JOURNAL
# | Year | Authors | Title | Venue |
1 | 2022 | Pablo López-Aguilar, Edgar Batista , Antoni Martínez-Ballesté, and Agusti Solanas | Information Security and Privacy in Railway Transportation: A Systematic Review | Sensors (MDPI) |
2 | 2023 | Elena Almaraz Luengo, Bittorlaña Olivares, Luis Javier García Villalba, Julio Hernandez-Castro | Further Analysis of the Statistical Independence of the NIST SP 800-22 Randomness Tests | Applied Mathematics and Computation |
3 | 2023 | Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda K. Toscano-Medina , Hector Perez-Meana, Jesus Olivares-Mercado, Jose Portillo-Portillo , Gibran Benitez-Garcia , Ana Lucila Sandoval Orozco and Luis Javier García Villalba | ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning | Sensors (MDPI) |
4 | 2023 | Alejandra Guadalupe Silva-Trujillo, Mauricio Jacobo González González, Luis Pablo Rocha Pérez, Luis Javier García Villalba | Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack | Sensors (MDPI) |
5 | 2023 | Gabriel Arquelau Pimenta Rodrigues, Andr. Luiz Marques Serrano, Amanda Nunes Lopes Espi.eira Lemos, Edna Dias Canedo, F.bio L.cio Lopes de Mendon, Robson de Oliveira Albuquerque, Ana Lucila Sandoval Orozco and Luis Javier Garc.a Villalba | Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review | Data |
6 | 2023 | Yuejun Guo, Seifeddine Bettaieb & Fran Casino | A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead |
International Journal of Information Security
|
7 | 2023 | Alexandros Zacharis & Constantinos Patsakis | AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition |
International Journal of Information Security
|
8 | 2023 | P.L.S. Jayalaxmi, Rahul Saha , Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng | PIGNUS: A Deep Learning model for IDS in industrial internet-of-things | Computers & Security |
9 | 2023 | Rekha Goyat; Gulshan Kumar; Mauro Conti; Tannishtha Devgun; Rahul Saha; Reji Thomas | BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT | IEEE Internet of Things Journal |
10 | 2024 | Constantinos Patsakis & Nikolaos Lykousas | Man vs the machine in the struggle for effective text anonymisation in the age of large language models | Scientific Reports |
11 | 2024 | Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis | Hello me, meet the real me: Voice synthesis attacks on voice assistants | Computers & Security |
12 | 2024 | Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Robson de Oliveira Albuquerque, Gabriela Mayumi Saiki, Sara Santedicola Ribeiro, Ana Lucila Sandoval Orozco , Luis Javier García Villalba | Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications | Results in Engineering |
13 | 2024 | Qiang Hu , Yuejun Guo ,XiaofeiXie , Maxime Cordy Mike Papadakis , and Yves Le Traon | Active code learning: Benchmarking sample-efficient training of code models |
IEEE Transactions on Software Engineering
|
14 | 2024 | Ying Yuan,Giovanni Apruzzese, Mauro Conti | Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning | Digital Threats: Research and Practice |
15 | 2024 | Pablo Corona-Fraga, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier Garc.a Villalba | Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning | Future internet |
16 | 2024 | Fran Casino a b, Peio Lopez-Iturri c, Constantinos Patsakis | Cloud continuum testbeds and next-generation ICTs: Trends, challenges, and perspectives | Computer Science Review |
17 | 2024 | Alexandros Zacharis, Vasilios Katos & Constantinos Patsakis | Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle |
International Journal of Information Security
|
18 | 2024 | Anargyros Chrysanthou a, Yorgos Pantis b, Constantinos Patsakis | The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign | Computers & Security |
19 | 2024 | Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon | Test Optimization in DNN Testing: A Survey |
ACM Transactions on Software Engineering and Methodology
|
20 | 2024 | Constantinos Patsakis, Fran Casino, Nikolaos Lykousas | Assessing LLMs in malicious code deobfuscation of real-world malware campaigns | Expert Systems with Applications |
21 | 2024 | Nikolaos Lykousas , Constantinos Patsakis | Decoding developer password patterns: A comparative analysis of password extraction and selection practices | Computers & Security |
22 | 2025 | Ariadna ClaudiaMoreno , Aldo Hernandez-Suarez , Gabriel Sanchez-Perez , Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier Garc.a Villalba | Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems | Sensors (MDPI) |
