Nektarios Leontiadis
Nektarios Leontiadis
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
N Leontiadis, T Moore, N Christin
USENIX Security Symposium 11, 2011
1282011
Fashion crimes: trending-term exploitation on the web
T Moore, N Leontiadis, N Christin
Proceedings of the 18th ACM conference on Computer and communications …, 2011
662011
A nearly four-year longitudinal study of search-engine poisoning
N Leontiadis, T Moore, N Christin
Proceedings of the 21st ACM conference on Computer and Communications …, 2014
582014
Pick your poison: pricing and inventories at unlicensed online pharmacies
N Leontiadis, T Moore, N Christin
Proceedings of the fourteenth ACM conference on Electronic commerce, 621-638, 2013
382013
Middleware building blocks for architecting rfid systems
N Kefalakis, N Leontiadis, J Soldatos, D Donsez
International Conference on Mobile Lightweight Wireless Systems, 325-336, 2009
302009
Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform
N Kefalakis, N Leontiadis, J Soldatos, K Gama, D Donsez
Proceedings of the ACM/IFIP/USENIX Middleware'08 conference companion, 66-69, 2008
302008
Measuring and mitigating oauth access token abuse by collusion networks
S Farooqi, F Zaffar, N Leontiadis, Z Shafiq
Proceedings of the 2017 Internet Measurement Conference, 355-368, 2017
212017
Scripting the crime commission process in the illicit online prescription drug trade
N Leontiadis, A Hutchings
Journal of Cybersecurity 1 (1), 81-92, 2015
182015
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser
LF DeKoven, S Savage, GM Voelker, N Leontiadis
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
142017
Empirically measuring WHOIS misuse
N Leontiadis, N Christin
European Symposium on Research in Computer Security, 19-36, 2014
92014
Structuring disincentives for online criminals
N Leontiadis
Carnegie Mellon University, 2014
92014
Bridging RFID systems and enterprise applications through virtualized connectors
N Leontiadis, N Kefalakis, J Soldatos
International Journal of Automated Identification Technology (IJAIT) 1 (2), 1-12, 2010
72010
Following their footsteps: Characterizing account automation abuse and defenses
LF DeKoven, T Pottinger, S Savage, GM Voelker, N Leontiadis
Proceedings of the Internet Measurement Conference 2018, 43-55, 2018
62018
A lookup service in an interconnected world of uniquely identified objects
E Polytarchos, N Leontiadis, S Eliakis, K Pramatari
2008 IEEE International Conference on Emerging Technologies and Factory …, 2008
42008
SocialHEISTing: Understanding Stolen Facebook Accounts
J Onaolapo, N Leontiadis, D Magka, G Stringhini
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
2021
FP7 Contract: ICT-215417-CP
J Soldatos, N Kefalakis, N Leontiadis, N Konstantinou–AIT, N Mitton, ...
2011
Secure Network Management Using a Key Distribution Center
NN Leontiadis, VP Kemerlis, PA Frangoudis, GC Polyzos
The system can't perform the operation now. Try again later.
Articles 1–17