
Dimitris Gritzalis
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j81]George Stergiopoulos
, Dimitris Gritzalis
, Evangelos Limnaios
:
Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns. IEEE Access 8: 128440-128475 (2020) - [j80]Georgia Lykou, Panagiotis Dedousis, George Stergiopoulos
, Dimitris Gritzalis
:
Assessing Interdependencies and Congestion Delays in the Aviation Network. IEEE Access 8: 223234-223254 (2020) - [j79]Alkmini Gkritzali, Eleni Mavragani, Dimitris Gritzalis:
Negative MWOM and value co-destruction during destination crises. Bus. Process. Manag. J. 26(4): 839-856 (2020) - [j78]George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis
:
Automatic network restructuring and risk mitigation through business process asset dependency analysis. Comput. Secur. 96: 101869 (2020) - [j77]George Stergiopoulos, Nick Kapetanas, Efstratios Vasilellis, Dimitris Gritzalis
:
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis. Secur. Priv. 3(4) (2020) - [j76]Georgia Lykou, Dimitrios Moustakas, Dimitris Gritzalis
:
Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies. Sensors 20(12): 3537 (2020) - [c90]George Stergiopoulos, Eirini Lygerou, Nikolaos Tsalis, Dimitris Tomaras, Dimitris Gritzalis:
Avoiding Network and Host Detection using Packet Bit-masking. ICETE (2) 2020: 52-63
2010 – 2019
- 2019
- [j75]George Stergiopoulos, Georgia Chronopoulou, Evangelos Bitsikas, Nikolaos Tsalis, Dimitris Gritzalis:
Using side channel TCP features for real-time detection of malware connections. J. Comput. Secur. 27(5): 507-520 (2019) - [j74]Georgia Lykou, Argiro Anagnostopoulou, Dimitris Gritzalis:
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls. Sensors 19(1): 19 (2019) - [p5]Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis:
Towards Indeterminacy-Tolerant Access Control in IoT. Handbook of Big Data and IoT Security 2019: 53-71 - [p4]Stavros Salonikias, Antonios Gouglidis, Ioannis Mavridis, Dimitris Gritzalis:
Access Control in the Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 95-114 - 2018
- [j73]George Stergiopoulos, Evangelos Valvis, Dimitris Mitrodimas, Dimitrios Lekkas, Dimitris Gritzalis
:
Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure. IEEE Access 6: 63823-63832 (2018) - [j72]George Stergiopoulos, Dimitris Gritzalis, Vasilis Kouktzoglou
:
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment. Comput. Networks 134: 23-45 (2018) - [j71]Kosmas Pipyros, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual. Comput. Secur. 74: 371-383 (2018) - [j70]Georgia Lykou, Despina Mentzelioti, Dimitris Gritzalis:
A new methodology toward effectively assessing data center sustainability. Comput. Secur. 76: 327-340 (2018) - [j69]Dimitris Gritzalis, Giulia Iseppi, Alexios Mylonas
, Vasilis Stavrou:
Exiting the Risk Assessment Maze: A Meta-Survey. ACM Comput. Surv. 51(1): 11:1-11:30 (2018) - [c89]Georgia Lykou, Argiro Anagnostopoulou, George Stergiopoulos, Dimitris Gritzalis:
Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures. CRITIS 2018: 129-142 - [c88]George Stergiopoulos, Alexander Talavari, Evangelos Bitsikas, Dimitris Gritzalis:
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets. ESORICS (1) 2018: 346-362 - [c87]Georgia Lykou, Argiro Anagnostopoulou, Dimitris Gritzalis:
Implementing Cyber-Security Measures in Airports to Improve Cyber-Resilience. GIoTS 2018: 1-6 - [c86]Nikolaos Tsalis, George Stergiopoulos, Evangelos Bitsikas, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. ICETE (2) 2018: 219-229 - 2017
- [j68]Nikolaos Tsalis, Alexios Mylonas
, Antonia Nisioti, Dimitris Gritzalis, Vasilios Katos:
Exploring the protection of private browsing in desktop browsers. Comput. Secur. 67: 181-197 (2017) - [j67]Miltiadis Kandias, Dimitris Gritzalis, Vasilis Stavrou, Kostas Nikoloulis
:
Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module. Comput. Secur. 69: 3-17 (2017) - [j66]George Stergiopoulos, Panayiotis Katsaros
