Dr. Nikos Vrakas



  1. D. Geneiatakis, N. Vrakas, and C. Lambrinoudakis, "Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services," Computers & Security, vol. 28, pp. 578-591, 2009.
  2. N. Vrakas and C. Lambrinoudakis, "A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services," International Journal of Information Technologies and Systems Approach (IJITSA), vol. 4, pp. 32-47, 2011.
  3. N. Vrakas, D. Geneiatakis, and C. Lambrinoudakis, “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments,” Communications Surveys & Tutorials, IEEE, vol. PP, pp. 1-17, 2012.
  4. N. Vrakas and C. Lambrinoudakis, “An intrusion detection and prevention system for IMS and VoIP services,” International Journal of Information Security, pp. 1-17, 2013.
  5. N. Vrakas, D. Geneiatakis, C. Lambrinoudakis, “Obscuring Users’ Identity in VoIP/IMS Environments”, Computers & Security, Elsevier, 2013.


Conference Proceedings

  1. Geneiatakis D., Vrakas N., Lambrinoudakis C. “Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks,” in Proceedings of the 16th International Conference IWSSIP'09, in Chalkida, Greece, June 17-19, 2009.
  2. Vrakas N., Kalloniatis C., Tsohou A., Lambrinoudakis C., “Privacy Requirements Engineering for Trustworthy e-government Services,” in 3rd International Conference on Trust and Trustworthy Computing, Berlin, Germany, 21-23 June, 2010.
  3. Vrakas N., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection,” in 7th International Conference on Trust, Privacy & Security in Digital Business, Bilbao, Spain, 30 August - 3 September, 2010.
  4. Vrakas N., Geneiatakis D., Lambrinoudakis C., “Is IP Multimedia Subsystem Affected by ‘Malformed Message’ Attacks? An Evaluation of OpenIMS”, in SECRYPT 2011, the International Conference on Security and Cryptography, 19-21 July, Seville, Spain, 2011.
  5. Pitropakis N., Darra E., Vrakas N., “It’s all in the Cloud: Reviewing Cloud Security”,  The 10th IEEE International Conference on Autonomic and Trusted Computing,  18-20 Dec., Vietri sul Mare, Italy, 2013


Book Chapters

  1. Vrakas N., Fotiadis G., Lambrinoudakis C., Key Manage-ment Techniques, chapter in: “Modern Cryptography: Theory and Applications”, Burmester T., Gritzalis S., Katsikas S., Chryssikopoulos V., Athens, Greece, Papasotiriou Publica-tions, 2011.