<?xml version="1.0"?>
<dblpperson name="Vyron Kampourakis" pid="337/0876" n="17">
<person key="homepages/337/0876" mdate="2025-07-09">
<author pid="337/0876">Vyron Kampourakis</author>
<url>https://orcid.org/0000-0003-4492-5104</url>
</person>
<r><article publtype="informal" key="journals/corr/abs-2601-05022" mdate="2026-04-07">
<author orcid="0009-0000-8883-0735" pid="394/0667">Konstantinos E. Kampourakis</author>
<author pid="337/0876">Vyron Kampourakis</author>
<author pid="287/3075">Efstratios Chatzoglou</author>
<author pid="90/2058">Georgios Kambourakis</author>
<author pid="83/4094">Stefanos Gritzalis</author>
<title>Knowledge-to-Data: LLM-Driven Synthesis of Structured Network Traffic for Testbed-Free IDS Evaluation.</title>
<year>2026</year>
<month>January</month>
<volume>abs/2601.05022</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2601.05022</ee>
<url>db/journals/corr/corr2601.html#abs-2601-05022</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2602-20663" mdate="2026-04-07">
<author orcid="0009-0007-2593-8811" pid="414/3654">Michail Takaronis</author>
<author pid="413/8352">Athanasia Kollarou</author>
<author pid="337/0876">Vyron Kampourakis</author>
<author pid="189/4758">Vasileios Gkioulos</author>
<author pid="36/6241">Sokratis K. Katsikas</author>
<title>ICSSPulse: A Modular LLM-Assisted Platform for Industrial Control System Penetration Testing.</title>
<year>2026</year>
<month>February</month>
<volume>abs/2602.20663</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2602.20663</ee>
<url>db/journals/corr/corr2602.html#abs-2602-20663</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/compsec/ChatzoglouKTKK25" mdate="2025-03-03">
<author orcid="0000-0001-6507-5052" pid="287/3075">Efstratios Chatzoglou</author>
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author pid="147/1863">Zisis Tsiatsikas</author>
<author pid="12/11160">Georgios Karopoulos</author>
<author orcid="0000-0001-6348-5031" pid="90/2058">Georgios Kambourakis</author>
<title>Unmasking the hidden credential leaks in password managers and VPN clients.</title>
<pages>104298</pages>
<year>2025</year>
<volume>150</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2024.104298</ee>
<url>db/journals/compsec/compsec150.html#ChatzoglouKTKK25</url>
<stream>streams/journals/compsec</stream>
</article>
</r>
<r><article key="journals/compsec/KampourakisKGK25" mdate="2025-11-15">
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author orcid="0000-0003-1278-1943" pid="234/5902">Georgios Kavallieratos</author>
<author pid="189/4758">Vasileios Gkioulos</author>
<author pid="36/6241">Sokratis K. Katsikas</author>
<title>Cracks in the chain: A technical analysis of real-life supply chain security incidents.</title>
<pages>104673</pages>
<year>2025</year>
<volume>159</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2025.104673</ee>
<url>db/journals/compsec/compsec159.html#KampourakisKGK25</url>
<stream>streams/journals/compsec</stream>
</article>
</r>
<r><article key="journals/ijisec/KoffiKKSI25" mdate="2025-04-01">
<author pid="398/8648">Koffi Anderson Koffi</author>
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author pid="95/1973">Constantinos Kolias</author>
<author pid="94/2219-6">Jia Song 0006</author>
<author pid="202/6054">Robert C. Ivans</author>
<title>Speeding-up fuzzing through directional seeds.</title>
<pages>77</pages>
<year>2025</year>
<month>April</month>
<volume>24</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10207-024-00953-6</ee>
<url>db/journals/ijisec/ijisec24.html#KoffiKKSI25</url>
<stream>streams/journals/ijisec</stream>
</article>
</r>
<r><article key="journals/istr/KampourakisGK25" mdate="2025-02-14">
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author pid="189/4758">Vasileios Gkioulos</author>
<author orcid="0000-0003-2966-9683" pid="36/6241">Sokratis K. Katsikas</author>
<title>A step-by-step definition of a reference architecture for cyber ranges.</title>
<pages>103917</pages>
<year>2025</year>
<volume>88</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2024.103917</ee>
<url>db/journals/istr/istr88.html#KampourakisGK25</url>