, Dimitris Gritzalis:
Program analysis with risk-based classification of dynamic invariants for logical error detection. Comput. Secur. 71: 36-50 (2017) - [j65]George Stergiopoulos, Vasilis Kouktzoglou, Marianthi Theocharidou, Dimitris Gritzalis:
A process-based dependency risk analysis methodology for critical infrastructures. Int. J. Crit. Infrastructures 13(2/3): 184-205 (2017) - [j64]Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:
Profiling online social networks users: an omniopticon tool. Int. J. Soc. Netw. Min. 2(4): 293-313 (2017) - [j63]George Stergiopoulos, Evangelos Valvis, Foivos Anagnou-Misyris, Nick Bozovic, Dimitris Gritzalis:
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures. SIGMETRICS Perform. Evaluation Rev. 45(2): 119-124 (2017) - [c85]Georgia Lykou, George Iakovakis, George Chronis, Dimitris Gritzalis:
Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning. CRITIS 2017: 37-47 - [c84]Georgia Lykou, George Stergiopoulos, Antonios Papachrysanthou, Dimitris Gritzalis:
Protecting the Transportation Sector from the Negative Impacts of Climate Change. Critical Infrastructure Protection 2017: 3-21 - 2016
- [j62]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou
, Georgia Lykou
, Dimitris Gritzalis:
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. Int. J. Crit. Infrastructure Prot. 12: 46-60 (2016) - [j61]Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare. Inf. Comput. Secur. 24(1): 38-52 (2016) - [c83]Shamal Faily, Georgia Lykou, Anton Partridge, Dimitris Gritzalis, Alexios Mylonas, Vasilios Katos:
Human-Centered Specification Exemplars for Critical Infrastructure Environments. BCS HCI 2016 - [c82]Dimitris Gritzalis, George Stergiopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos, Georgia Lykou:
Critical Infrastructure Protection: A Holistic Methodology for Greece. CyberICPS@ESORICS 2016: 19-34 - [c81]George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Classification and Comparison of Critical Infrastructure Protection Tools. Critical Infrastructure Protection 2016: 239-255 - [c80]Kosmas Pipyros, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Cyber-Attacks Evaluation Using Simple Additive Weighting Method on the Basis of Schmitt's Analysis. MCIS 2016: 41 - [c79]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. SECRYPT 2016: 28-40 - 2015
- [j60]George Stergiopoulos, Dimitris Gritzalis:
Hacking and Penetration Testing with Low Power Devices. Comput. Secur. 49: 274-275 (2015) - [j59]Nikos Virvilis, Alexios Mylonas
, Nikolaos Tsalis, Dimitris Gritzalis:
Security Busters: Web browser security vs. rogue sites. Comput. Secur. 52: 90-105 (2015) - [j58]Nikolaos Tsalis, Dimitris Gritzalis:
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015). Comput. Secur. 55: 113 (2015) - [j57]Vasilis Stavrou, Dimitris Gritzalis:
Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015). Comput. Secur. 55: 128-129 (2015) - [j56]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou
, Dimitris Gritzalis:
Risk mitigation strategies for critical infrastructures based on graph centrality analysis. Int. J. Crit. Infrastructure Prot. 10: 34-44 (2015) - [c78]Nikolaos Tsalis, Alexios Mylonas
, Dimitris Gritzalis:
An Intensive Analysis of Security and Privacy Browser Add-Ons. CRiSIS 2015: 258-273 - [c77]Stavros Salonikias, Ioannis Mavridis, Dimitris Gritzalis:
Access Control Issues in Utilizing Fog Computing for Transport Infrastructure. CRITIS 2015: 15-26 - [c76]Shamal Faily, George Stergiopoulos, Vasilios Katos
, Dimitris Gritzalis:
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar. CRITIS 2015: 243-246 - [c75]George Stergiopoulos, Marianthi Theocharidou
, Dimitris Gritzalis:
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures. HCI (22) 2015: 672-683 - [c74]George Stergiopoulos, Panagiotis Katsaros
, Dimitris Gritzalis:
Execution Path Classification for Vulnerability Analysis and Detection. ICETE (Selected Papers) 2015: 293-317 - [c73]George Stergiopoulos, Marianthi Theocharidou
, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation. Critical Infrastructure Protection 2015: 299-314 - [c72]George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position. SECRYPT 2015: 100-111 - 2014
- [j55]Lakshmish Ramaswamy, Barbara Carminati
, Lujo Bauer, Dongwan Shin, James Joshi, Calton Pu, Dimitris Gritzalis:
Editorial. Comput. Secur. 41: 1-2 (2014) - [j54]Nikos Virvilis, Dimitris Gritzalis:
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks. Comput. Secur. 42: 191-192 (2014) - [j53]George Stergiopoulos, Dimitris Gritzalis:
A Bug Hunter's Diary. Comput. Secur. 43: 188 (2014) - [j52]Nikolaos Tsalis, Dimitris Gritzalis:
Securing cloud and mobility: A practitioner's guide. Comput. Secur. 45: 305 (2014) - [j51]Vasilis Stavrou, Dimitris Gritzalis:
Introduction to Computer and Network Security: Navigating Shades of Gray. Comput. Secur. 46: 173 (2014) - [j50]Yannis Soupionis, Remous-Aris Koutsiamanis, Pavlos S. Efraimidis, Dimitris Gritzalis:
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication. J. Comput. Secur. 22(3): 383-413 (2014) - [c71]George Stergiopoulos, Panagiotis Katsaros
, Dimitris Gritzalis:
Automated Detection of Logical Errors in Programs. CRiSIS 2014: 35-51 - [c70]Nikolaos Tsalis, Nikos Virvilis, Alexios Mylonas
, Theodore K. Apostolopoulos, Dimitris Gritzalis:
Browser Blacklists: The Utopia of Phishing Protection. ICETE (Selected Papers) 2014: 278-293 - [c69]Dimitris Gritzalis, Vasilis Stavrou, Miltiadis Kandias, George Stergiopoulos:
Insider Threat: Enhancing BPM through Social Media. NTMS 2014: 1-6 - [c68]Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas
, Dimitris Gritzalis:
Mobile Devices - A Phisher's Paradise. SECRYPT 2014: 79-87 - [c67]Vasilis Stavrou, Miltiadis Kandias, Georgios Karoulas, Dimitris Gritzalis:
Business Process Modeling for Insider Threat Monitoring and Handling. TrustBus 2014: 119-131 - [e9]Dimitris Gritzalis, Aggelos Kiayias, Ioannis G. Askoxylakis:
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings. Lecture Notes in Computer Science 8813, Springer 2014, ISBN 978-3-319-12279-3 [contents] - 2013
- [j49]Yannis Soupionis, Dimitris Gritzalis:
Hacking VoIP. Comput. Secur. 32: 267 (2013) - [j48]Miltiadis Kandias, Dimitris Gritzalis:
Metasploit the Penetration Tester's Guide. Comput. Secur. 32: 268-269 (2013) - [j47]Alexios Mylonas
, Anastasia Kastania, Dimitris Gritzalis:
Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34: 47-66 (2013) - [j46]Dimitris Gritzalis, Gurvirender Tejay:
Cybercrime in the Digital Economy - Editorial. Comput. Secur. 38: 1-2 (2013) - [j45]Alexios Mylonas
, Vasilis Meletiadis, Lilian Mitrou, Dimitris Gritzalis:
Smartphone sensor data as digital evidence. Comput. Secur. 38: 51-75 (2013) - [j44]Panayiotis Kotzanikolaou, Marianthi Theoharidou
, Dimitris Gritzalis:
Assessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastructures 9(1/2): 93-110 (2013) - [c66]Nikos Virvilis, Dimitris Gritzalis:
The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? ARES 2013: 248-254 - [c65]Nikolaos Pitropakis, Costas Lambrinoudakis, Dimitris Geneiatakis, Dimitris Gritzalis:
A Practical Steganographic Approach for Matroska Based High Quality Video Files. AINA Workshops 2013: 684-688 - [c64]Nikolaos Tsalis, Marianthi Theoharidou
, Dimitris Gritzalis:
Return on Security Investment for Cloud Platforms. CloudCom (2) 2013: 132-137 - [c63]Marianthi Theoharidou
, Nick Papanikolaou, Siani Pearson
, Dimitris Gritzalis:
Privacy Risk, Security, Accountability in the Cloud. CloudCom (1) 2013: 177-184 - [c62]Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:
Youtube User and Usage Profiling: Stories of Political Horror and Security Success. ICETE (Selected Papers) 2013: 270-289 - [c61]Panayiotis Kotzanikolaou, Marianthi Theoharidou
, Dimitris Gritzalis:
