@article{on-the-fly-tdsc20,
author={George Theodorakopoulos and Emmanouil Panaousis and Kaitai Liang and George Loukas},
journal={IEEE Transactions on Dependable and Secure Computing},
title={On-the-fly Privacy for Location Histograms},
year={2020},
}
@article{location-kais19,
title={Location histogram privacy by Sensitive Location Hiding and Target Histogram Avoidance/Resemblance},
author={Loukides, Grigorios and Theodorakopoulos, George},
journal={Knowledge and Information Systems},
year = {2020},
volume = {62},
number = {7},
pages = {2613--2651},
month = {July},
publisher={Springer}
}
@inproceedings{secure-cn4iot18,
author = {Anthi, Eirini and Javed, Amir and Rana, Omer and Theodorakopoulos, George},
title = {Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems},
booktitle = {Cloud Infrastructures, Services, and IoT Systems for Smart Cities},
year = {2018},
}
@inproceedings{open-percom17,
author = {M. Katsomallos and S. Lalis and T. Papaioannou and G. Theodorakopoulos},
title = {An open framework for flexible plug-in privacy mechanisms in crowdsensing applications},
booktitle = {2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)},
year = {2017},
month = {March},
}
@article{behavioural-fi17b,
author = {Stylianos S. Mamais and George Theodorakopoulos},
title = {Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems},
journal = {Future Internet, Special Issue "Security and Privacy in Wireless and Mobile Networks},
year = {2017},
volume = {9},
number = {4},
month = {November},
articleno = {88},
}
@article{private-fi17a,
author = {Stylianos S. Mamais and George Theodorakopoulos},
title = {Private and Secure Distribution of Targeted Advertisements to Mobile Phones},
journal = {Future Internet, Special Issue "Security and Privacy in Wireless and Mobile Networks},
year = {2017},
volume = {9},
number = {2},
month = {May},
articleno = {16},
}
@article{privacy-tops16,
author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso},
title = {Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy},
journal = {ACM Transactions on Privacy and Security (TOPS)},
year = {2016},
volume = {19},
number = {4},
month = {December},
articleno = {11},
}
@inproceedings{inference-eurosp16,
author = {Galini Tsoukaneri and George Theodorakopoulos and Hugh Leather and Mahesh K. Marina},
title = {On the Inference of User Paths from Anonymized Mobility Data},
booktitle = {IEEE European Symposium on Security and Privacy (EuroSP)},
year = {2016},
month = {March},
}
@inproceedings{same-origin-wpes15,
author = {George Theodorakopoulos},
title = {The Same-Origin Attack against Location Privacy},
booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES)},
year = {2015},
month = {October},
}
@article{broker-ijcc14,
author = {Petri, Ioan and Punceva, Magdalena and Rana, Omer and Theodorakopoulos, George and Rezgui, Yacine},
title = {A broker based consumption mechanism for social clouds},
journal = {International Journal of Cloud Computing},
year = {2014},
volume = {2},
number = {1},
pages = {45--57},
}
@inproceedings{cognitive-sasow14,
author = {F. Bagnoli and A. Guazzini and G. Pacini and I. Stavrakakis and E. Kokolaki and G. Theodorakopoulos},
title = {Cognitive Structure of Collective Awareness Platforms},
booktitle = {IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops},
year = {2014},
month = {September},
}
@inproceedings{prolonging-wpes14,
author = {George Theodorakopoulos and Reza Shokri and Carmela Troncoso and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
title = {Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services},
booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES)},
year = {2014},
month = {November},
}
@article{hiding-tdsc14,
author = {Reza Shokri and George Theodorakopoulos and Panos Papadimitratos and Ehsan Kazemi and Jean-Pierre Hubaux},
title = {Hiding in the Mobile Crowd: Location Privacy through Collaboration},
journal = {IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue "Security and Privacy in Mobile Platforms},
year = {2014},
volume = {11},
number = {3},
pages = {266--279},
month = {May},
}
@inproceedings{broker-cloud13,
author = {Ioan Petri and Magdalena Punceva and Omer F. Rana and George Theodorakopoulos},
title = {Broker Emergence in Social Clouds},
booktitle = {IEEE International Conference on Cloud Computing (CLOUD)},
year = {2013},
month = {June},
}
@article{selfish-tac13,
author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
title = {Selfish Response to Epidemic Propagation},
journal = {IEEE Transactions on Automatic Control (TAC)},
year = {2013},
volume = {58},
number = {2},
pages = {363--376},
month = {February},
}
@inproceedings{protecting-ccs12,
author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
title = {Protecting Location Privacy: Optimal Strategy against Localization Attacks},
booktitle = {ACM Conference on Computer and Communications Security (CCS)},
year = {2012},
month = {October},
}
@inproceedings{traps-infocom12,
author = {Nikodin Ristanovic and George Theodorakopoulos and Jean-Yves Le Boudec},
title = {Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks},
booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
year = {2012},
month = {March},
}
@inproceedings{collaborative-mass11,
author = {Reza Shokri and Panagiotis Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux},
title = {Collaborative Location Privacy},
booktitle = {IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)},
year = {2011},
month = {October},
}
@inproceedings{quantifying-pets11,
author = {Reza Shokri and George Theodorakopoulos and George Danezis and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
title = {Quantifying Location Privacy: The Case of Sporadic Location Exposure},
booktitle = {Privacy Enhancing Technologies Symposium (PETS)},
