@article{on-the-fly-tdsc20, author={George Theodorakopoulos and Emmanouil Panaousis and Kaitai Liang and George Loukas}, journal={IEEE Transactions on Dependable and Secure Computing}, title={On-the-fly Privacy for Location Histograms}, year={2020}, }
@article{location-kais19, title={Location histogram privacy by Sensitive Location Hiding and Target Histogram Avoidance/Resemblance}, author={Loukides, Grigorios and Theodorakopoulos, George}, journal={Knowledge and Information Systems}, year = {2020}, volume = {62}, number = {7}, pages = {2613--2651}, month = {July}, publisher={Springer} }
@inproceedings{secure-cn4iot18, author = {Anthi, Eirini and Javed, Amir and Rana, Omer and Theodorakopoulos, George}, title = {Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems}, booktitle = {Cloud Infrastructures, Services, and IoT Systems for Smart Cities}, year = {2018}, }
@inproceedings{open-percom17, author = {M. Katsomallos and S. Lalis and T. Papaioannou and G. Theodorakopoulos}, title = {An open framework for flexible plug-in privacy mechanisms in crowdsensing applications}, booktitle = {2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)}, year = {2017}, month = {March}, }
@article{behavioural-fi17b, author = {Stylianos S. Mamais and George Theodorakopoulos}, title = {Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems}, journal = {Future Internet, Special Issue "Security and Privacy in Wireless and Mobile Networks}, year = {2017}, volume = {9}, number = {4}, month = {November}, articleno = {88}, }
@article{private-fi17a, author = {Stylianos S. Mamais and George Theodorakopoulos}, title = {Private and Secure Distribution of Targeted Advertisements to Mobile Phones}, journal = {Future Internet, Special Issue "Security and Privacy in Wireless and Mobile Networks}, year = {2017}, volume = {9}, number = {2}, month = {May}, articleno = {16}, }
@article{privacy-tops16, author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso}, title = {Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy}, journal = {ACM Transactions on Privacy and Security (TOPS)}, year = {2016}, volume = {19}, number = {4}, month = {December}, articleno = {11}, }
@inproceedings{inference-eurosp16, author = {Galini Tsoukaneri and George Theodorakopoulos and Hugh Leather and Mahesh K. Marina}, title = {On the Inference of User Paths from Anonymized Mobility Data}, booktitle = {IEEE European Symposium on Security and Privacy (EuroSP)}, year = {2016}, month = {March}, }
@inproceedings{same-origin-wpes15, author = {George Theodorakopoulos}, title = {The Same-Origin Attack against Location Privacy}, booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES)}, year = {2015}, month = {October}, }
@article{broker-ijcc14, author = {Petri, Ioan and Punceva, Magdalena and Rana, Omer and Theodorakopoulos, George and Rezgui, Yacine}, title = {A broker based consumption mechanism for social clouds}, journal = {International Journal of Cloud Computing}, year = {2014}, volume = {2}, number = {1}, pages = {45--57}, }
@inproceedings{cognitive-sasow14, author = {F. Bagnoli and A. Guazzini and G. Pacini and I. Stavrakakis and E. Kokolaki and G. Theodorakopoulos}, title = {Cognitive Structure of Collective Awareness Platforms}, booktitle = {IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops}, year = {2014}, month = {September}, }
@inproceedings{prolonging-wpes14, author = {George Theodorakopoulos and Reza Shokri and Carmela Troncoso and Jean-Pierre Hubaux and Jean-Yves Le Boudec}, title = {Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services}, booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES)}, year = {2014}, month = {November}, }
@article{hiding-tdsc14, author = {Reza Shokri and George Theodorakopoulos and Panos Papadimitratos and Ehsan Kazemi and Jean-Pierre Hubaux}, title = {Hiding in the Mobile Crowd: Location Privacy through Collaboration}, journal = {IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue "Security and Privacy in Mobile Platforms}, year = {2014}, volume = {11}, number = {3}, pages = {266--279}, month = {May}, }
