Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Dimitris Gritzalis
2010 – today
- 2013
[j42]Alexios Mylonas, Anastasia Kastania, Dimitris Gritzalis: Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security 34: 47-66 (2013)
[j41]Dimitris Gritzalis, Gurvirender Tejay: Cybercrime in the Digital Economy - Editorial. Computers & Security 38: 1-2 (2013)
[j40]Alexios Mylonas, Vasilis Meletiadis, Lilian Mitrou, Dimitris Gritzalis: Smartphone sensor data as digital evidence. Computers & Security 38: 51-75 (2013)
[j39]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis: Assessing n-order dependencies between critical infrastructures. IJCIS 9(1/2): 93-110 (2013)
[c48]Nikolaos Pitropakis, Costas Lambrinoudakis, Dimitris Geneiatakis, Dimitris Gritzalis: A Practical Steganographic Approach for Matroska Based High Quality Video Files. AINA Workshops 2013: 684-688
[c47]Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis: In Cloud We Trust: Risk-Assessment-as-a-Service. IFIPTM 2013: 100-110
[c46]Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis: Evaluating the Manageability of Web Browsers Controls. STM 2013: 82-98
[c45]Alexios Mylonas, Dimitris Gritzalis, Bill Tsoumas, Theodore Apostolopoulos: A Qualitative Metrics Vector for the Awareness of Smartphone Security Users. TrustBus 2013: 173-184
[e8]Sandro Bologna, Bernhard M. Hämmerli, Dimitris Gritzalis, Stephen D. Wolthusen (Eds.): Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6983, Springer 2013, ISBN 978-3-642-41475-6- 2012
[j38]Bill Tsoumas, Dimitris Gritzalis: Inside Cyber Warfare: Mapping the Cyber Underworld. Computers & Security 31(6): 801 (2012)
[j37]Alexios Mylonas, Dimitris Gritzalis: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. Computers & Security 31(6): 802-803 (2012)
[j36]Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, Yannis Soupionis: Formal analysis for robust anti-SPIT protection using model checking. Int. J. Inf. Sec. 11(2): 121-135 (2012)
[c44]George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis: Hunting Application-Level Logical Errors. ESSoS 2012: 135-142
[c43]Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis: Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. SEC 2012: 249-260
[c42]Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis: A Risk Assessment Method for Smartphones. SEC 2012: 443-456
[e7]Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (Eds.): Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology 376, Springer 2012, ISBN 978-3-642-30435-4- 2011
[j35]Dimitris Gritzalis, Giannis F. Marias, Yacine Rebahi, Yannis Soupionis, Sven Ehlert: SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT). Journal of Computer Security 19(5): 835-867 (2011)
[j34]
[c41]Yannis Soupionis, Dimitris Gritzalis: ASPF: Adaptive anti-SPIT Policy-based Framework. ARES 2011: 153-160
[c40]Miltiadis Kandias, Nikos Virvilis, Dimitris Gritzalis: The Insider Threat in Cloud Computing. CRITIS 2011: 93-103
[c39]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis: Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. CRITIS 2011: 104-115
[c38]Theodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis: Economic Evaluation of Interactive Audio Media for Securing Internet Services. ICGS3/e-Democracy 2011: 46-53
[c37]Marianthi Theoharidou, Miltiadis Kandias, Dimitris Gritzalis: Securing Transportation-Critical Infrastructures: Trends and Perspectives. ICGS3/e-Democracy 2011: 171-178
[c36]Miltiadis Kandias, Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis: Exploitation of auctions for outsourcing security-critical projects. ISCC 2011: 646-651
[c35]Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis: Smartphone Security Evaluation - The Malware Attack Case . SECRYPT 2011: 25-36
[c34]Alexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis: A Secure Smartphone Applications Roll-out Scheme. TrustBus 2011: 49-61
[c33]Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis: Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation. TrustBus 2011: 74-85- 2010
[j33]
[j32]Dimitris Gritzalis, Sabrina De Capitani di Vimercati: Editorial. Computers & Security 29(2): 165-166 (2010)
[j31]
[j30]
[j29]Yannis Soupionis, Dimitris Gritzalis: Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. Computers & Security 29(5): 603-618 (2010)
[j28]Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis: A multi-layer Criticality Assessment methodology based on interdependencies. Computers & Security 29(6): 643-658 (2010)
[j27]Dimitrios Lekkas, Dimitris Gritzalis: e-Passports as a means towards a Globally Interoperable Public Key Infrastructure. Journal of Computer Security 18(3): 379-396 (2010)
[c32]Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis: A Cloud Provider-Agnostic Secure Storage Protocol. CRITIS 2010: 104-115
