![Konstantinos Papageorgiou](https://i1.rgstatic.net/ii/profile.image/11431281108268139-1671448906688_Q128/Konstantinos-Papageorgiou-14.jpg)
Konstantinos PapageorgiouUniversity of Thessaly | UTH · Computer Science and Biomedical Informatics
Konstantinos Papageorgiou
About
4
Publications
70
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1
Citation
Publications
Publications (4)
By leveraging the DNS tunneling technique, malicious actors have the ability to transfer covertly data embedded within a DNS transaction. A DNS tunnel can be used as a Command and Control (C &C) channel for botnet coordination, for data exfiltration, for tunneling another protocol through it, to name a few. To this end, it is imperative to develop...
Network
Cited