicola Ribeiro, Ana Lucila Sandoval Orozco , Luis Javier García Villalba Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications Results in Engineering​
13 2024 Qiang Hu , Yuejun Guo ,XiaofeiXie , Maxime Cordy Mike Papadakis , and Yves Le Traon Active code learning: Benchmarking sample-efficient training of code models
IEEE Transactions on Software Engineering ​
14 2024 Ying Yuan,Giovanni Apruzzese, Mauro Conti Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning Digital Threats: Research and Practice
15 2024 Pablo Corona-Fraga, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier Garc.a Villalba Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning Future internet
16 2024 Fran Casino a b, Peio Lopez-Iturri c, Constantinos Patsakis Cloud continuum testbeds and next-generation ICTs: Trends, challenges, and perspectives Computer Science Review
17 2024 Alexandros Zacharis, Vasilios Katos & Constantinos Patsakis Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
International Journal of Information Security
18 2024 Anargyros Chrysanthou a, Yorgos Pantis b, Constantinos Patsakis The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign Computers & Security
19 2024 Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon Test Optimization in DNN Testing: A Survey
ACM Transactions on Software Engineering and Methodology
20 2024 Constantinos Patsakis, Fran Casino, Nikolaos Lykousas Assessing LLMs in malicious code deobfuscation of real-world malware campaigns Expert Systems with Applications
21 2024 Nikolaos Lykousas , Constantinos Patsakis Decoding developer password patterns: A comparative analysis of password extraction and selection practices Computers & Security
22 2025 Ariadna ClaudiaMoreno , Aldo Hernandez-Suarez , Gabriel Sanchez-Perez , Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier Garc.a Villalba Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems Sensors (MDPI)​
23 2025 Amandeep Verma; Rahul Saha; Gulshan Kumar; Alessandro Brighente; Mauro Conti; Tai-Hoon Kim Exploring the Landscape of Programming Language Identification With Machine Learning Approaches IEEE Access
24 2025 Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Wei Ma, Mike Papadakis, Lei Ma, Yves Le Traon Assessing the Robustness of Test Selection Methods for Deep Neural Networks
ACM Transactions on Software Engineering and Methodology
25 2025 Jin Wen, Qiang Hu, Yuejun Guo, Maxime Cordy, Yves Le Traon Variable Renaming-Based Adversarial Test Generation for Code Model: Benchmark and Enhancemen
ACM Transactions on Software Engineering and Methodology
26 2025 Fran Casino , Darren Hurley-Smith , Julio Hernandez-Castro , Constantinos Patsakis Not on my watch: ransomware detection through classification of high-entropy file segments Journal of Cybersecurity
27 2025 Zeming Dong; Qiang Hu; Yuejun Guo; Zhenya Zhang; Jianjun Zhao Boosting source code learning with text-oriented data augmentation: an empirical study Empirical Software Engineering
28 2025 Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis Beyond the sandbox: Leveraging symbolic execution for evasive malware classification Computers & Security
29 2025 Fran Casino Unveiling the multifaceted concept of cognitive security: Trends, perspectives, and future challenges Technology in Society
30 2025 Alexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, Christos Douligeris Optimising AI models for intelligence extraction in the life cycle of Cybersecurity Threat Landscape generation
Journal of Information Security and Applications
31 2025 Daniel Gibert, Nikolaos Totosis, Constantinos Patsakis, Quan Le, Giulio Zizzo Assessing the impact of packing on static machine learning-based malware detection and classification systems Computers & Security

CONFERENCES

# Year Authors Title Venue
1 2022 Pablo López-Aguilar; Constantinos Patsakis; Agusti Solanas The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review 2022 APWG Symposium on Electronic Crime Research (eCrime)
2 2023 Alexandros Zacharis; Razvan Gavrila; Constantinos Patsakis; Demosthenes Ikonomou AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)
3 2023 Tommaso Bianchi; Surudhi Asokraj; Alessandro Brighente; Mauro Conti; Radha Poovendran QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)
4 2023 Christos Karapapas, George C. Polyzos & Constantinos Patsakis What’s inside a node? Malicious IPFS nodes under the magnifying glass ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023
5 2023 Nikolaos Lykousas, Vasilios Koutsokostas,Fran Casino, Constantinos Patsakis The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE)
6 2023 Nikolaos Lykousas, Constantinos Patsakis Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
7 2023 Alessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, Radha Poovendran BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
8 2023 Andrea Agiollo; Enkeleda Bardhi; Mauro Conti; Riccardo Lazzeretti; Eleonora Losiouk; Andrea Omicini GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)
9 2023 Constantinos Patsakis, Alexandros Zacharis, Razvan Gavrila AiCEF: An AI-powered Cyber Exercise Content Generation Framework BlackHat Asia 2023
