Publications

Conferences / Workshops

[ 1 ] C.-M. Yu, G.-K. Ni, I.-Y. Chen, E. Gelenbe and S.-Y. Kuo, “Top-k query result completeness verification in sensor networks”, in Proc. IEEE ICC'13 Workshop on Smart Communication Protocols and Algorithms (SCPA'13), pp 1026 -- 1030, Budapest, Hungary, June 2013.

[ 2 ] L. Delosieres and D. Garcia, "Infrastructure for detecting Android malware", in Proc. 28th Int. Symp. on Computer and Information Sciences (ISCIS’13), volume 264 of Lecture Notes in Electrical Engineering, pages 389-398. Springer, Oct. 2013. (PDF)

[ 3 ] S. Papadopoulos and D. Tzovaras, "Towards Visualizing mobile network data", in Proc. 28th Int. Symp. on Computer and Information Sciences (ISCIS’13), volume 264 of Lecture Notes in Electrical Engineering, pages 379-387. Springer, Oct. 2013. (PDF)

[ 4 ] S. Liebergeld and M. Lange, "Android security, pitfalls, lessons learned and BYOD", in Proc. 28th Int. Symp. on Computer and Information Sciences (ISCIS’13), volume 264 of Lecture Notes in Electrical Engineering, pages 409-417. Springer, Oct. 2013. (PDF)

[ 5 ] S. Liebergeld, L. Matthias and C. Mulliner, "Nomadic Honeypots: A Novel Concept for Smartphone Honeypots", in Proc. W’shop on Mobile Security Technologies (MoST’13), in conjunction with the 34th IEEE Symp. on Security and Privacy, 2013. (PDF)

[ 6 ] E. Gelenbe, G. Gorbil, D. Tzovaras, S. Liebergeld, D. Garcia, M. Baltatu, and G. Lyberopoulos, "Nemesys: Enhanced network security for seamless service provisioning in the smart mobile ecosystem", in Proc. 28th Int. Symp. on Computer and Information Sciences (ISCIS’13), volume 264 of Lecture Notes in Electrical Engineering, pages 369–378. Springer, Oct. 2013.(PDF)

[ 7 ] G. Lyberopoulos, H. Theodoropoulou and K. Filis, "Mobile Network Threat Analysis and MNO Positioning", in Proc. 28th Int. Symp. on Computer and Information Sciences (ISCIS’13), volume 264 of Lecture Notes in Electrical Engineering, pages 419-428. Springer, Oct. 2013. (PDF)

[ 8 ] M. Baltatu, R. D’Alessandro, and R. D’Amico, "NEMESYS: First year project experience in Telecom Italia Information Technology", in Proc. 28th Int. Symp. on Computer and Information Sciences (ISCIS’13), volume 264 of Lecture Notes in Electrical Engineering, pages 399-407. Springer, Oct. 2013. (PDF)

[ 9 ] O. Abdelrahman, E. Gelenbe, G. Gorbil, and B. Oklander, "Mobile network anomaly detection and mitigation: The NEMESYS approach", in Proc. 28th Int. Symp. on Computer and Information Sciences (ISCIS’13), volume 264 of Lecture Notes in Electrical Engineering, pages 429–438. Springer, Oct. 2013. (PDF)

[ 10 ] E. Gelenbe, G. Gorbil, D. Tzovaras, S. Liebergeld, D. Garcia, M. Baltatu, and G. Lyberopoulos, “Security for smart mobile networks: The NEMESYS approach”, in Proc. IEEE Global High Tech Congress on Electronics (GHTCE'13), pp. 63-69, Shenzhen, China, Nov 2013. (PDF)

[ 11 ] S. Liebergeld, M. Lange and R. Borgaonkar, “Cellpot: A Concept for Next Generation Cellular Network Honeypots”, in Proc. NDSS Workshop on Security of Emerging Networking Technologies (SENT’14), pp. 1-6, Internet Society, San Diego, CA, USA, Feb 2014. (PDF)

[ 12 ] D. Defreez , B. Shastry, H. Chen and J-P. Seifert, “A First Look at Firefox OS Security<”, in Proc. Mobile Security Technologies (MoST’14), pp. 1-10, San Jose, CA, USA, May 2014. (PDF)

[ 13 ] O. H. Abdelrahman and E. Gelenbe, “Signalling storms in 3G mobile networks”, in Proc. IEEE International Conference on Communications (ICC'14), Communication and Information Systems Security Symposium, pp. 1017–1022, Sydney, Australia, Jun 2014. (PDF)

