Theodore Apostolopoulos
Theodore Apostolopoulos
Professor, Dept. of Informatics, Athens University of Economics & Business, Greece
Потвърден имейл адрес: aueb.gr
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
N Virvilis, D Gritzalis, T Apostolopoulos
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
An open financial services architecture based on the use of intelligent mobile devices
A Kousaridas, G Parissis, T Apostolopoulos
Electronic Commerce Research and Applications 7 (2), 232-246, 2008
Information technology investment evaluation: Investments in telecommunication infrastructure
TK Apostolopoulos, KC Pramataris
International Journal of Information Management 17 (4), 287-296, 1997
The Compact Linear Collider (CLIC)-2018 Summary Report
T CLIC, TK Charles, PJ Giansiracusa, TG Lucas, RP Rassool, M Volpi, ...
arXiv preprint arXiv:1812.06018, 2018
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
International Conference on Trust, Privacy and Security in Digital Business …, 2013
Queueing analysis of buffered CSMA/CD protocols
T Apostolopoulos, E Protonotarios
IEEE Transactions On Communications 34 (9), 898-905, 1986
A cyber attack evaluation methodology
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014
Parallel computation for streamflow prediction with distributed hydrologic models
TK Apostolopoulos, KP Georgakakos
Journal of Hydrology 197 (1-4), 1-24, 1997
The compact linear collider (CLIC)-2018 summary report
PN Burrows, NC Lasheras, L Linssen, M Petrič, A Robson, D Schulte, ...
CERN Yellow Rep. Monogr. 2, 2018
Browser blacklists: the Utopia of phishing protection
N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis
International Conference on E-Business and Telecommunications, 278-293, 2014
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos
Computers & Security 74, 371-383, 2018
Queueing analysis of buffered slotted multiple access protocols
TK Apostolopoulos, EN Protonotarios
computer communications 8 (1), 9-21, 1985
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Information & Computer Security, 2016
An e-learning service management architecture
TK Apostolopoulos, A Kefala
Proceedings 3rd IEEE International Conference on Advanced Technologies, 140-144, 2003
Temporal network management model: Concepts and implementation issues
TK Apostolopoulos, VC Daskalou
Computer Communications 20 (8), 694-708, 1997
Cyber-Attacks Evaluation Using Simple Additive Weighting Method on the Basis of Schmitt's Analysis.
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, TK Apostolopoulos
MCIS, 41, 2016
The inverse scattering problem for a rigid ellipsoid in linear elasticity
T Apostolopoulos, K Kiriaki, D Polyzos
Inverse problems 6 (1), 1, 1990
Analysis of a New Retransmission Control Algorithm for Slotted CSMA/CD LAN's
TK Apostolopoulos, ED Sykas, EN Protonotarios
IEEE transactions on computers 36 (06), 692-701, 1987
DHTbd: A reliable block-based storage system for high performance clusters
G Parisis, G Xylomenos, T Apostolopoulos
2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2011
A taxonomy of side channel attacks on critical infrastructures and relevant systems
N Tsalis, E Vasilellis, D Mentzelioti, T Apostolopoulos
Critical Infrastructure Security and Resilience, 283-313, 2019
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20