@article{privacy-tops16,
 author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso},
 title = {Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy},
 journal = {ACM Transactions on Privacy and Security (TOPS)},
 volume = {19},
 number = {4},
 month = {December},
 year = {2016},
 issn = {2471-2566},
 pages = {11:1--11:31},
 doi = {http://doi.acm.org/10.1145/3009908},
}
@inproceedings{inference-eurosp16,
  author = {Galini Tsoukaneri and George Theodorakopoulos and Hugh Leather and Mahesh K. Marina},
  title = {On the inference of user paths from anonymized mobility data },
  booktitle = {1st IEEE European Symposium on Security and Privacy (EuroSP 2016)},
  year = {2016},
  address = {Saarbruecken, Germany},
  month = {March},
}
@inproceedings{same-origin-wpes15,
  author = {George Theodorakopoulos},
  title = {The Same-Origin Attack against Location Privacy},
  booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES 2015)},
  year = {2015},
  address = {Denver, CO, USA},
  month = {October},
}
@inproceedings{prolonging-wpes14,
  author = {George Theodorakopoulos and Reza Shokri and Carmela Troncoso and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
  title = {Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services},
  booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES 2014)},
  year = {2014},
  address = {Scottsdale, AZ, USA},
  month = {November},
}
@article{hiding-tdsc14,
  author = {Reza Shokri and George Theodorakopoulos and Panos Papadimitratos and Ehsan Kazemi and Jean-Pierre Hubaux},
  title = {Hiding in the Mobile Crowd: Location Privacy through Collaboration},
  journal ={IEEE Transactions on Dependable and Secure Computing},
  volume = {11},
  number = {3},
  year = {2014},
  month = {May},
  pages = {266--279},
  doi = {http://doi.ieeecomputersociety.org/10.1109/TDSC.2013.57},
}
@inproceedings{broker-cloud13,
  author    = {Ioan Petri and
               Magdalena Punceva and
               Omer F. Rana and
               George Theodorakopoulos},
  title     = {Broker Emergence in Social Clouds},
  booktitle = {IEEE CLOUD},
  year      = {2013},
  pages     = {669--676},
  doi       = {http://dx.doi.org/10.1109/CLOUD.2013.38},
}
@article{selfish-tac13,
  author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
  journal = {IEEE Transactions on Automatic Control},
  pages = {363--376},
  title = {Selfish Response to Epidemic Propagation},
  volume = {58},
  number = {2},
  month = {February},
  year = 2013
}
@inproceedings{protecting-ccs12,
  author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
  title = {Protecting Location Privacy: Optimal Strategy against Localization Attacks},
  booktitle = {19th ACM Conference on Computer and Communications Security (ACM CCS 2012)},
  year = {2012},
  address = {Raleigh, NC, USA},
  month = {October},
}
@inproceedings{traps-infocom12,
  author = {Nikodin Ristanovic and George Theodorakopoulos and Jean-Yves Le Boudec},
  title = {Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks},
  booktitle = {31st IEEE International Conference on Computer Communications (IEEE INFOCOM 2012)},
  year = 2012,
  address = {Orlando, FL, USA},
  month = {March}
}
@inproceedings{collaborative-mass11,
  author = {Reza Shokri and Panagiotis Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux},
  booktitle = {8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2011)},
  keywords = {Location Privacy, Mobile Networks},
  location = {Valencia, Spain},
  title = {Collaborative Location Privacy},
  year = 2011,
  month = {October}
}
@conference{twitter-demo-mass11,
  author = {Nikodin Ristanovic and George Theodorakopoulos and Augustin Chaintreau and Jean-Yves Le Boudec},
  title = {Connecting Opportunistic Users to the {Internet}: Twitter in the Air},
  booktitle = {8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2011)},
  year = 2011,
  address = {Valencia, Spain},
