Nektarios Leontiadis
Nektarios Leontiadis
Verified email at - Homepage
Cited by
Cited by
Measuring and Analyzing {Search-Redirection} Attacks in the Illicit Online Prescription Drug Trade
N Leontiadis, T Moore, N Christin
20th USENIX Security Symposium (USENIX Security 11), 2011
Fashion crimes: trending-term exploitation on the web
T Moore, N Leontiadis, N Christin
Proceedings of the 18th ACM conference on Computer and communications …, 2011
A nearly four-year longitudinal study of search-engine poisoning
N Leontiadis, T Moore, N Christin
Proceedings of the 21st ACM conference on Computer and Communications …, 2014
Pick your poison: pricing and inventories at unlicensed online pharmacies
N Leontiadis, T Moore, N Christin
Proceedings of the fourteenth ACM conference on Electronic commerce, 621-638, 2013
Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform
N Kefalakis, N Leontiadis, J Soldatos, K Gama, D Donsez
Proceedings of the ACM/IFIP/USENIX Middleware'08 conference companion, 66-69, 2008
Middleware building blocks for architecting rfid systems
N Kefalakis, N Leontiadis, J Soldatos, D Donsez
International Conference on Mobile Lightweight Wireless Systems, 325-336, 2009
Scripting the crime commission process in the illicit online prescription drug trade
N Leontiadis, A Hutchings
Journal of Cybersecurity 1 (1), 81-92, 2015
Measuring and mitigating oauth access token abuse by collusion networks
S Farooqi, F Zaffar, N Leontiadis, Z Shafiq
Proceedings of the 2017 Internet Measurement Conference, 355-368, 2017
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser
LF DeKoven, S Savage, GM Voelker, N Leontiadis
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
Empirically measuring WHOIS misuse
N Leontiadis, N Christin
European Symposium on Research in Computer Security, 19-36, 2014
Structuring disincentives for online criminals
N Leontiadis
Carnegie Mellon University, 2014
Bridging RFID systems and enterprise applications through virtualized connectors
N Leontiadis, N Kefalakis, J Soldatos
International Journal of Automated Identification Technology (IJAIT) 1 (2), 1-12, 2010
Following their footsteps: Characterizing account automation abuse and defenses
LF DeKoven, T Pottinger, S Savage, GM Voelker, N Leontiadis
Proceedings of the Internet Measurement Conference 2018, 43-55, 2018
A lookup service in an interconnected world of uniquely identified objects
E Polytarchos, N Leontiadis, S Eliakis, K Pramatari
2008 IEEE International Conference on Emerging Technologies and Factory …, 2008
{SocialHEISTing}: Understanding Stolen Facebook Accounts
J Onaolapo, N Leontiadis, D Magka, G Stringhini
30th USENIX Security Symposium (USENIX Security 21), 4115-4132, 2021
FP7 Contract: ICT-215417-CP
J Soldatos, N Kefalakis, N Leontiadis, N Konstantinou–AIT, N Mitton, ...
Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks
K Clary, E Tosch, J Onaolapo, DD Jensen, B Jabiyev, G Stringhini, ...
Following Their Footsteps
LF DeKoven, T Pottinger, S Savage, GM Voelker, N Leontiadis
Secure Network Management Using a Key Distribution Center
NN Leontiadis, VP Kemerlis, PA Frangoudis, GC Polyzos
The system can't perform the operation now. Try again later.
Articles 1–19