year = {2011},
month = {July},
}
@inproceedings{selfish-acc11,
author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
title = {Selfish Response to Epidemic Propagation},
booktitle = {American Control Conference (ACC)},
year = {2011},
month = {June},
}
@inproceedings{quantifying-sp11,
author = {Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux},
title = {Quantifying Location Privacy},
booktitle = {IEEE Symposium on Security and Privacy (SP)},
year = {2011},
month = {May},
}
@inproceedings{adaptive-wons11,
author = {Nikodin Ristanovic and Panagiotis Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
title = {Adaptive Message Authentication for Multi-Hop Networks},
booktitle = {International Conference on Wireless On-demand Network Systems and Services (WONS)},
year = {2011},
month = {January},
}
@book{path-problems-synthesis10,
author = {John S. Baras and George Theodorakopoulos},
title = {Path problems in networks},
publisher = {Morgan \& Claypool Publishers},
year = {2010},
series = {Synthesis Lectures on Communication Networks},
}
@inproceedings{preserving-recsys09,
author = {Reza Shokri and Pedram Pedarsani and George Theodorakopoulos and Jean-Pierre Hubaux},
title = {Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles},
booktitle = {ACM Conference on Recommender Systems (RecSys)},
year = {2009},
month = {October},
}
@inproceedings{adaptive-vanet09,
author = {Nikodin Ristanovic and Panos Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
title = {Adaptive Message Authentication for Vehicular Networks},
booktitle = {ACM International Workshop on VehiculAr Inter-NETworking (VANET)},
year = {2009},
month = {September},
}
@inproceedings{gtjylbjb-allerton08,
author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
title = {Dynamic network security deployment under partial information},
booktitle = {Annual Allerton Conference On Communication, Control, and Computing (ALLERTON)},
year = {2008},
month = {September},
}
@article{gtjb-jsac08,
author = {George Theodorakopoulos and John S. Baras},
title = {Game Theoretic Modeling of Malicious Users in Collaborative Networks},
journal = {IEEE Journal on Selected Areas in Communications (JSAC)},
year = {2008},
volume = {26},
number = {7},
pages = {1317--1327},
month = {September},
}
@inproceedings{jbsrgtetal-milcom07,
author = {John S. Baras and Svetlana Radosavac and George Theodorakopoulos and Dan Sterne and Peter Budulas and Richard Gopaul},
title = {Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR},
booktitle = {Military Communications Conference (MILCOM)},
year = {2007},
month = {October},
}
@inproceedings{gtjb-infocom07,
author = {George Theodorakopoulos and John S. Baras},
title = {Malicious Users in Unstructured Networks},
booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
year = {2007},
month = {May},
}
@phdthesis{gt-phd-trust,
author = {George Theodorakopoulos},
title = {Robust network trust establishment for collaborative applications and protocols},
school = {University of Maryland},
year = {2007},
address = {College Park, MD, USA},
month = {May},
type = {PhD Dissertation},
url = {http://hdl.handle.net/1903/6967},
}
@inproceedings{gtjb-globecom06,
author = {George Theodorakopoulos and John S. Baras},
title = {A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users},
booktitle = {IEEE Global Communications Conference (GLOBECOM)},
year = {2006},
month = {November},
}
@inproceedings{tjgtjb-asc06b,
author = {Tao Jiang and George Theodorakopoulos and John S. Baras},
title = {Coalition Formation in MANETs},
booktitle = {Army Science Conference},
year = {2006},
month = {November},
}
@inproceedings{gtjb-asc06a,
author = {George Theodorakopoulos and John S. Baras},
title = {A Testbed for Comparing Trust Computation Algorithms},
booktitle = {Army Science Conference},
year = {2006},
month = {November},
}
@inproceedings{gtjb-securecomm06,
author = {George Theodorakopoulos and John S. Baras},
title = {Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks},
booktitle = {International Conference on Security and Privacy in Communication Networks (SecureComm)},
year = {2006},
month = {August},
}
@inproceedings{gtjb-mtns06,
author = {George Theodorakopoulos and John S. Baras},
title = {Linear Iterations on Ordered Semirings for Trust Metric Computation and Attack Resiliency Evaluation},
booktitle = {International Symposium on Mathematical Theory of Networks and Systems (MTNS)},
year = {2006},
month = {July},
}
@inproceedings{jbtjgt-ist06,
author = {John S. Baras and Tao Jiang and George Theodorakopoulos},
title = {Distributed Trust Management in Wireless Autonomic Networks},
booktitle = {IST Mobile and Wireless Communications Summit},
year = {2006},
month = {June},
}
@article{gtjb-jsac06,
author = {George Theodorakopoulos and John S. Baras},
title = {On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks},
journal = {IEEE Journal on Selected Areas in Communications (JSAC)},
year = {2006},
volume = {24},
number = {2},
pages = {318--328},
month = {February},
}
@inproceedings{gtjb-wise04,
author = {George Theodorakopoulos and John S. Baras},
title = {Trust evaluation in ad-hoc networks},
booktitle = {ACM Workshop on Wireless security (WiSe)},
year = {2004},
month = {October},
}
@mastersthesis{gt-msc-trust,
author = {George Theodorakopoulos},
title = {Distributed Trust Evaluation in Ad-Hoc Networks},
school = {University of Maryland},
year = {2004},
address = {College Park, MD, USA},
month = {May},
type = {MSc Thesis},
url = {http://hdl.handle.net/1903/1524},
}
@mastersthesis{gt-diploma-mdrr,
author = {George Theodorakopoulos},
title = {Providing QoS in IP networks with the MDRR scheduling algorithm},
school = {National Technical University of Athens},
year = {2002},
address = {Greece},
month = {July},
type = {Diploma Thesis},
}