@article{on-the-fly-tdsc20,
    author={George Theodorakopoulos and Emmanouil Panaousis and Kaitai Liang and George Loukas},
    journal={IEEE Transactions on Dependable and Secure Computing}, 
    title={On-the-fly Privacy for Location Histograms}, 
    year={2020},
}
@article{location-kais19,
    title={Location histogram privacy by Sensitive Location Hiding and Target Histogram Avoidance/Resemblance},
    author={Loukides, Grigorios and Theodorakopoulos, George},
    journal={Knowledge and Information Systems},
    year = {2020},
    volume = {62},
    number = {7},
    pages = {2613--2651},
    month = {July},
    publisher={Springer}
}
@inproceedings{secure-cn4iot18,
    author = {Anthi, Eirini and Javed, Amir and Rana, Omer and Theodorakopoulos, George},
    title = {Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems},
    booktitle = {Cloud Infrastructures, Services, and IoT Systems for Smart Cities},
    year = {2018},
}
@inproceedings{open-percom17,
    author = {M. Katsomallos and S. Lalis and T. Papaioannou and G. Theodorakopoulos},
    title = {An open framework for flexible plug-in privacy mechanisms in crowdsensing applications},
    booktitle = {2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)},
    year = {2017},
    month = {March},
}
@article{behavioural-fi17b,
    author = {Stylianos S. Mamais and George Theodorakopoulos},
    title = {Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems},
    journal = {Future Internet, Special Issue "Security and Privacy in Wireless and Mobile Networks},
    year = {2017},
    volume = {9},
    number = {4},
    month = {November},
    articleno = {88},
}
@article{private-fi17a,
    author = {Stylianos S. Mamais and George Theodorakopoulos},
    title = {Private and Secure Distribution of Targeted Advertisements to Mobile Phones},
    journal = {Future Internet, Special Issue "Security and Privacy in Wireless and Mobile Networks},
    year = {2017},
    volume = {9},
    number = {2},
    month = {May},
    articleno = {16},
}
@article{privacy-tops16,
    author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso},
    title = {Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy},
    journal = {ACM Transactions on Privacy and Security (TOPS)},
    year = {2016},
    volume = {19},
    number = {4},
    month = {December},
    articleno = {11},
}
@inproceedings{inference-eurosp16,
    author = {Galini Tsoukaneri and George Theodorakopoulos and Hugh Leather and Mahesh K. Marina},
    title = {On the Inference of User Paths from Anonymized Mobility Data},
    booktitle = {IEEE European Symposium on Security and Privacy (EuroSP)},
    year = {2016},
    month = {March},
}
@inproceedings{same-origin-wpes15,
    author = {George Theodorakopoulos},
    title = {The Same-Origin Attack against Location Privacy},
    booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES)},
    year = {2015},
    month = {October},
}
@article{broker-ijcc14,
    author = {Petri, Ioan and Punceva, Magdalena and Rana, Omer and Theodorakopoulos, George and Rezgui, Yacine},
    title = {A broker based consumption mechanism for social clouds},
    journal = {International Journal of Cloud Computing},
    year = {2014},
    volume = {2},
    number = {1},
    pages = {45--57},
}
@inproceedings{cognitive-sasow14,
    author = {F. Bagnoli and A. Guazzini and G. Pacini and I. Stavrakakis and E. Kokolaki and G. Theodorakopoulos},
    title = {Cognitive Structure of Collective Awareness Platforms},
    booktitle = {IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops},
    year = {2014},
    month = {September},
}
@inproceedings{prolonging-wpes14,
    author = {George Theodorakopoulos and Reza Shokri and Carmela Troncoso and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
    title = {Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services},
    booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES)},
    year = {2014},
    month = {November},
}
@article{hiding-tdsc14,
    author = {Reza Shokri and George Theodorakopoulos and Panos Papadimitratos and Ehsan Kazemi and Jean-Pierre Hubaux},
    title = {Hiding in the Mobile Crowd: Location Privacy through Collaboration},
