Publications in International Journals
Polenakis, I., Vouronikos, V., Merolli, A., Nikolopoulos, S.D., :A PDF watermarking scheme utilizing invisible QR code embedding in the spatial domain, Journal of Computer Security, (0926227X251346082), SAGE Publications, 2025.
Chysi, A., Nikolopoulos, S. D., and Polenakis, I.: Detection and classification of malicious software utilizing Max-Flows between system-call groups. Journal of Computer Virology and Hacking Techniques, 19(1), 97-123, Springer, 2023.
Chondros, C., Nikolopoulos, S.D., and Polenakis, I.: An integrated simulation framework for the prevention and mitigation of pandemics caused by airborne pathogens. Network Modeling Analysis in Health Informatics and Bioinformatics, 11(1), 1-28, Springer, 2022.
Nikolopoulos, S.D., and Polenakis, I: Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs. Journal of Computer Virology and Hacking Techniques, 18(4), 383-406, Springer, 2022.
Dounavi, H. M., Mpanti, A., Nikolopoulos, S. D., and Polenakis, I.: A graph-based framework for malicious software detection and classification utilizing temporal-graphs, Journal of Computer Security, 1-38, IOSPress 2021.
Nikolopoulos, S.D., and Polenakis, I.: Preventing malware pandemics in mobile devices by establishing response-time bounds. Journal of Information Security and Applications, 1-14, ELSEVIER, 2017.
Nikolopoulos, S.D., and Polenakis, I.: A graph-based model for malware detection and classification using system-call groups. Journal of Computer Virology and Hacking Techniques, 13(1), 29-46, Springer, 2017.
Publications in International Conferences
Polenakis, I., Vouronikos, V., Kiafa, E., Chroni, M., and Nikolopoulos, S. D.: ProtAIN: Protecting the Authenticity and Integrity Properties of NFT Images. In Proceedings of the International Conference on Computer Systems and Technologies 2024 (pp. 16-23), ACM ICPS Proceedings, 2024. | ACM - BEST PAPER AWARD.
Chroni, M., Nikolopoulos, S. D., Polenakis, I., and Vouronikos, V.: A Code-based Multiple Watermarking Scheme for the Preservation of Authenticity of Forensic Images. In Proceedings of the 14 th International Conference on Information, Intelligence, Systems & Applications (IISA), IEEE 2023.
Chroni, M., Katsi, A., Nikolopoulos, S., Polenakis, I., & Vouronikos, V.: Tamper Detection and Localization in Forensic Images. In Proceedings of the 24 th International Conference on Computer Systems and Technologies (CompSysTech’23), (pp. 117-122), ACM ICPS Proceedings, 2023. | ACM - BEST PAPER AWARD.
Chroni, M., Nikolopoulos, S. D., Polenakis, I., and Vouronikos, V: A Multiple Watermarking Scheme for Digital Audio Signals. In Proceedings of the 26 th Pan-Hellenic Conference on Informatics (pp. 279-284), ACM, 2022.
Grigoriadis-Kotsalis, G., Nikolopoulos, S. D., and Polenakis, I.: A Synonym-based Approach for the Semantic Indexing of Texts. In Proceedings of the 23 rd International Conference on Computer Systems and Technologies (CompSysTech’22), ACM ICPS Proceedings, pp. 95-102, 2022.
Chroni, M., Nikolopoulos, S. D., Polenakis, I., and Vouronikos, V.: A Repetitive Watermarking Scheme for Digital Images based on Self-Inverting Permutations. In Proceedings of the 13 th International Conference on Information, Intelligence, Systems & Applications (IISA)/ pp. 1-8, IEEE 2022.
Chroni, M., Nikolopoulos, S. D., Polenakis, I., and Vouronikos, V.: Digital Image Watermarking using Self Inverting Permutations-A Comparative Study. In Proceedings of the 13 th International Conference on Information, Intelligence, Systems & Applications (IISA)/ pp. 1-8, IEEE 2022.
Dounavi, H. M., Mpanti, A., Nikolopoulos, S. D., and Polenakis, I.: Detection and Classification of Malicious Software based on Regional Matching of Temporal Graphs. In Proceedings of the 22 nd International Conference on Computer Systems and Technologies (CompSysTech’21), ACM ICPS Proceedings, pp. 28-33, 2021 | ACM - BEST PAPER AWARD.