[ 14 ] T. Fiebig, J. Danisevskis and M. Piekarska, “A Metric for the Evaluation and Comparison of Keylogger Performance”, in Proc. 7th Workshop on Cyber Security Experimentation and Test (CSET’14), pp. 1-8, San Diego, USA, Aug 2014. (PDF)

[ 15 ] T. Fiebig, J. Krissler and R. Hänsch, “Security Impact of High Resolution Smartphone Cameras”, in Proc. 8th USENIX Workshop on Offensive Technologies (WOOT’14), pp. 1-11, San Diego, USA, Aug 2014. (PDF)

[ 16 ] M. Pavloski and E. Gelenbe, “Signalling attacks in mobile telephony”, in Proc. 11th International Conference on Security and Cryptography (SECRYPT’14), Vienna, Austria, Aug 2014. (PDF)

[ 17 ] G. Gorbil, O. H. Abdelrahman and E. Gelenbe, “Storms in mobile networks”, in Proc. 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet’14), pp. 119-126, Montreal, Canada, Sep 2014. (PDF)

[ 18 ] M. Pavloski and E. Gelenbe, “Mitigating for Signaling Attacks in UMTS Networks”, in Proc. 29th Int. Symp. Computer and Information Sciences (ISCIS’14), Springer, pp. 159-165, Krakow, Poland, Oct 2014.

[ 19 ] S. Papadopoulos, V. Mavroudis, A. Drosou and D. Tzovaras, “Visual Analytics for Enhancing Supervised Attack Attribution in Mobile Networks”, in T. Czachórski, E. Gelenbe and R. Lent (eds.), Information Sciences and Systems 2014 - Proc. 29th International Symposium on Computer and Information Sciences (ISCIS’14), Springer, pp. 193-203, Krakow, Poland, Oct 2014.

[ 20 ] L. Delosieres and A. Sanchez, “DroidCollector: A Honeypot for Collecting and Classifying Android Applications”, in T. Czachórski, E. Gelenbe and R. Lent (eds.), Information Sciences and Systems 2014 - Proc. 29th International Symposium on Computer and Information Sciences (ISCIS’14), Springer, pp. 175-183, Krakow, Poland, Oct 2014.

[ 21 ] J. Danisevskis, M. Peter, J. Nordholz, M. Petschick, and J. Vetter, “Graphical user interface for virtualized mobile handsets”, in Proc. Mobile Security Technologies (MoST’15) Conference , San Jose, CA, 21 May 2015.( PDF, Slides)

[ 22 ] I. Kalamaras, A. Drosou and D. Tzovaras, “A multi-objective clustering approach for the detection of abnormal behaviors in mobile networks”, in Proc. 4th International Workshop on Smart Communication Protocols and Algorithms - IEEE International Conference on Communications (ICC’15 Workshops), London, UK, 8-12 June 2015.

[ 23 ] M. Pavloski, G. Gorbil and E. Gelenbe, “Counter-based detection and mitigation of signaling attacks”, in Proc. 12th International Conference on Security and Cryptography (SECRYPT'15), pages 413-418, Colmar, France, 20-22 July 2015. (PDF)

[ 24 ] F. Francois, O. H. Abdelrahman and E. Gelenbe, “Impact of signalling storms on energy consumption and latency of LTE user equipment”, 7th IEEE International Symposium on Cyberspace safety and security (CSS’15), New York, 24-26 August 2015. PDF)

[ 25 ] Omer H. Abdelrahman, Erol Gelenbe, Gokce Gorbil, and Ricardo Lent, editors., “Information Sciences and Systems 2015 - Proceedings of the 30th International Symposium on Computer and Information Sciences (ISCIS'15)”, volume 363 of Lecture Notes in Electrical Engineering. Springer, September 2015. (PDF)

[ 26 ] M. Pavloski, G. Gorbil and E. Gelenbe, “Bandwidth usage-based detection of signaling attacks”, Information Sciences and Systems 2015 – Proceedings of the 30th International Symposium on Computer and Information Sciences (ISCIS’15), volume 363 of LNEE, pages 105-114. Springer, September 2015. (PDF)

[ 27 ] G. Lyberopoulos, H. Theodoropoulou, K. Filis and I. Mesogiti, “Smart mobile ecosystem security: Existing solutions, MNO requirements and business model”, Information Sciences and Systems 2015 – Proceedings of the 30th International Symposium on Computer and Information Sciences (ISCIS’15), volume 363 of LNEE, pages 137-146. Springer, September 2015. (PDF)

[ 28 ] S. Papadopoulos, A. Drosou and D. Tzovaras, “Fast Frequent Episode Mining based on Finite-State Machines”, Information Sciences and Systems 2015 – Proceedings of the 30th International Symposium on Computer and Information Sciences (ISCIS’15), volume 363 of LNEE, pages 199-208. Springer, September 2015. (PDF)