@inproceedings{broker-cloud13, author = {Ioan Petri and Magdalena Punceva and Omer F. Rana and George Theodorakopoulos}, title = {Broker Emergence in Social Clouds}, booktitle = {IEEE International Conference on Cloud Computing (CLOUD)}, year = {2013}, month = {June}, }
@article{selfish-tac13, author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras}, title = {Selfish Response to Epidemic Propagation}, journal = {IEEE Transactions on Automatic Control (TAC)}, year = {2013}, volume = {58}, number = {2}, pages = {363--376}, month = {February}, }
@inproceedings{protecting-ccs12, author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso and Jean-Pierre Hubaux and Jean-Yves Le Boudec}, title = {Protecting Location Privacy: Optimal Strategy against Localization Attacks}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, year = {2012}, month = {October}, }
@inproceedings{traps-infocom12, author = {Nikodin Ristanovic and George Theodorakopoulos and Jean-Yves Le Boudec}, title = {Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks}, booktitle = {IEEE International Conference on Computer Communications (INFOCOM)}, year = {2012}, month = {March}, }
@inproceedings{collaborative-mass11, author = {Reza Shokri and Panagiotis Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux}, title = {Collaborative Location Privacy}, booktitle = {IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)}, year = {2011}, month = {October}, }
@inproceedings{quantifying-pets11, author = {Reza Shokri and George Theodorakopoulos and George Danezis and Jean-Pierre Hubaux and Jean-Yves Le Boudec}, title = {Quantifying Location Privacy: The Case of Sporadic Location Exposure}, booktitle = {Privacy Enhancing Technologies Symposium (PETS)}, year = {2011}, month = {July}, }
@inproceedings{selfish-acc11, author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras}, title = {Selfish Response to Epidemic Propagation}, booktitle = {American Control Conference (ACC)}, year = {2011}, month = {June}, }
@inproceedings{quantifying-sp11, author = {Reza Shokri and George Theodorakopoulos and Jean-Yves Le Boudec and Jean-Pierre Hubaux}, title = {Quantifying Location Privacy}, booktitle = {IEEE Symposium on Security and Privacy (SP)}, year = {2011}, month = {May}, }
@inproceedings{adaptive-wons11, author = {Nikodin Ristanovic and Panagiotis Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux and Jean-Yves Le Boudec}, title = {Adaptive Message Authentication for Multi-Hop Networks}, booktitle = {International Conference on Wireless On-demand Network Systems and Services (WONS)}, year = {2011}, month = {January}, }
@book{path-problems-synthesis10, author = {John S. Baras and George Theodorakopoulos}, title = {Path problems in networks}, publisher = {Morgan \& Claypool Publishers}, year = {2010}, series = {Synthesis Lectures on Communication Networks}, }
@inproceedings{preserving-recsys09, author = {Reza Shokri and Pedram Pedarsani and George Theodorakopoulos and Jean-Pierre Hubaux}, title = {Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles}, booktitle = {ACM Conference on Recommender Systems (RecSys)}, year = {2009}, month = {October}, }
@inproceedings{adaptive-vanet09, author = {Nikodin Ristanovic and Panos Papadimitratos and George Theodorakopoulos and Jean-Pierre Hubaux and Jean-Yves Le Boudec}, title = {Adaptive Message Authentication for Vehicular Networks}, booktitle = {ACM International Workshop on VehiculAr Inter-NETworking (VANET)}, year = {2009}, month = {September}, }
@inproceedings{gtjylbjb-allerton08, author = {George Theodorakopoulos and Jean-Yves Le Boudec and John S. Baras}, title = {Dynamic network security deployment under partial information}, booktitle = {Annual Allerton Conference On Communication, Control, and Computing (ALLERTON)}, year = {2008}, month = {September}, }