<stream>streams/journals/istr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2509-16987" mdate="2025-10-18">
<author pid="337/0876">Vyron Kampourakis</author>
<author pid="314/1117">Christos Smiliotopoulos</author>
<author pid="189/4758">Vasileios Gkioulos</author>
<author pid="36/6241">Sokratis K. Katsikas</author>
<title>In Numeris Veritas: An Empirical Measurement of Wi-Fi Integration in Industry.</title>
<year>2025</year>
<month>September</month>
<volume>abs/2509.16987</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2509.16987</ee>
<url>db/journals/corr/corr2509.html#abs-2509-16987</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2512-10487" mdate="2026-01-23">
<author pid="337/0876">Vyron Kampourakis</author>
<author pid="234/5902">Georgios Kavallieratos</author>
<author pid="17/8061">Georgios P. Spathoulas</author>
<author pid="189/4758">Vasileios Gkioulos</author>
<author pid="36/6241">Sokratis K. Katsikas</author>
<title>LLM-Assisted AHP for Explainable Cyber Range Evaluation.</title>
<year>2025</year>
<month>December</month>
<volume>abs/2512.10487</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2512.10487</ee>
<url>db/journals/corr/corr2512.html#abs-2512-10487</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/fi/KampourakisMK24" mdate="2024-05-17">
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author orcid="0000-0002-1280-6568" pid="263/8996">Georgios Michail Makrakis</author>
<author orcid="0000-0002-3020-291X" pid="95/1973">Constantinos Kolias</author>
<title>From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks.</title>
<pages>137</pages>
<year>2024</year>
<month>April</month>
<volume>16</volume>
<journal>Future Internet</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.3390/fi16040137</ee>
<url>db/journals/fi/fi16.html#KampourakisMK24</url>
</article>
</r>
<r><inproceedings key="conf/sec/ChatzoglouKTKK24" mdate="2024-10-22">
<author orcid="0000-0001-6507-5052" pid="287/3075">Efstratios Chatzoglou</author>
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author orcid="0000-0002-9481-0906" pid="147/1863">Zisis Tsiatsikas</author>
<author orcid="0000-0002-0142-7503" pid="12/11160">Georgios Karopoulos</author>
<author orcid="0000-0001-6348-5031" pid="90/2058">Georgios Kambourakis</author>
<title>Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers.</title>
<pages>61-75</pages>
<year>2024</year>
<booktitle>SEC</booktitle>
<ee>https://doi.org/10.1007/978-3-031-65175-5_5</ee>
<crossref>conf/sec/2024</crossref>
<url>db/conf/sec/sec2024.html#ChatzoglouKTKK24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2404-00423" mdate="2025-04-01">
<author pid="287/3075">Efstratios Chatzoglou</author>
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author pid="147/1863">Zisis Tsiatsikas</author>
<author pid="12/11160">Georgios Karopoulos</author>
<author pid="90/2058">Georgios Kambourakis</author>
<title>Keep your memory dump shut: Unveiling data leaks in password managers.</title>
<year>2024</year>
<volume>abs/2404.00423</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2404.00423</ee>
<url>db/journals/corr/corr2404.html#abs-2404-00423</url>
</article>
</r>
<r><article key="journals/compsec/KampourakisGK23" mdate="2024-06-08">
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author pid="189/4758">Vasileios Gkioulos</author>
<author pid="36/6241">Sokratis K. Katsikas</author>
<title>A systematic literature review on wireless security testbeds in the cyber-physical realm.</title>
<pages>103383</pages>
<year>2023</year>
<month>October</month>
<volume>133</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2023.103383</ee>
<url>db/journals/compsec/compsec133.html#KampourakisGK23</url>
</article>
</r>
<r><inproceedings key="conf/rcis/Kampourakis23" mdate="2023-06-02">
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<title>Secure Infrastructure for Cyber-Physical Ranges.</title>
<pages>622-631</pages>
<year>2023</year>
<booktitle>RCIS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-33080-3_45</ee>
<crossref>conf/rcis/2023</crossref>
<url>db/conf/rcis/rcis2023.html#Kampourakis23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/ChatzoglouKK23" mdate="2024-05-17">