Chysi, A., Nikolopoulos, S.D., and Polenakis, I.: An Algorithmic Framework for Malicious Software Detection Exploring Structural Characteristics of Behavioral Graphs. In Proceedings of the 21 st International Conference on Computer Systems and Technologies (CompSysTech’20), ACM ICPS Proceedings, pp. 43-50, 2020.
Mpanti, A., Nikolopoulos S.D., and Polenakis, I.: Malicious Software Detection utilizing Temporal Graphs. In Proceedings of the 20 th International Conference on Computer Systems and Technologies (CompSysTech’19), ACM ICPS Proceedings, pp. 49-55, 2019.
Mpanti, A., Nikolopoulos, S.D., and Polenakis, I.: A Graph-based Model for Malicious Software Detection Exploiting Domination Relations between System-call Groups. In Proceedings of the 19 th International Conference on Computer Systems and Technologies (CompSysTech’18), ACM ICPS Proceedings, pp. 20-26, 2018 |ACM - BEST PAPER AWARD.
Mpanti, A., Nikolopoulos, S.D., and Polenakis I.: Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol. In Proceedings of the 18 th International Conference on Computer Systems and Technologies (CompSysTech’17), ACM ICPS Proceedings, pp. 155-162, 2017.
Nikolopoulos, S.D., and Polenakis, I.: A Model for Establishing Response-time Bounds to Prevent Malware Pandemics in Mobile Devices. In Proceedings of the 17 th International Conference on Computer Systems and Technologies (CompSysTech’16), ACM ICPS Proceedings, pp. 97-104, 2016 | ACM - BEST PAPER AWARD.
Nikolopoulos, S. D., and Polenakis, I.: Malicious software classification based on relations of system-call groups. In Proceedings of the 19 th Panhellenic Conference on Informatics (PCI’15), ACM ICPS Proceedings, pp. 59-60, 2015.
Νikolopoulos, S.D., and Polenakis, I.: A graph-based model for malicious code detection exploiting dependencies of system-call groups. In Proceedings of the 16 th International Conference on Computer Systems and Technologies (CompSysTech’15), ACM ICPS Proceedings, pp. 228-235, 2015 | ACM - BEST PAPER AWARD.
Chionis, I., Nikolopoulos, S.D., and Polenakis, I.: A Survey on Algorithmic Techniques for Malware Detection, In Proceedings of the 2 nd International Symposium on Computing in Informatics and Mathematics (ISCIM’13), 2013.
Books and Volumes
Polenakis, I., Vouronikos, V., Vouronikos, N., Chroni, M., and Nikolopoulos, S. D.: A Code-Based Watermarking Scheme for the Protection of Authenticity of Medical Images. In Optimization, Discrete Mathematics and Applications to Data Sciences (pp. 175-209), Springer, 2024.
Technical Reports
Polenakis, I., Vouronikos, V., Chroni, M., & Nikolopoulos, S. D. (2024). Towards a real-time distributed feedback system for the transportation assistance of PwD. arXiv preprint arXiv:2406.06154.
Chondros, C., Nikolopoulos, S. D., and Polenakis, I.: A Stochastic Graph-based Model for the Simulation of SARS-CoV-2 Transmission. arXiv preprint arXiv:2111.05802, 2021.
Chondros, C., Georgiou-Mousses, C., Nikolopoulos, S. D., Polenakis, I., and Vouronikos, V.: SARiSsa - A Mobile Application for the Proactive Control of SARS-CoV-2 Spread. arXiv preprint arXiv:2106.14567, 2021.
Mpanti, A., Nikolopoulos, S.D., and Polenakis, I.: Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations. arXiv preprint arXiv:1812.10748, 2018.
Nikolopoulos, S.D., and Polenakis, I.: Preventing Malware Pandemics in Mobile Devices by Establishing Response-time Bounds. arXiv preprint arXiv:1607.00827, 2016.
Nikolopoulos, S.D., and Polenakis, I.: Detecting malicious code by exploiting dependencies of system-call groups. arXiv preprint arXiv:1412.8712, 2014.