23 | 2025 | Amandeep Verma; Rahul Saha; Gulshan Kumar; Alessandro Brighente; Mauro Conti; Tai-Hoon Kim | Exploring the Landscape of Programming Language Identification With Machine Learning Approaches | IEEE Access |
24 | 2025 | Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Wei Ma, Mike Papadakis, Lei Ma, Yves Le Traon | Assessing the Robustness of Test Selection Methods for Deep Neural Networks |
ACM Transactions on Software Engineering and Methodology
|
25 | 2025 | Jin Wen, Qiang Hu, Yuejun Guo, Maxime Cordy, Yves Le Traon | Variable Renaming-Based Adversarial Test Generation for Code Model: Benchmark and Enhancemen |
ACM Transactions on Software Engineering and Methodology
|
26 | 2025 | Fran Casino , Darren Hurley-Smith , Julio Hernandez-Castro , Constantinos Patsakis | Not on my watch: ransomware detection through classification of high-entropy file segments | Journal of Cybersecurity |
27 | 2025 | Zeming Dong; Qiang Hu; Yuejun Guo; Zhenya Zhang; Jianjun Zhao | Boosting source code learning with text-oriented data augmentation: an empirical study | Empirical Software Engineering |
28 | 2025 | Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis | Beyond the sandbox: Leveraging symbolic execution for evasive malware classification | Computers & Security |
29 | 2025 | Fran Casino | Unveiling the multifaceted concept of cognitive security: Trends, perspectives, and future challenges | Technology in Society |
30 | 2025 | Alexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, Christos Douligeris | Optimising AI models for intelligence extraction in the life cycle of Cybersecurity Threat Landscape generation |
Journal of Information Security and Applications
|
31 | 2025 | Daniel Gibert, Nikolaos Totosis, Constantinos Patsakis, Quan Le, Giulio Zizzo | Assessing the impact of packing on static machine learning-based malware detection and classification systems | Computers & Security |
CONFERENCES
# | Year | Authors | Title | Venue |
1 | 2022 | Pablo López-Aguilar; Constantinos Patsakis; Agusti Solanas | The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review | 2022 APWG Symposium on Electronic Crime Research (eCrime) |
2 | 2023 | Alexandros Zacharis; Razvan Gavrila; Constantinos Patsakis; Demosthenes Ikonomou | AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict | 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) |
3 | 2023 | Tommaso Bianchi; Surudhi Asokraj; Alessandro Brighente; Mauro Conti; Radha Poovendran | QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer | 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring) |
4 | 2023 | Christos Karapapas, George C. Polyzos & Constantinos Patsakis | What’s inside a node? Malicious IPFS nodes under the magnifying glass | ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023 |
5 | 2023 | Nikolaos Lykousas, Vasilios Koutsokostas,Fran Casino, Constantinos Patsakis | The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces | 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE) |
6 | 2023 | Nikolaos Lykousas, Constantinos Patsakis | Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices | 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) |
7 | 2023 | Alessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, Radha Poovendran | BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks | WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks |
8 | 2023 | Andrea Agiollo; Enkeleda Bardhi; Mauro Conti; Riccardo Lazzeretti; Eleonora Losiouk; Andrea Omicini | GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks | 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) |
9 | 2023 | Constantinos Patsakis, Alexandros Zacharis, Razvan Gavrila | AiCEF: An AI-powered Cyber Exercise Content Generation Framework | BlackHat Asia 2023 |
10 | 2023 | Yuejun Guo, Qiang Hu, Qiang Tang & Yves Le Traon | An Empirical Study of the Imbalance Issue in Software Vulnerability Detection | European Symposium on Research in Computer Security |
11 | 2023 | Qiang Hu; Yuejun Guo; Maxime Cordy; Mike Papadakis; Yves Le Traon | MUTEN: Muten-Based Ensembles for Boosting Gradient-Based Adversarial Attack | 2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE) |
12 | 2023 | Yuejun Guo; Seifeddine Bettaieb | An Investigation of Quality Issues in Vulnerability Detection Datasets | 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) |
13 | 2024 | Tannishtha Devgun; Gulshan Kumar; Mauro Conti | FASALKA: Offloaded Privacy Classification for Blockchain Smart Contracts | 2024 6th International Conference on Blockchain Computing and Applications (BCCA) |
14 | 2024 | Wanpeng Li, Yuejun Guo | Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models | CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security |