    journal = {IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue "Security and Privacy in Mobile Platforms},
    year = {2014},
    volume = {11},
    number = {3},
    pages = {266--279},
    month = {May},
}
@inproceedings{broker-cloud13,
    author = {Ioan Petri and Magdalena Punceva and Omer F. Rana and George Theodorakopoulos},
    title = {Broker Emergence in Social Clouds},
    booktitle = {IEEE International Conference on Cloud Computing (CLOUD)},
    year = {2013},
    month = {June},
}
@article{selfish-tac13,
    author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
    title = {Selfish Response to Epidemic Propagation},
    journal = {IEEE Transactions on Automatic Control (TAC)},
    year = {2013},
    volume = {58},
    number = {2},
    pages = {363--376},
    month = {February},
}
@inproceedings{protecting-ccs12,
    author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
    title = {Protecting Location Privacy: Optimal Strategy against Localization Attacks},
    booktitle = {ACM Conference on Computer and Communications Security (CCS)},
    year = {2012},
    month = {October},
}
@inproceedings{traps-infocom12,
    author = {Nikodin Ristanovic and George Theodorakopoulos and Jean-Yves Le Boudec},
    title = {Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks},
    booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
    year = {2012},
    month = {March},
}
@inproceedings{collaborative-mass11,
    author = {Reza Shokri and Panagiotis Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux},
    title = {Collaborative Location Privacy},
    booktitle = {IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)},
    year = {2011},
    month = {October},
}
@inproceedings{quantifying-pets11,
    author = {Reza Shokri and George Theodorakopoulos and George Danezis and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
    title = {Quantifying Location Privacy: The Case of Sporadic Location Exposure},
    booktitle = {Privacy Enhancing Technologies Symposium (PETS)},
    year = {2011},
    month = {July},
}
@inproceedings{selfish-acc11,
    author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
    title = {Selfish Response to Epidemic Propagation},
    booktitle = {American Control Conference (ACC)},
    year = {2011},
    month = {June},
}
@inproceedings{quantifying-sp11,
    author = {Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux},
    title = {Quantifying Location Privacy},
    booktitle = {IEEE Symposium on Security and Privacy (SP)},
    year = {2011},
    month = {May},
}
@inproceedings{adaptive-wons11,
    author = {Nikodin Ristanovic and Panagiotis Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
    title = {Adaptive Message Authentication for Multi-Hop Networks},
    booktitle = {International Conference on Wireless On-demand Network Systems and Services (WONS)},
    year = {2011},
    month = {January},
}
@book{path-problems-synthesis10,
    author = {John S. Baras and George Theodorakopoulos},
    title = {Path problems in networks},
    publisher = {Morgan \& Claypool Publishers},
    year = {2010},
    series = {Synthesis Lectures on Communication Networks},
}
@inproceedings{preserving-recsys09,
    author = {Reza Shokri and Pedram Pedarsani and George Theodorakopoulos and Jean-Pierre Hubaux},
    title = {Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles},
    booktitle = {ACM Conference on Recommender Systems (RecSys)},
    year = {2009},
    month = {October},
}
@inproceedings{adaptive-vanet09,
    author = {Nikodin Ristanovic and Panos Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux and Jean-Yves Le Boudec},
    title = {Adaptive Message Authentication for Vehicular Networks},
    booktitle = {ACM International Workshop on VehiculAr Inter-NETworking (VANET)},
    year = {2009},
    month = {September},
}
@inproceedings{gtjylbjb-allerton08,
    author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras},
    title = {Dynamic network security deployment under partial information},
    booktitle = {Annual Allerton Conference On Communication, Control, and Computing (ALLERTON)},
    year = {2008},