  month = {October},
  note = {Demo}
}
@inproceedings{quantifying-pets11,
  author = {Reza Shokri and George Theodorakopoulos and George Danezis and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
  booktitle = {The 11th Privacy Enhancing Technologies Symposium (PETS 2011)},
  address = {Waterloo, Canada},
  title = {Quantifying Location Privacy: The Case of Sporadic Location Exposure},
  year = 2011,
  month = {July}
}
@inproceedings{selfish-acc11,
  author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
  booktitle = {2011 American Control Conference (ACC 2011)},
  keywords = {epidemic, worm, differential inclusions, security, mobile network},
  address = {San Francisco, CA, USA},
  note = {Invited Paper},
  title = {Selfish Response to Epidemic Propagation},
  year = 2011,
  month = {June}
}
@inproceedings{quantifying-sp11,
  author = {Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux},
  booktitle = {IEEE Symposium on Security and Privacy (SP 2011)},
  title = {Quantifying Location Privacy},
  address = {Oakland, CA, USA},
  year = 2011,
  month = {May},
  pages = {247--262}
}
@inproceedings{adaptive-wons11,
  author = {Nikodin Ristanovic and Panagiotis Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
  booktitle = {The 8th International Conference on Wireless On-demand Network Systems and Services (WONS 2011)},
  location = {Bardonecchia, Italy},
  title = {Adaptive Message Authentication for Multi-Hop Networks},
  year = 2011,
  month = {January}
}
@book{path-problems-synthesis10,
  author = {John S. Baras and George Theodorakopoulos},
  title = {Path problems in networks},
  publisher = {Morgan \& Claypool Publishers},
  year = 2010,
  series = {Synthesis Lectures on Communication Networks}
}
@inproceedings{preserving-recsys09,
  affiliation = {EPFL},
  author = {Reza Shokri and Pedram Pedarsani and George Theodorakopoulos and Jean-Pierre Hubaux},
  booktitle = {The 3rd ACM Conference on Recommender Systems (RecSys 2009)},
  keywords = {Recommender Systems; Privacy Protection;
                 Privacy-Accuracy Tradeoff; NCCR-MICS; NCCR-MICS/CL3},
  address = {New York, NY, USA},
  title = {Preserving Privacy in Collaborative Filtering
                 through Distributed Aggregation of Offline
                 Profiles},
  year = 2009,
  month = {October}
}
@inproceedings{adaptive-vanet09,
  address = {Beijing, China},
  author = {Nikodin Ristanovic and Panos Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
  booktitle = {Proceedings of the the Sixth ACM International Workshop on VehiculAr Inter-NETworking (VANET 2009)},
  location = {Beijing, China},
  title = {Adaptive Message Authentication for Vehicular Networks},
  year = 2009,
  month = {September}
}
@inproceedings{gtjylbjb-allerton08,
  author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
  booktitle = {Proceedings of the Forty-Sixth Annual Allerton Conference On Communication, Control, and Computing (ALLERTON 2008)},
  keywords = {game theory; network security; learning},
  address = {Allerton Retreat Center, Monticello, IL, USA},
  note = {Invited Paper},
  title = {Dynamic network security deployment under partial information},
  year = 2008,
  month = {September}
}
@article{gtjb-jsac08,
  author = {George Theodorakopoulos and John S. Baras},
  issn = {0733-8716},
  journal = {IEEE Journal on Selected Areas in Communications (IEEE JSAC)},
  keywords = {collaborative networks; incomplete information; repeated games; security},
  number = {7},
  pages = {1317 -- 1327},
  title = {Game Theoretic Modeling of Malicious Users in Collaborative Networks},
  volume = {26},
  year = 2008
}
@inproceedings{jbsrgtetal-milcom07,
  author = {John S. Baras and Svetlana Radosavac and George Theodorakopoulos and Dan Sterne and Peter Budulas and Richard Gopaul},
  booktitle = {Proceedings of the 2007 Military Communications Conference (MILCOM 2007)},
