Dimitris Mitropoulos
Dimitris Mitropoulos

homepage
dimitroataueb.gr

  Affiliation history
Bibliometrics: publication history
Average citations per article0.95
Citation Count18
Publication count19
Publication years2009-2017
Available for download12
Average downloads per article242.75
Downloads (cumulative)2,913
Downloads (12 Months)668
Downloads (6 Weeks)60
Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


18 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 18 of 18
Sort by:

1 published by ACM
September 2017 XRDS: Crossroads, The ACM Magazine for Students - Incentives and Gamification: Volume 24 Issue 1, Fall 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 39,   Downloads (Overall): 39

Full text available: HtmlHtml  PDFPDF
The XRDS blog highlights a range of topics from conference coverage, to security and privacy, to CS theory. Selected blog posts, edited for print, are featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety. If you are interested in joining as a student blogger, please ...

2 published by ACM
July 2016 ACM Transactions on Privacy and Security (TOPS): Volume 19 Issue 1, August 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 16,   Downloads (12 Months): 334,   Downloads (Overall): 456

Full text available: PDFPDF
Cross-Site Scripting (XSS) is one of the most common web application vulnerabilities. It is therefore sometimes referred to as the “buffer overflow of the web.” Drawing a parallel from the current state of practice in preventing unauthorized native code execution (the typical goal in a code injection), we propose a ...
Keywords: xss, JavaScript, JavaScript engine, Protection mechanisms

3 published by ACM
April 2016 EuroSys '16: Proceedings of the Eleventh European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 15,   Downloads (12 Months): 139,   Downloads (Overall): 510

Full text available: PDFPDF
The POSIX standard, developed 25 years ago, comprises a set of operating system (OS) abstractions that aid application portability across UNIX-based OSes. While OSes and applications have evolved tremendously over the last 25 years, POSIX, and the basic set of abstractions it provides, has remained largely unchanged. Little has been ...

4
December 2015 Empirical Software Engineering: Volume 20 Issue 6, December 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 2

Programs draw significant parts of their functionality through the use of Application Programming Interfaces (APIs). Apart from the way developers incorporate APIs in their software, the stability of these programs depends on the design and implementation of the APIs. In this work, we report how we used software telemetry data ...
Keywords: Stack traces, Application programming interfaces, Reliability, Mobile applications

5
May 2015 MSR '15: Proceedings of the 12th Working Conference on Mining Software Repositories
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 13,   Downloads (Overall): 44

Full text available: PDFPDF
Examining a large number of software artifacts can provide the research community with data regarding quality and design. We present a dataset obtained by statically analyzing 22730 jar files taken from the Maven central archive, which is the de-facto application library repository for the Java ecosystem. For our analysis we ...

6 published by ACM
March 2015 XRDS: Crossroads, The ACM Magazine for Students - Cryptography: Volume 21 Issue 3, Spring 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 17,   Downloads (Overall): 132

Full text available: HtmlHtml  PDFPDF

7 published by ACM
October 2014 PCI '14: Proceedings of the 18th Panhellenic Conference on Informatics
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 16,   Downloads (Overall): 70

Full text available: PDFPDF
Software vulnerabilities can severely affect an organization's infrastructure and cause significant financial damage to it. A number of tools and techniques are available for performing vulnerability detection in software written in various programming platforms, in a pursuit to mitigate such defects. However, since the requirements for running such tools and ...
Keywords: Static Analysis, Software Security, Legacy software, Trusted Applications

8
September 2014 BADGERS '14: Proceedings of the 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Security bugs are critical programming errors that can lead to serious vulnerabilities in software. Examining their behaviour and characteristics within a software ecosystem can provide the research community with data regarding their evolution, persistence and others. We present a dataset that we produced by applying static analysis to the Maven ...
Keywords: Security Bugs, Software Security, Static Analysis, FindBugs, Software Ecosystem, Maven Repository, Software Evolution

9
June 2014 Proceedings of the 7th International Conference on Trust and Trustworthy Computing - Volume 8564
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Static Analysis, Software Security, Trusted Applications, Legacy software.

10 published by ACM
May 2014 MSR 2014: Proceedings of the 11th Working Conference on Mining Software Repositories
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 6,   Downloads (12 Months): 33,   Downloads (Overall): 202

Full text available: PDFPDF
Examining software ecosystems can provide the research community with data regarding artifacts, processes, and communities. We present a dataset obtained from the Maven central repository ecosystem (approximately 265GB of data) by statically analyzing the repository to detect potential software bugs. For our analysis we used FindBugs, a tool that examines ...
Keywords: FindBugs, Maven Repository, Software Bugs

11 published by ACM
December 2013 XRDS: Crossroads, The ACM Magazine for Students - Wearable Computing: Getting Dressed in Tech: Volume 20 Issue 2, Winter 2013
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 9,   Downloads (Overall): 178

Full text available: HtmlHtml  PDFPDF
The XRDS blog highlights a range of topics from security and privacy to neuroscience. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety. Keeping with our theme of professional development, included is a guest post on how ...

12 published by ACM
March 2013 XRDS: Crossroads, The ACM Magazine for Students - Scientific Computing: Volume 19 Issue 3, Spring 2013
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 437

Full text available: HtmlHtml  PDFPDF

13 published by ACM
December 2012 XRDS: Crossroads, The ACM Magazine for Students - ICT for Development: Bettering our world through technology: Volume 19 Issue 2, Winter 2012
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 10,   Downloads (Overall): 163

Full text available: HtmlHtml  PDFPDF
The newly launched XRDS blog highlights a range of topics from conference overviews to privacy and security, from HCI to cryptography. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety.

14
October 2012 PCI '12: Proceedings of the 2012 16th Panhellenic Conference on Informatics
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

A security-related bug is a programming error that introduces a potentially exploitable weakness into a computer system. This weakness could lead to a security breach with unfortunate consequences. Version control systems provide an accurate historical record of the software code's evolution. In this paper we examine the frequency of the ...
Keywords: Alitheia Core, FindBugs, Software Defects, Static Analysis, Software Evolution

15 published by ACM
September 2012 XRDS: Crossroads, The ACM Magazine for Students - Big Data: Volume 19 Issue 1, Fall 2012
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 23,   Downloads (Overall): 317

Full text available: HtmlHtml  PDFPDF

16 published by ACM
June 2012 XRDS: Crossroads, The ACM Magazine for Students - The Role of Academia in the Startup World: Volume 18 Issue 4, Summer 2012
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 22,   Downloads (Overall): 365

Full text available: HtmlHtml  PDFPDF

17
September 2010 PCI '10: Proceedings of the 2010 14th Panhellenic Conference on Informatics
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Cyberdiversity is a concept borrowed from biology and refers to the introduction of diversity into the different levels of a computer. This kind of diversity is used to avert attacks that can threat a large number of systems that share common characteristics and as a result common vulnerabilities. Currently, there ...
Keywords: Diversity, monoculture, metrics, computer security

18
May 2009 Computers and Security: Volume 28 Issue 3-4, May, 2009
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 2

SQL injection attacks involve the construction of application input data that will result in the execution of malicious SQL statements. Many web applications are prone to SQL injection attacks. This paper proposes a novel methodology of preventing this kind of attacks by placing a secure database driver between the application ...
Keywords: SQL injection attack, SQLIA, Firewall, JDBC driver, Web security



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us