    month = {September},
}
@article{gtjb-jsac08,
    author = {George Theodorakopoulos and John S. Baras},
    title = {Game Theoretic Modeling of Malicious Users in Collaborative Networks},
    journal = {IEEE Journal on Selected Areas in Communications (JSAC)},
    year = {2008},
    volume = {26},
    number = {7},
    pages = {1317--1327},
    month = {September},
}
@inproceedings{jbsrgtetal-milcom07,
    author = {John S. Baras and Svetlana Radosavac and George Theodorakopoulos and Dan Sterne and Peter Budulas and Richard Gopaul},
    title = {Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR},
    booktitle = {Military Communications Conference (MILCOM)},
    year = {2007},
    month = {October},
}
@inproceedings{gtjb-infocom07,
    author = {George Theodorakopoulos and John S. Baras},
    title = {Malicious Users in Unstructured Networks},
    booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
    year = {2007},
    month = {May},
}
@phdthesis{gt-phd-trust,
    author = {George Theodorakopoulos},
    title = {Robust network trust establishment for collaborative applications and protocols},
    school = {University of Maryland},
    year = {2007},
    address = {College Park, MD, USA},
    month = {May},
    type = {PhD Dissertation},
    url = {http://hdl.handle.net/1903/6967},
}
@inproceedings{gtjb-globecom06,
    author = {George Theodorakopoulos and John S. Baras},
    title = {A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users},
    booktitle = {IEEE Global Communications Conference (GLOBECOM)},
    year = {2006},
    month = {November},
}
@inproceedings{tjgtjb-asc06b,
    author = {Tao Jiang and George Theodorakopoulos and John S. Baras},
    title = {Coalition Formation in MANETs},
    booktitle = {Army Science Conference},
    year = {2006},
    month = {November},
}
@inproceedings{gtjb-asc06a,
    author = {George Theodorakopoulos and John S. Baras},
    title = {A Testbed for Comparing Trust Computation Algorithms},
    booktitle = {Army Science Conference},
    year = {2006},
    month = {November},
}
@inproceedings{gtjb-securecomm06,
    author = {George Theodorakopoulos and John S. Baras},
    title = {Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks},
    booktitle = {International Conference on Security and Privacy in Communication Networks (SecureComm)},
    year = {2006},
    month = {August},
}
@inproceedings{gtjb-mtns06,
    author = {George Theodorakopoulos and John S. Baras},
    title = {Linear Iterations on Ordered Semirings for Trust Metric Computation and Attack Resiliency Evaluation},
    booktitle = {International Symposium on Mathematical Theory of Networks and Systems (MTNS)},
    year = {2006},
    month = {July},
}
@inproceedings{jbtjgt-ist06,
    author = {John S. Baras and Tao Jiang and George Theodorakopoulos},
    title = {Distributed Trust Management in Wireless Autonomic Networks},
    booktitle = {IST Mobile and Wireless Communications Summit},
    year = {2006},
    month = {June},
}
@article{gtjb-jsac06,
    author = {George Theodorakopoulos and John S. Baras},
    title = {On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks},
    journal = {IEEE Journal on Selected Areas in Communications (JSAC)},
    year = {2006},
    volume = {24},
    number = {2},
    pages = {318--328},
    month = {February},
}
@inproceedings{gtjb-wise04,
    author = {George Theodorakopoulos and John S. Baras},
    title = {Trust evaluation in ad-hoc networks},
    booktitle = {ACM Workshop on Wireless security (WiSe)},
    year = {2004},
    month = {October},
}
@mastersthesis{gt-msc-trust,
    author = {George Theodorakopoulos},
    title = {Distributed Trust Evaluation in Ad-Hoc Networks},
    school = {University of Maryland},
    year = {2004},
    address = {College Park, MD, USA},
    month = {May},
    type = {MSc Thesis},
    url = {http://hdl.handle.net/1903/1524},
}
@mastersthesis{gt-diploma-mdrr,
    author = {George Theodorakopoulos},
    title = {Providing QoS in IP networks with the MDRR scheduling algorithm},
    school = {National Technical University of Athens},
    year = {2002},
    address = {Greece},
    month = {July},
    type = {Diploma Thesis},
}