@article{gtjb-jsac08, author = {George Theodorakopoulos and John S. Baras}, title = {Game Theoretic Modeling of Malicious Users in Collaborative Networks}, journal = {IEEE Journal on Selected Areas in Communications (JSAC)}, year = {2008}, volume = {26}, number = {7}, pages = {1317--1327}, month = {September}, }
@inproceedings{jbsrgtetal-milcom07, author = {John S. Baras and Svetlana Radosavac and George Theodorakopoulos and Dan Sterne and Peter Budulas and Richard Gopaul}, title = {Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR}, booktitle = {Military Communications Conference (MILCOM)}, year = {2007}, month = {October}, }
@inproceedings{gtjb-infocom07, author = {George Theodorakopoulos and John S. Baras}, title = {Malicious Users in Unstructured Networks}, booktitle = {IEEE International Conference on Computer Communications (INFOCOM)}, year = {2007}, month = {May}, }
@phdthesis{gt-phd-trust, author = {George Theodorakopoulos}, title = {Robust network trust establishment for collaborative applications and protocols}, school = {University of Maryland}, year = {2007}, address = {College Park, MD, USA}, month = {May}, type = {PhD Dissertation}, url = {http://hdl.handle.net/1903/6967}, }
@inproceedings{gtjb-globecom06, author = {George Theodorakopoulos and John S. Baras}, title = {A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users}, booktitle = {IEEE Global Communications Conference (GLOBECOM)}, year = {2006}, month = {November}, }
@inproceedings{tjgtjb-asc06b, author = {Tao Jiang and George Theodorakopoulos and John S. Baras}, title = {Coalition Formation in MANETs}, booktitle = {Army Science Conference}, year = {2006}, month = {November}, }
@inproceedings{gtjb-asc06a, author = {George Theodorakopoulos and John S. Baras}, title = {A Testbed for Comparing Trust Computation Algorithms}, booktitle = {Army Science Conference}, year = {2006}, month = {November}, }
@inproceedings{gtjb-securecomm06, author = {George Theodorakopoulos and John S. Baras}, title = {Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks}, booktitle = {International Conference on Security and Privacy in Communication Networks (SecureComm)}, year = {2006}, month = {August}, }
@inproceedings{gtjb-mtns06, author = {George Theodorakopoulos and John S. Baras}, title = {Linear Iterations on Ordered Semirings for Trust Metric Computation and Attack Resiliency Evaluation}, booktitle = {International Symposium on Mathematical Theory of Networks and Systems (MTNS)}, year = {2006}, month = {July}, }
@inproceedings{jbtjgt-ist06, author = {John S. Baras and Tao Jiang and George Theodorakopoulos}, title = {Distributed Trust Management in Wireless Autonomic Networks}, booktitle = {IST Mobile and Wireless Communications Summit}, year = {2006}, month = {June}, }
@article{gtjb-jsac06, author = {George Theodorakopoulos and John S. Baras}, title = {On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks}, journal = {IEEE Journal on Selected Areas in Communications (JSAC)}, year = {2006}, volume = {24}, number = {2}, pages = {318--328}, month = {February}, }
@inproceedings{gtjb-wise04, author = {George Theodorakopoulos and John S. Baras}, title = {Trust evaluation in ad-hoc networks}, booktitle = {ACM Workshop on Wireless security (WiSe)}, year = {2004}, month = {October}, }
@mastersthesis{gt-msc-trust, author = {George Theodorakopoulos}, title = {Distributed Trust Evaluation in Ad-Hoc Networks}, school = {University of Maryland}, year = {2004}, address = {College Park, MD, USA}, month = {May}, type = {MSc Thesis}, url = {http://hdl.handle.net/1903/1524}, }
@mastersthesis{gt-diploma-mdrr, author = {George Theodorakopoulos}, title = {Providing QoS in IP networks with the MDRR scheduling algorithm}, school = {National Technical University of Athens}, year = {2002}, address = {Greece}, month = {July}, type = {Diploma Thesis}, }