  keywords = {ad hoc networks; security; intrusion detection; game theory; byzantine attack},
  address = {Orlando, FL, USA},
  title = {Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in {OLSR}},
  year = 2007,
  month = {October}
}
@inproceedings{gtjb-infocom07,
  author = {George Theodorakopoulos and John S. Baras},
  booktitle = {26th IEEE International Conference on Computer Communications (IEEE INFOCOM 2007)},
  title = {Malicious Users in Unstructured Networks},
  year = 2007,
  month = {May},
  pages = {884--891},
  address = {Anchorage, AK, USA}
}
@inproceedings{gtjb-globecom06,
  author = {George Theodorakopoulos and John S. Baras},
  title = {A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users},
  booktitle = {IEEE Global Communications Conference (IEEE GLOBECOM 2006)},
  month = {November},
  year = 2006,
  address = {San Francisco, CA}
}
@inproceedings{tjgtjb-asc06b,
  author = {Tao Jiang and George Theodorakopoulos and John S. Baras},
  title = {Coalition Formation in {MANET}s},
  booktitle = {25th Army Science Conference},
  month = {November},
  year = 2006,
  address = {Orlando, FL}
}
@inproceedings{gtjb-asc06a,
  author = {George Theodorakopoulos and John S. Baras},
  title = {A Testbed for Comparing Trust Computation Algorithms},
  booktitle = {25th Army Science Conference},
  month = {November},
  year = 2006,
  address = {Orlando, FL}
}
@inproceedings{gtjb-securecomm06,
  author = {George Theodorakopoulos and John S. Baras},
  title = {Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks},
  booktitle = {Second International Conference on Security and Privacy in Communication Networks (SecureComm 2006)},
  month = {August},
  year = 2006,
  address = {Baltimore, MD}
}
@inproceedings{gtjb-mtns06,
  author = {George Theodorakopoulos and John S. Baras},
  title = {Linear Iterations on Ordered Semirings for Trust Metric Computation and
 Attack Resiliency Evaluation},
  booktitle = {17th International Symposium on Mathematical Theory of Networks and
 Systems (MTNS 2006)},
  pages = {509--514},
  month = {July},
  year = 2006,
  address = {Kyoto, Japan}
}
@inproceedings{jbtjgt-ist06,
  author = {John S. Baras and Tao Jiang and George Theodorakopoulos},
  title = {Distributed Trust Management in Wireless Autonomic Networks},
  booktitle = {15th IST Mobile and Wireless Communications Summit},
  year = 2006,
  address = {Myconos, Greece},
  month = {June}
}
@article{gtjb-jsac06,
  author = {George Theodorakopoulos and John S. Baras},
  title = {On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks},
  journal = {IEEE Journal on Selected Areas in Communications (IEEE JSAC)},
  volume = {24},
  number = {2},
  pages = {318--328},
  month = {February},
  year = 2006
}
@inproceedings{gtjb-wise04,
  author = {George Theodorakopoulos and John S. Baras},
  title = {Trust evaluation in ad-hoc networks},
  booktitle = {Proceedings of the 2004 ACM workshop on Wireless security, (WiSe 2004)},
  month = {October},
  year = 2004,
  isbn = {1-58113-925-X},
  pages = {1--10},
  address = {Philadelphia, PA, USA},
  doi = {http://doi.acm.org/10.1145/1023646.1023648}
}
@phdthesis{gt-phd-trust,
  author = {George Theodorakopoulos},
  title = {Robust network trust establishment for collaborative applications and protocols},
  school = {University of Maryland},
  address = {College Park, MD, USA},
  year = 2007,
  month = {May}
}
@mastersthesis{gt-msc-trust,
  author = {George Theodorakopoulos},
  title = {Distributed Trust Evaluation in Ad-Hoc Networks},
  school = {University of Maryland},
  address = {College Park, MD, USA},
  year = 2004,
  month = {April}
}
@unpublished{gt-diploma-mdrr,
  author = {George Theodorakopoulos},
  title = {Providing {QoS} in {IP} networks with the {MDRR} scheduling algorithm},
  year = 2002,
  month = {July},
  note = {Diploma Thesis, National Technical University of Athens, Greece}
}

This file was generated in part by bibtex2html 1.95.