Theodore Apostolopoulos
Theodore Apostolopoulos
Professor, Dept. of Informatics, Athens University of Economics & Business, Greece
Verified email at
Cited by
Cited by
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
N Virvilis, D Gritzalis, T Apostolopoulos
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
The compact linear collider (CLIC)-2018 summary report
T CLIC, TK Charles, PJ Giansiracusa, TG Lucas, RP Rassool, M Volpi, ...
arXiv preprint arXiv:1812.06018, 2018
An open financial services architecture based on the use of intelligent mobile devices
A Kousaridas, G Parissis, T Apostolopoulos
Electronic Commerce Research and Applications 7 (2), 232-246, 2008
Information technology investment evaluation: Investments in telecommunication infrastructure
TK Apostolopoulos, KC Pramataris
International Journal of Information Management 17 (4), 287-296, 1997
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
Trust, Privacy, and Security in Digital Business: 10th International …, 2013
Queueing analysis of buffered CSMA/CD protocols
T Apostolopoulos, E Protonotarios
IEEE Transactions On Communications 34 (9), 898-905, 1986
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos
Computers & Security 74, 371-383, 2018
A cyber attack evaluation methodology
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014
Parallel computation for streamflow prediction with distributed hydrologic models
TK Apostolopoulos, KP Georgakakos
Journal of Hydrology 197 (1-4), 1-24, 1997
Browser blacklists: the Utopia of phishing protection
N Tsalis, N Virvilis, A Mylonas, T Apostolopoulos, D Gritzalis
E-Business and Telecommunications: 11th International Joint Conference …, 2015
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Information & Computer Security 24 (1), 38-52, 2016
Queueing analysis of buffered slotted multiple access protocols
TK Apostolopoulos, EN Protonotarios
computer communications 8 (1), 9-21, 1985
A taxonomy of side channel attacks on critical infrastructures and relevant systems
N Tsalis, E Vasilellis, D Mentzelioti, T Apostolopoulos
Critical Infrastructure Security and Resilience: Theories, Methods, Tools …, 2019
Cyber-Attacks evaluation using simple additive weighting method on the basis of schmitt's analysis
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos
An e-learning service management architecture
TK Apostolopoulos, A Kefala
Proceedings 3rd IEEE International Conference on Advanced Technologies, 140-144, 2003
Temporal network management model: Concepts and implementation issues
TK Apostolopoulos, VC Daskalou
Computer Communications 20 (8), 694-708, 1997
The inverse scattering problem for a rigid ellipsoid in linear elasticity
T Apostolopoulos, K Kiriaki, D Polyzos
Inverse Problems 6 (1), 1, 1990
Analysis of a new retransmission control algorithm for slotted CSMA/CD LAN's
Apostolopoulos, Sykas, Protonotarios
IEEE transactions on computers 100 (6), 692-701, 1987
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks.
N Tsalis, G Stergiopoulos, E Bitsikas, D Gritzalis, TK Apostolopoulos
ICETE (2), 219-229, 2018
DHTbd: A reliable block-based storage system for high performance clusters
G Parisis, G Xylomenos, T Apostolopoulos
2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20