SCIENTIFIC PUBLICATIONS


JOURNAL

Authors Title Venue
A Zacharis, C Patsakis AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition International Journal of Information Security
A. Hernandez-Suarez, G. Sanchez-Perez, L. K. Toscano-Medina, H. Perez-Meana, J. Olivares-Mercado, J. Portillo-Portillo,Gibran Benitez-Garcia,A. L. Sandoval Orozco and L. J. García Villalba ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning Sensors (MDPI)
E. Almaraz Luengo, B. Alaña Olivares, Luis Javier García Villalba
and J. Hernandez-Castro
Further Analysis of the Statistical Independence of the NIST SP 800-22 Randomness Tests Applied Mathematics and Computation (Elsevier)
A. G. Silva-Trujillo, M. González González, L. Rocha Pérez and L. J. García Villalba Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack Sensors (MDPI)
Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis  Hello me, meet the real me: Voice synthesis attacks on voice assistants Computers & Security
Constantinos Patsakis & Nikolaos Lykousas  Man vs the machine in the struggle for effective text anonymisation in the age of large language models Nature Scientific Reports
Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis  The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign Computers & Security
Alexandros Zacharis, Vasilios Katos, and Constantinos Patsakis Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle International Journal of Information Security
Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, and Yves LeTraon Active Code Learning: Benchmarking Sample-Efficient Training of Code Models IEEE Transactions on Software Engineering
Ying Yuan, Giovanni Apruzzese, Mauro Conti Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning Digital Threats: Research and Practice
P.L.S. Jayalaxmi , Rahul Saha , Gulshan Kumar, Mamoun Alazabc , Mauro Conti , Xiaochun Cheng PIGNUS: A Deep Learning model for IDS in industrial internet-of-things Computers & Security
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Robson de Oliveira Albuquerque, Gabriela Mayumi Saiki, Sara Santedicola Ribeiro, Ana Lucila Sandoval Orozco, Luis Javier García Villalba Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications Results in Engineering
Pablo López-Aguilar, Edgar Batista,Antoni Martínez-Ballesté, and Agusti Solanas Information Security and Privacy in Railway Transportation: A Systematic Review Sensors (MDPI)
Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas BENIGREEN: Blockchain-based Energy-Efficient Privacy-Preserving Scheme for Green IoTs IEEE IoT
Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, Edna Dias Canedo, Fábio Lúcio Lopes de Mendonça, Robson de Oliveira Albuquerque, Ana Lucila Sa Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review Sensors (MDPI)
Qiang Hu; Yuejun Guo; Xiaofei Xie; Maxime Cordy; Lei Ma; Mike Papadakis; Yves Le Traon Active Code Learning: Benchmarking Sample-Efficient Training of Code Models IEEE Transactions on Software Engineering
Qiang Hu; Yuejun Guo; Xiaofei Xie; Maxime Cordy; Lei Ma; Mike Papadakis; Yves Le Traon Test Optimization in DNN Testing: A Survey ACM Transactions on Software Engineering and Methodology
Yuejun Guo, Seifeddine Bettaieb, and Fran Casino A Comprehensive Analysis on Software Vulnerability Detection Datasets: Trends, Challenges, and Road Ahead International Journal of Information Security
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas Assessing LLMs in malicious code deobfuscation of real-world malware campaigns Expert Systems with Applications
Alexandros Zacharis, Vasilios Katos & Constantinos Patsakis Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle International Journal of Information Security
Ying Yuan, Giovanni Apruzzese, Mauro Conti Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning Digital Threats: Research and Practice
Vouvoutsis, V., Casino, F., & Patsakis, C. Beyond the sandbox: Leveraging symbolic execution for evasive malware classification COSE
Fran Casino, Peio Lopez-Iturri, Constantinos Patsakis Cloud continuum testbeds and next-generation ICTs: Trends, challenges, and perspectives Computer Science Review
Ariadna ClaudiaMoreno, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier García Villalba Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems Sensors (MDPI)

CONFERENCES

Authors Title Venue
A. Zacharis, R. Gavrila, C. Patsakis, D. Ikonomou AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict CyCon 2023
C. Karapapas, G. C. Polyzos and C. Patsakis What’s inside a node? Malicious IPFS nodes under the magnifying glass 38TH INTERNATIONAL CONFERENCE ON ICT SYSTEMS SECURITY AND PRIVACY PROTECTION IFIP SEC 2023
P. López-Aguilar, C. Patsakis, A. Solanas The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review eCrime2022
C.Patsakis, N. Lykousas Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices IEEE Euro S&P
A. Zacharis, R. Gavrila, C. Patsakis AiCEF: An AI-powered Cyber Exercise Content Generation Framework BlackHat Asia 2023
Y. Guo, Q. Hu, Q. Tang, Y. L. Traon An Empirical Study of the Imbalance Issue in Software Vulnerability Detection ESORICS 2023
Y. Guo, S. Bettaieb An Investigation of Quality Issues in Vulnerability Detection Datasets IEEE Euro S&P
A. Lotto, V. Singh, B. Ramasubramanian, A. Brighente, M. Conti, R. Poovendran BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)
T. Bianchi, S. Asokraj, A. Brighente, M. Conti, R. Poovendran QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer 2023 IEEE 97th Vehicular Technology Conference: (VTC2023)-Spring
Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon MUTEN: Muten-Based Ensembles for Boosting Gradient-Based Adversarial Attack 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023)
Nikolaos Lykousas; Vasilios Koutsokostas; Fran Casino; Constantinos Patsakis The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE)
Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang, and Fran Casino Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection 29th European Symposium on Research in Computer Security (ESORICS), Bydgoszcz, Poland September 16-20, 2024
Wanpeng Li, Yuejun Guo Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models ACM SIGSAC Conference on Computer and Communications Security (CCS '24)
Bruce Azevedo, Robson Albuquerque, Luis Villalba and Luis Hernandez Method to automate PE32 malware classification using Word2vec and LSTM JNIC - IX National Conference on Cybersecurity Research
Nikolaos Lykousas, Vasileios Argyropoulos, Fran Casino The potential of LLM-generated reports in DevSecOps International Conference on AI-empowered Software Engineering – AIESE 2024, Formerly Joint Conference on Knowledge-based Software Engineering – JCKBSE
27 – 30 August 2024 Piraeus, Greece
Bruce Azevedo, Robson Albuquerque, Luis Villalba and Luis Hernandez Method for identifying buffer overflow in C code using Natural Language Processing Techniques RECSI - Spanish meeting on cryptology and information security
Rahul Saha, Mauro Conti, Archana Chhabra PITCOR: Privacy-assured Time-controlled Revocation in Blockchain Transactions BCCA 2024
Gulshan Kumar, Mauro Conti, Tannishtha Devgun FASALKA: Offloaded Privacy Classification for Blockchain Smart Contracts BCCA 2024