[c31]Yannis Soupionis, Stylianos Basagiannis, Panagiotis Katsaros, Dimitris Gritzalis: A Formally Verified Mechanism for Countering SPIT. CRITIS 2010: 128-139
[c30]Miltiadis Kandias, Alexios Mylonas, Nikos Virvilis, Marianthi Theoharidou, Dimitris Gritzalis: An Insider Threat Prediction Model. TrustBus 2010: 26-37
[e6]Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou (Eds.): Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings. Lecture Notes in Computer Science 6345, Springer 2010, ISBN 978-3-642-15496-6
2000 – 2009
- 2009
[j26]Stelios Dritsas, Vicky Dritsou, Bill Tsoumas, Panos Constantopoulos, Dimitris Gritzalis: OntoSPIT: SPIT management through ontologies. Computer Communications 32(1): 203-212 (2009)
[j25]
[j24]
[j23]
[c29]Stelios Dritsas, Dimitris Gritzalis: An Ontology-Driven antiSPIT Architecture. e-Democracy 2009: 189-198
[c28]Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis: Risk-Based Criticality Analysis. Critical Infrastructure Protection 2009: 35-49
[c27]George Parissis, George Xylomenos, Dimitris Gritzalis: BLAST: Off-the-Shelf Hardware for Building an Efficient Hash-Based Cluster Storage System. NPC 2009: 148-155
[c26]Yannis Soupionis, George Tountas, Dimitris Gritzalis: Audio CAPTCHA for SIP-Based VoIP. SEC 2009: 25-38
[e5]Dimitris Gritzalis, Javier Lopez (Eds.): Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. IFIP Advances in Information and Communication Technology 297, Springer 2009, ISBN 978-3-642-01243-3- 2008
[j22]Dimitris Gritzalis, Yannis Mallios: A SIP-oriented SPIT Management Framework. Computers & Security 27(5-6): 136-153 (2008)
[c25]Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis: An Adaptive Policy-Based Approach to SPIT Management. ESORICS 2008: 446-460
[c24]Stelios Dritsas, Yannis Soupionis, Marianthi Theoharidou, Yannis Mallios, Dimitris Gritzalis: SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. SEC 2008: 381-395- 2007
[j21]Marianthi Theoharidou, Dimitris Gritzalis: Common Body of Knowledge for Information Security. IEEE Security & Privacy 5(2): 64-67 (2007)
[j20]Dimitrios Lekkas, Dimitris Gritzalis: Long-term verifiability of the electronic healthcare records' authenticity. I. J. Medical Informatics 76(5-6): 442-448 (2007)
[c23]John Mallios, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis: Attack Modeling of SIP-Oriented SPIT. CRITIS 2007: 299-310
[c22]Dimitrios Lekkas, Dimitris Gritzalis: E-Passports as a Means Towards the First World-Wide Public Key Infrastructure. EuroPKI 2007: 34-48
[c21]Giannis F. Marias, Stelios Dritsas, Marianthi Theoharidou, John Mallios, Dimitris Gritzalis: SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment. ICCCN 2007: 597-604
[c20]Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis: A CBK for Information Security and Critical Infrastructure Protection. World Conference on Information Security Education 2007: 49-56
[c19]Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis: Threat Analysis of the Session Initiation Protocol Regarding Spam. IPCCC 2007: 426-433
[c18]Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis: Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33- 2006
[j19]Stelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics and Informatics 23(3): 196-210 (2006)
[c17]Bill Tsoumas, Dimitris Gritzalis: Towards an Ontology-based Security Management. AINA (1) 2006: 985-992
[c16]Bill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis: Security-by-Ontology: A Knowledge-Centric Approach. SEC 2006: 99-110
[c15]Stelios Dritsas, John Tsaparas, Dimitris Gritzalis: A Generic Privacy Enhancing Technology for Pervasive Computing Environments. TrustBus 2006: 103-113- 2005
[j18]Dimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos: Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Transactions on Information Technology in Biomedicine 9(3): 413-423 (2005)
[c14]Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis: An Ontology-Based Approach to Information Systems Security Management. MMM-ACNS 2005: 151-164- 2004
[j17]Dimitrios Lekkas, Dimitris Gritzalis: Cumulative notarization for long-term preservation of digital signatures. Computers & Security 23(5): 413-424 (2004)
[j16]B. Barber, Dimitris Gritzalis, K. Louwerse, Francesco Pinciroli: Introduction. I. J. Medical Informatics 73(3): 215-216 (2004)
[j15]Dimitris Gritzalis, Costas Lambrinoudakis: A security architecture for interconnecting health information systems. I. J. Medical Informatics 73(3): 305-309 (2004)
[j14]Dimitris Gritzalis: Embedding privacy in IT applications development. Inf. Manag. Comput. Security 12(1): 8-26 (2004)
[c13]Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis: Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. EuroPKI 2004: 287-296- 2003
[j13]John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis: Towards a framework for evaluating certificate status information mechanisms. Computer Communications 26(16): 1839-1850 (2003)
