Skip to main content

Research Repository

Advanced Search

All Outputs (65)

Till All Are One: Towards a Unified Cloud IDS (2015)
Presentation / Conference Contribution
Pitropakis, N., Lambrinoudakis, C., & Geneiatakis, D. (2015). Till All Are One: Towards a Unified Cloud IDS. In S. Fischer-Hübner, C. Lambrinoudakis, & J. López (Eds.), Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science (

Recently there is a trend to use cloud computing on service deployment, enjoying various advantages that it offers with emphasis on the economy which is achieved in the era of the financial crisis. However, along with the transformation of technology... Read More about Till All Are One: Towards a Unified Cloud IDS.

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments (2014)
Journal Article
Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014). If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. Journal of cloud computing: advances, systems and applic

Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in the era of an economic crisis. In addition to this revolution, several secur... Read More about If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments.

Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments (2014)
Journal Article
Pitropakis, N., Pikrakis, A., & Lambrinoudakis, C. (2015). Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments. International Journal of Information Security, 14(4), 299-305. https://doi.org/10.1007/s10207-014-02

Cloud computing is gradually becoming the most popular option of Information Technology infrastructures. However, an important issue that has emerged through that revolution is the preservation of an adequate level of security for the infrastructure... Read More about Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments.

It's All in the Cloud: Reviewing Cloud Security (2014)
Presentation / Conference Contribution
Pitropakis, N., Darra, E., Vrakas, N., & Lambrinoudakis, C. (2014). It's All in the Cloud: Reviewing Cloud Security. In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Auton

Cloud computing is gradually replacing traditional IT infrastructures. However, an important issue that has emerged through that revolution is the preservation of an adequate level of security for the infrastructure. Currently there are many research... Read More about It's All in the Cloud: Reviewing Cloud Security.

A Practical Steganographic Approach for Matroska Based High Quality Video Files (2013)
Presentation / Conference Contribution
Pitropakis, N., Lambrinoudakis, C., Geneiatakis, D., & Gritzalis, D. (2013). A Practical Steganographic Approach for Matroska Based High Quality Video Files. In 2013 27th International Conference on Advanced Information Networking and Applications Worksh

Several steganographic algorithms have been proposed for protecting message secrecy against unauthorized "reads". The most used method for hiding a message relies on embedding the secret message in Least Significant Bit (LSB) on the cover object. Tho... Read More about A Practical Steganographic Approach for Matroska Based High Quality Video Files.