Cascading Effects of Common-Cause Failures in Critical Infrastructures. Critical Infrastructure Protection 2013: 171-182 - [c60]Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis:
In Cloud We Trust: Risk-Assessment-as-a-Service. IFIPTM 2013: 100-110 - [c59]Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos
, Ioannis Psaroudakis, Panajotis Katsaros
, Anakreon Mentis:
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? IISA 2013: 1-6 - [c58]Despoina Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, Christos Douligeris, Marianthi Theoharidou
, Dimitris Gritzalis:
S-Port: Collaborative security management of Port Information systems. IISA 2013: 1-6 - [c57]Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis:
Insiders Trapped in the Mirror Reveal Themselves in Social Media. NSS 2013: 220-235 - [c56]George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis:
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. NSS 2013: 236-249 - [c55]Alexios Mylonas
, Marianthi Theoharidou
, Dimitris Gritzalis:
Assessing Privacy Risks in Android: A User-Centric Approach. RISK@ICTSS 2013: 21-37 - [c54]Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:
Which Side Are You On? - A New Panopticon vs. Privacy. SECRYPT 2013: 98-110 - [c53]George Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis:
Approaching Encryption through Complex Number Logarithms. SECRYPT 2013: 574-579 - [c52]Alexios Mylonas
, Nikolaos Tsalis, Dimitris Gritzalis:
Evaluating the Manageability of Web Browsers Controls. STM 2013: 82-98 - [c51]Alexios Mylonas
, Dimitris Gritzalis, Bill Tsoumas, Theodore K. Apostolopoulos:
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users. TrustBus 2013: 173-184 - [c50]Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Lilian Mitrou, Dimitris Gritzalis:
Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling. UIC/ATC 2013: 347-354 - [c49]Nikos Virvilis, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? UIC/ATC 2013: 396-403 - [c48]Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Dimitris Gritzalis:
Proactive insider threat detection through social media: the YouTube case. WPES 2013: 261-266 - [e8]Sandro Bologna, Bernhard M. Hämmerli, Dimitris Gritzalis, Stephen D. Wolthusen:
Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6983, Springer 2013, ISBN 978-3-642-41475-6 [contents] - 2012
- [j43]Bill Tsoumas, Dimitris Gritzalis:
Inside Cyber Warfare: Mapping the Cyber Underworld. Comput. Secur. 31(6): 801 (2012) - [j42]Alexios Mylonas, Dimitris Gritzalis:
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. Comput. Secur. 31(6): 802-803 (2012) - [j41]Theodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis:
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services. Int. J. Electron. Secur. Digit. Forensics 4(2/3): 164-177 (2012) - [j40]Dimitris Gritzalis, Panagiotis Katsaros
, Stylianos Basagiannis
, Yannis Soupionis:
Formal analysis for robust anti-SPIT protection using model checking. Int. J. Inf. Sec. 11(2): 121-135 (2012) - [c47]Emmanouela Stachtiari, Yannis Soupionis, Panagiotis Katsaros
, Anakreontas Mentis, Dimitris Gritzalis:
Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection. CRITIS 2012: 143-154 - [c46]George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis:
Hunting Application-Level Logical Errors. ESSoS 2012: 135-142 - [c45]Alexios Mylonas
, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis:
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. SEC 2012: 249-260 - [c44]Marianthi Theoharidou
, Alexios Mylonas
, Dimitris Gritzalis:
A Risk Assessment Method for Smartphones. SEC 2012: 443-456 - [e7]Dimitris Gritzalis, Steven Furnell
, Marianthi Theoharidou:
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology 376, Springer 2012, ISBN 978-3-642-30435-4 [contents] - 2011
- [j39]Dimitris Gritzalis, James Joshi:
Editorial. Comput. Secur. 30(2-3): 89-90 (2011) - [j38]Dimitris Gritzalis, Giannis F. Marias, Yacine Rebahi, Yannis Soupionis, Sven Ehlert:
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT). J. Comput. Secur. 19(5): 835-867 (2011) - [j37]Dimitris Gritzalis:
Guest Editor's Preface. J. Comput. Secur. 19(6): 1027-1028 (2011) - [c43]Yannis Soupionis, Dimitris Gritzalis:
ASPF: Adaptive anti-SPIT Policy-based Framework. ARES 2011: 153-160 - [c42]Miltiadis Kandias, Nikos Virvilis, Dimitris Gritzalis:
The Insider Threat in Cloud Computing. CRITIS 2011: 93-103 - [c41]Panayiotis Kotzanikolaou, Marianthi Theoharidou
, Dimitris Gritzalis:
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. CRITIS 2011: 104-115 - [c40]Alexios Mylonas
, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:
On the Feasibility of Malware Attacks in Smartphone Platforms. ICETE (Selected Papers) 2011: 217-232 - [c39]Theodosios Tsiakis, Panagiotis Katsaros
, Dimitris Gritzalis:
Economic Evaluation of Interactive Audio Media for Securing Internet Services. ICGS3/e-Democracy 2011: 46-53 - [c38]Marianthi Theoharidou
, Miltiadis Kandias, Dimitris Gritzalis:
Securing Transportation-Critical Infrastructures: Trends and Perspectives. ICGS3/e-Democracy 2011: 171-178 - [c37]Miltiadis Kandias, Alexios Mylonas
, Marianthi Theoharidou
, Dimitris Gritzalis:
Exploitation of auctions for outsourcing security-critical projects. ISCC 2011: 646-651 - [c36]Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:
Smartphone Security Evaluation - The Malware Attack Case . SECRYPT 2011: 25-36 - [c35]Alexios Mylonas
, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis:
A Secure Smartphone Applications Roll-out Scheme. TrustBus 2011: 49-61 - [c34]Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis:
Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation. TrustBus 2011: 74-85 - 2010
- [j36]Dimitris Gritzalis, Jan H. P. Eloff:
Editorial. Comput. Secur. 29(1): 1-2 (2010) - [j35]Dimitris Gritzalis, Sabrina De Capitani di Vimercati
:
Editorial. Comput. Secur. 29(2): 165-166 (2010) - [j34]Dimitris Gritzalis, Pierangela Samarati
:
Editorial. Comput. Secur. 29(4): 381-382 (2010) - [j33]Dimitris Gritzalis, Javier López
:
Editorial. Comput. Secur. 29(5): 521-522 (2010) - [j32]Yannis Soupionis, Dimitris Gritzalis:
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. Comput. Secur. 29(5): 603-618 (2010) - [j31]Marianthi Theoharidou
, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
A multi-layer Criticality Assessment methodology based on interdependencies. Comput. Secur. 29(6): 643-658 (2010) - [j30]Dimitrios Lekkas, Dimitris Gritzalis:
e-Passports as a means towards a Globally Interoperable Public Key Infrastructure. J. Comput. Secur. 18(3): 379-396 (2010) - [c33]Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis:
A Cloud Provider-Agnostic Secure Storage Protocol. CRITIS 2010: 104-115 - [c32]Yannis Soupionis, Stylianos Basagiannis
, Panagiotis Katsaros
, Dimitris Gritzalis:
A Formally Verified Mechanism for Countering SPIT. CRITIS 2010: 128-139 - [c31]Miltiadis Kandias, Alexios Mylonas
, Nikos Virvilis, Marianthi Theoharidou
, Dimitris Gritzalis:
An Insider Threat Prediction Model. TrustBus 2010: 26-37 - [e6]Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou
:
Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings. Lecture Notes in Computer Science 6345, Springer 2010, ISBN 978-3-642-15496-6 [contents]
2000 – 2009
- 2009
- [j29]Stelios Dritsas, Vicky Dritsou, Bill Tsoumas, Panos Constantopoulos, Dimitris Gritzalis:
OntoSPIT: SPIT management through ontologies. Comput. Commun. 32(1): 203-212 (2009) - [j28]Dimitris Gritzalis, Sokratis K. Katsikas
:
Editorial. Comput. Secur. 28(5): 247 (2009) - [j27]Dimitris Gritzalis, Javier López
:
Editorial. Comput. Secur. 28(6): 325-326 (2009) - [j26]Dimitris Gritzalis, Steven Furnell
:
Editorial. Comput. Secur. 28(7): 491-492 (2009) - [j25]Dimitris Gritzalis, Tom Karygiannis:
Editorial. Comput. Secur. 28(8): 729-730 (2009) - [c30]Stelios Dritsas, Dimitris Gritzalis:
An Ontology-Driven antiSPIT Architecture. e-Democracy 2009: 189-198