[j12]John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis: ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Computer Communications 26(16): 1851-1862 (2003)
[c12]Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas: Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471
[c11]Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis: A Knowledge-Based Repository Model for Security Policies Management. MMM-ACNS 2003: 112-121
[p2]Lilian Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas, Gerald Quirchmayr: Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications. Secure Electronic Voting 2003: 43-60
[p1]Costas Lambrinoudakis, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, Spyros Ikonomopoulos: Secure Electronic Voting: the Current Landscape. Secure Electronic Voting 2003: 101-122
[e4]Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas (Eds.): Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece. IFIP Conference Proceedings 250, Kluwer 2003, ISBN 1-4020-7449-2
[e3]Dimitris Gritzalis (Ed.): Secure Electronic Voting. Advances in Information Security 7, Springer 2003, ISBN 1-4020-7301-1- 2002
[j11]Diomidis Spinellis, Dimitris Gritzalis: Panoptis: Intrusion Detection Using a Domain-Specific Language. Journal of Computer Security 10(1/2): 159-176 (2002)
[c10]Costas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. DEXA Workshops 2002: 435
[c9]Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos: Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78
[c8]Lilian Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas: Revisiting Legal and Regulatory Requirements for Secure E-Voting. SEC 2002: 469-480
[c7]Spyros Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou: Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520- 2001
[j10]Stefanos Gritzalis, Dimitris Gritzalis: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Security 9(2): 71-79 (2001)
[c6]Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis: A Privacy-Enhancing e-Business Model Based on Infomediaries. MMM-ACNS 2001: 72-83
[c5]Dimitris Gritzalis, Nikolaos Kyrloglou: Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. SCCC 2001: 115-123
[c4]Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos: Pythia: Towards Anonymity in Authentication. SEC 2001: 1-18- 2000
[c3]John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas: Evaluating certificate status information mechanisms. ACM Conference on Computer and Communications Security 2000: 1-8
[c2]Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis: A Qualitative Approach to Information Availability. SEC 2000: 37-48
[e2]Dimitris Gritzalis, Sushil Jajodia, Pierangela Samarati (Eds.): CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000. ACM 2000, ISBN 1-58113-203-4
1990 – 1999
- 1999
[j9]Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas: Trusted third party services for deploying secure telemedical applications over the WWW. Computers & Security 18(7): 627-639 (1999)- 1997
[j8]Dimitris Gritzalis: A baseline security policy for distributed healthcare information systems. Computers & Security 16(8): 709-719 (1997)- 1996
[j7]Sokratis K. Katsikas, Thomas Spyrou, Dimitris Gritzalis, John Darzentas: Model for network behaviour under viral attack. Computer Communications 19(2): 124-132 (1996)
[j6]Dimitris Gritzalis, Sokratis K. Katsikas: Towards a formal system-to-system authentication protocol. Computer Communications 19(12): 954-961 (1996)
[c1]Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis: Attack Modelling in Open Network Environments. Communications and Multimedia Security 1996: 268-277
[e1]Sokratis K. Katsikas, Dimitris Gritzalis (Eds.): Information Systems Security, Facing the information society of the 21st Century. IFIP Conference Proceedings 54, Chapman & Hall 1996, ISBN 0-412-78120-4- 1995
[j5]Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Design of a neural network for recognition and classification of computer viruses. Computers & Security 14(5): 435-448 (1995)- 1994
[j4]Michel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis: Intrusion detection: Approach and performance issues of the SECURENET system. Computers & Security 13(6): 495-508 (1994)- 1992
[j3]Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras: Determining access rights for medical information systems. Computers & Security 11(2): 149-161 (1992)
[j2]Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis: A zero knowledge probabilistic login protocol. Computers & Security 11(8): 733-745 (1992)- 1991
[j1]Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou: Data security in medical information systems: The Greek case. Computers & Security 10(2): 141-159 (1991)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:18 CEST by the dblp team