10 2023 Yuejun Guo, Qiang Hu, Qiang Tang & Yves Le Traon An Empirical Study of the Imbalance Issue in Software Vulnerability Detection European Symposium on Research in Computer Security
11 2023 Qiang Hu; Yuejun Guo; Maxime Cordy; Mike Papadakis; Yves Le Traon MUTEN: Muten-Based Ensembles for Boosting Gradient-Based Adversarial Attack 2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE)
12 2023 Yuejun Guo; Seifeddine Bettaieb An Investigation of Quality Issues in Vulnerability Detection Datasets 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
13 2024 Tannishtha Devgun; Gulshan Kumar; Mauro Conti FASALKA: Offloaded Privacy Classification for Blockchain Smart Contracts 2024 6th International Conference on Blockchain Computing and Applications (BCCA)
14 2024 Wanpeng Li, Yuejun Guo Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security
15 2024 Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil & Narges Yousefnezhad A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems International Symposium on Business Modelling and Software Design
16 2024 Narges Yousefnezhad & Andrei Costin Reproducibility of Firmware Analysis: An Empirical Study International Symposium on Business Modelling and Software Design
17 2024 Yousefnezhad, N., Costin, A. Understanding SBOMs in Real-World Systems – A Practical DevOps/SecOps Perspective International Symposium on Business Modelling and Software Design
18 2024 Hannu Turtiainen; Andrei Costin VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
19 2024 Costin, Andrei; Turtiainen, Hannu; Yousefnezhad, Narges; Bogulean, Vadim; Hämäläinen, Timo Evaluating Zero-Shot Chatgpt Performance on Predicting CVE Data From Vulnerability Descriptions Proceedings of the European Conference on Cyber Warfare and Security
20 2024 Javier Carrillo-Mondéjar, Guillermo Suarez-Tangil, Andrei Costin, and Ricardo J. Rodríguez Exploring Shifting Patterns in Recent IoT Malware Proceedings of the European Conference on Cyber Warfare and Security
21 2024 Alberto Castagnaro, Mauro Conti, Luca Pajola Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models AISec '24: Proceedings of the 2024 Workshop on Artificial Intelligence and Security
22 2024 Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang "Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages WWW '24: Proceedings of the ACM Web Conference 2024
23 2024 Rahul Saha, Mauro Conti PITCOR: Privacy-assured Time-controlled Revocation in Blockchain Transactions 2024 6th International Conference on Blockchain Computing and Applications (BCCA)
24 2024 Tommaso Bianchi, Alessandro Brighente, Mauro Conti DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
25 2024 Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors 33rd USENIX Security Symposium
26 2024 Kavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran CANLP: NLP-Based Intrusion Detection System for CAN SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing
27 2024 Bruce W. Percílio Azevedo, Luis Alberto Martínez Hernández, Robson de Oliveira Albuquerque, Luis Javier García Villalba Método para Automatizar Clasificación de Malware PE32 mediante técnicas de Procesamiento de Lenguaje Natural IX Jornadas Nacionales de Investigación en Ciberseguridad (JNIC)
28 2024 Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang & Fran Casino Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security
29 2024 Bruce Azevedo, Robson Albuquerque, Luis Villalba and Luis Hernandez Method for identifying buffer overflow in C code using Natural Language Processing Techniques RECSI - Spanish meeting on cryptology and information security
30 2024 Nikolaos Lykousas, Vasileios Argyropoulos, Fran Casino The potential of LLM-generated reports in DevSecOps International Conference on AI-empowered Software Engineering – AIESE 2024
31 2025 Jesús Martín Abad, David Arroyo Guardeño & Fran Casino Risks and Challenges Associated with the Chain of Custody of Cryptographic Assets in Law Enforcement Operations International Congress on Blockchain and Applications
32 2025 Giacomo Benedetti, Serena Cofano, Alessandro Brighente & Mauro Conti The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach International Conference on Applied Cryptography and Network Security
33 2025 Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, and Radha Poovendran CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations International Conference on Applied Cryptography and Network Security
34 2025 Alessandro Brighente, Mauro Conti, Savio Sciancalepore, Harshul Vaishnav Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures SAC '25: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing
35 2025 Menno Bezema, Alessandro Brighente, Mauro Conti, Luca Cosuti BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying Behavior SAC '25: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing
36 2025 Belkacem Imine Rahul Saha Mauro Conti MICODE: A Minimal Code Design for Secret Sharing Scheme 22nd International Conference on Security and Cryptography