[ 29 ] S. Papadopoulos, A. Drosou, N. Dimitriou, O. H. Abdelrahman, G. Gorbil and D. Tzovaras, “A BRPCA based approach for anomaly detection in mobile networks”, Information Sciences and Systems 2015 – Proceedings of the 30th International Symposium on Computer and Information Sciences (ISCIS’15), volume 363 of LNEE, pages 115-124. Springer, September 2015. (PDF)

[ 30 ] F. Francois, O. H. Abdelrahman, and E. Gelenbe, “Towards assessment of energy consumption and latency of LTE UEs during signaling storms”. Information Sciences and Systems 2015 – Proceedings of the 30th International Symposium on Computer and Information Sciences (ISCIS’15), volume 363 of LNEE, pages 45-55. Springer, September 2015. (PDF)

[ 31 ] I. Kalamaras, S. Papadopoulos, A. Drosou, D. Tzovaras, MoVA: A visual analytics tool providing insight in the big mobile network data”, 11th International Conference on Artificial Intelligence Applications and Innovations (AIAI'15), Bayonne/Biarritz, France, September 2015.

[ 32 ] E. Gelenbe and O.H. Abdelrahman, “Countering mobile signaling storms with counters”. In Proceedings of EAI International Conference on CYber physiCaL systems, iOt and sensors Networks (Cyclone’15), Rome, Italy, October 2015. (PDF)

[ 33 ] O.H. Abdelrahman and E. Gelenbe, “A data plane approach for detecting control plane anomalies in mobile networks”. In Proceedings of EAI International Conference on CYber physiCaL systems, iOt and sensors Networks (Cyclone’15), Rome, Italy, October 2015. (PDF)

[ 34 ] F. Francois, O.H. Abdelrahman and E. Gelenbe, “Feasibility of signaling storms in 3G/UMTS operational networks”. In Proceedings of EAI International Conference on CYber physiCaL systems, iOt and sensors Networks (Cyclone’15), Rome, Italy, October 2015. (PDF)

[ 35 ] E. Gelenbe, O. H. Abdelrahman and G. Gorbil, “Detection and mitigation of signaling storms in mobile networks”, International Conference on Computing, Networking and Communications (ICNC’16) – Communications and Information Security & Wireless Communications Symposium, Kauai, USA, Feb 2016.

Journal Articles

[ 1 ] E. Gelenbe and O. H. Abdelrahman, “Search in the universe of big networks and data”, in IEEE Network Magazine 28(4): 20-25, Jul 2014. (PDF)

[ 2 ] E. Gelenbe, “One step ahead in internet security”, EU Research, Volume 2015, issue 1, pages 70-71. (PDF)

[ 3 ] G. Gorbil, O. H. Abdelrahman, M. Pavloski and E. Gelenbe, “Modeling and analysis of RRC-based signaling storms in 3G networks”, IEEE Transactions on Emerging Topics in Computing, Special Issue on Emerging Topics in Cybersecurity, Jan 2015.

[ 4 ] K. Filis, “Research project NEMESYS - Protecting devices and mobile networks from malicious attacks with the support of COSMOTE”, IT Security Professional, issue 41, pages 36-37, in Greek.

[ 5 ] S. Papadopoulos, K. Moustakas, A. Drosou and D. Tzovaras, “BGPGraph: Detecting and visualizing Internet routing anomalies”, in IET Information Security (accepted).

[ 6 ] O.H. Abdelrahman, "Detecting network-unfriendly mobiles with the random neural network", to appear in Probability in the Engineering and Informational Sciences, Cambridge University Press.

[ 7 ] S.Papadopoulos, A.Drosou, D.Tzovaras, “A Hierarchical Magnification Approach for enhancing the Insight in Image and Volume Visualizations”, IEEE Transactions on Visualization and Computer Graphics (accepted with revisions).

[ 8 ] S. Papadopoulos, A. Drosou and D. Tzovaras, “Novel Graph-based Descriptor for the Detection of Billing-related Anomalies in Cellular Mobile Networks”, IEEE Transactions on Mobile Computing (submitted).

[ 9 ] I. Kalamaras, A. Drosou and D. Tzovaras, “A Consistency-based multimodal graph embedding method for dimensionality reduction”, IEEE Transactions on Multimedia (submitted).

[ 10 ] E. Gelenbe and O. H. Abdelrahman, “Time-outs and counters against storms”, IEEE Transactions on Mobile Computing (submitted). (PDF)

Last Update: 06/01/2016 21:20