15 | 2024 | Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil & Narges Yousefnezhad | A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems | International Symposium on Business Modelling and Software Design |
16 | 2024 | Narges Yousefnezhad & Andrei Costin | Reproducibility of Firmware Analysis: An Empirical Study | International Symposium on Business Modelling and Software Design |
17 | 2024 | Yousefnezhad, N., Costin, A. | Understanding SBOMs in Real-World Systems – A Practical DevOps/SecOps Perspective | International Symposium on Business Modelling and Software Design |
18 | 2024 | Hannu Turtiainen; Andrei Costin | VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP | 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) |
19 | 2024 | Costin, Andrei; Turtiainen, Hannu; Yousefnezhad, Narges; Bogulean, Vadim; Hämäläinen, Timo | Evaluating Zero-Shot Chatgpt Performance on Predicting CVE Data From Vulnerability Descriptions | Proceedings of the European Conference on Cyber Warfare and Security |
20 | 2024 | Javier Carrillo-Mondéjar, Guillermo Suarez-Tangil, Andrei Costin, and Ricardo J. Rodríguez | Exploring Shifting Patterns in Recent IoT Malware | Proceedings of the European Conference on Cyber Warfare and Security |
21 | 2024 | Alberto Castagnaro, Mauro Conti, Luca Pajola | Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models | AISec '24: Proceedings of the 2024 Workshop on Artificial Intelligence and Security |
22 | 2024 | Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang | "Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages | WWW '24: Proceedings of the ACM Web Conference 2024 |
23 | 2024 | Rahul Saha, Mauro Conti | PITCOR: Privacy-assured Time-controlled Revocation in Blockchain Transactions | 2024 6th International Conference on Blockchain Computing and Applications (BCCA) |
24 | 2024 | Tommaso Bianchi, Alessandro Brighente, Mauro Conti | DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles | WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks |
25 | 2024 | Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang | It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors | 33rd USENIX Security Symposium |
26 | 2024 | Kavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran | CANLP: NLP-Based Intrusion Detection System for CAN | SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing |
27 | 2024 | Bruce W. Percílio Azevedo, Luis Alberto Martínez Hernández, Robson de Oliveira Albuquerque, Luis Javier García Villalba | Método para Automatizar Clasificación de Malware PE32 mediante técnicas de Procesamiento de Lenguaje Natural | IX Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) |
28 | 2024 | Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang & Fran Casino | Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection | Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security |
29 | 2024 | Bruce Azevedo, Robson Albuquerque, Luis Villalba and Luis Hernandez | Method for identifying buffer overflow in C code using Natural Language Processing Techniques | RECSI - Spanish meeting on cryptology and information security |
30 | 2024 | Nikolaos Lykousas, Vasileios Argyropoulos, Fran Casino | The potential of LLM-generated reports in DevSecOps | International Conference on AI-empowered Software Engineering – AIESE 2024 |
31 | 2025 | Jesús Martín Abad, David Arroyo Guardeño & Fran Casino | Risks and Challenges Associated with the Chain of Custody of Cryptographic Assets in Law Enforcement Operations | International Congress on Blockchain and Applications |
32 | 2025 | Giacomo Benedetti, Serena Cofano, Alessandro Brighente & Mauro Conti | The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach | International Conference on Applied Cryptography and Network Security |
33 | 2025 | Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, and Radha Poovendran | CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations | International Conference on Applied Cryptography and Network Security |
34 | 2025 | Alessandro Brighente, Mauro Conti, Savio Sciancalepore, Harshul Vaishnav | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures | SAC '25: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing |
35 | 2025 | Menno Bezema, Alessandro Brighente, Mauro Conti, Luca Cosuti | BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying Behavior | SAC '25: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing |
36 | 2025 | Belkacem Imine Rahul Saha Mauro Conti | MICODE: A Minimal Code Design for Secret Sharing Scheme | 22nd International Conference on Security and Cryptography |