<author orcid="0000-0001-6507-5052" pid="287/3075">Efstratios Chatzoglou</author>
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author orcid="0000-0001-6348-5031" pid="90/2058">Georgios Kambourakis</author>
<title>Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames.</title>
<pages>250-264</pages>
<year>2023</year>
<booktitle>SEC</booktitle>
<ee>https://doi.org/10.1007/978-3-031-56326-3_18</ee>
<crossref>conf/sec/2023</crossref>
<url>db/conf/sec/sec2023.html#ChatzoglouKK23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2302-05899" mdate="2025-04-01">
<author pid="287/3075">Efstratios Chatzoglou</author>
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author pid="90/2058">Georgios Kambourakis</author>
<title>Bl0ck: Paralyzing 802.11 connections through Block Ack frames.</title>
<year>2023</year>
<volume>abs/2302.05899</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2302.05899</ee>
<url>db/journals/corr/corr2302.html#abs-2302-05899</url>
</article>
</r>
<r><article key="journals/cryptography/KampourakisCKDZ22" mdate="2023-08-28">
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author orcid="0000-0001-6507-5052" pid="287/3075">Efstratios Chatzoglou</author>
<author orcid="0000-0001-6348-5031" pid="90/2058">Georgios Kambourakis</author>
<author pid="337/0729">Apostolos Dolmes</author>
<author orcid="0000-0003-1425-5138" pid="z/CDZaroliagis">Christos D. Zaroliagis</author>
<title>WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations.</title>
<pages>53</pages>
<year>2022</year>
<volume>6</volume>
<journal>Cryptogr.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.3390/cryptography6040053</ee>
<ee>https://www.wikidata.org/entity/Q114844906</ee>
<url>db/journals/cryptography/cryptography6.html#KampourakisCKDZ22</url>
</article>
</r>
<r><article key="journals/ns/KampourakisKCZ22" mdate="2024-10-06">
<author orcid="0000-0003-4492-5104" pid="337/0876">Vyron Kampourakis</author>
<author pid="90/2058">Georgios Kambourakis</author>
<author pid="287/3075">Efstratios Chatzoglou</author>
<author pid="z/CDZaroliagis">Christos D. Zaroliagis</author>
<title>Revisiting man-in-the-middle attacks against HTTPS.</title>
<year>2022</year>
<volume>2022</volume>
<journal>Netw. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.12968/s1353-4858(22)70028-1</ee>
<url>db/journals/ns/ns2022.html#KampourakisKCZ22</url>
</article>
</r>
<coauthors n="20" nc="1">
<co c="0"><na f="c/Chatzoglou:Efstratios" pid="287/3075">Efstratios Chatzoglou</na></co>
<co c="0"><na f="d/Dolmes:Apostolos" pid="337/0729">Apostolos Dolmes</na></co>
<co c="0"><na f="g/Gkioulos:Vasileios" pid="189/4758">Vasileios Gkioulos</na></co>
<co c="0"><na f="g/Gritzalis:Stefanos" pid="83/4094">Stefanos Gritzalis</na></co>
<co c="0"><na f="i/Ivans:Robert_C=" pid="202/6054">Robert C. Ivans</na></co>
<co c="0"><na f="k/Kambourakis:Georgios" pid="90/2058">Georgios Kambourakis</na></co>
<co c="0"><na f="k/Kampourakis:Konstantinos_E=" pid="394/0667">Konstantinos E. Kampourakis</na></co>
<co c="0"><na f="k/Karopoulos:Georgios" pid="12/11160">Georgios Karopoulos</na></co>
<co c="0"><na f="k/Katsikas:Sokratis_K=" pid="36/6241">Sokratis K. Katsikas</na></co>
<co c="0"><na f="k/Kavallieratos:Georgios" pid="234/5902">Georgios Kavallieratos</na></co>
<co c="0"><na f="k/Koffi:Koffi_Anderson" pid="398/8648">Koffi Anderson Koffi</na></co>
<co c="0"><na f="k/Kolias:Constantinos" pid="95/1973">Constantinos Kolias</na></co>
<co c="0"><na f="k/Kollarou:Athanasia" pid="413/8352">Athanasia Kollarou</na></co>
<co c="0"><na f="m/Makrakis:Georgios_Michail" pid="263/8996">Georgios Michail Makrakis</na></co>
<co c="0"><na f="s/Smiliotopoulos:Christos" pid="314/1117">Christos Smiliotopoulos</na></co>
<co c="0"><na f="s/Song_0006:Jia" pid="94/2219-6">Jia Song 0006</na></co>
<co c="0"><na f="s/Spathoulas:Georgios_P=" pid="17/8061">Georgios P. Spathoulas</na></co>
<co c="0"><na f="t/Takaronis:Michail" pid="414/3654">Michail Takaronis</na></co>
<co c="0"><na f="t/Tsiatsikas:Zisis" pid="147/1863">Zisis Tsiatsikas</na></co>
<co c="0"><na f="z/Zaroliagis:Christos_D=" pid="z/CDZaroliagis">Christos D. Zaroliagis</na></co>
</coauthors>
</dblpperson>

