NetPHISH Poster
The poster of the NetPHISH project is now available. NetPHISH is a Greek state project (Operational Programme Competitiveness, Entrepreneurship and Innovation 2014-2020 (EPAnEK)) with Grant Agreement number: Τ1ΕΔΚ-05112.
The poster of the NetPHISH project is now available. NetPHISH is a Greek state project (Operational Programme Competitiveness, Entrepreneurship and Innovation 2014-2020 (EPAnEK)) with Grant Agreement number: Τ1ΕΔΚ-05112.
The poster of the Re-cent project is now available. Re-cent is a Greek state project (Operational Programme Competitiveness, Entrepreneurship and Innovation 2014-2020 (EPAnEK)) with Grant Agreement number: Τ1ΕΔΚ-03524.
The European Researcher’s Night is a Europe-wide public event, which displays the diversity of science and its impact on citizens’ daily lives in fun, inspiring ways. The event was held partly online on 24 and 25 September 2021 and conceived by the European Commission with the aim of spreading scientific culture. Among the academic institutions […]
A three-day festival dedicated to science, technology, innovation with sixty online action slots, fifty top speakers from eight countries, three Nobel Prize winners, one hundred demonstration experiments, celebrity science, chemistry shows, documentaries, free parallel actions for all, the Athens Science Festival 2021 took place on March 27 – 29. The virtual event was held by […]
The Systems Security Laboratory Team, under the coordination of Professor Christos Xenakis from the Department of Digital Systems of Piraeus University, presented their solution to the complex equation of opening the borders and the initiation of international travel. The Hellenic proposal includes a digital immunity passport, based on the revolutionary blockchain technology, which will help […]
During the recent pandemic and the unprecedented changes in the way the world operates, there is an increase in email use (app. 20% increase in opening rates) that correspondingly increases the risk of a cyberattack. It has been reported that phishing email attacks involving the COVID-19 as lure increased by 667% between the period of February 2020 and March 2020. […]
On 5th November, Professor Christos Xenakis from the Department of Digital Systems of Piraeus University, as Project coordinator of CUREX had the opportunity to present the project on European Big Data Value Forum 2020 (EBDVF). The clustering event was held online, and Professor participated in the session of EBDVF Health Track: On Health Data Spaces […]
The 2nd Cyber Insurance & Incident Response Conference 2020 was held virtually on 5th November, the digital conference through the LiveOn which is an exhibition platform. Honored guests from both, business and academia had the opportunity to participate in the Online conference brighten up with useful information the discussions based on their field of specialization. […]
The Systems Security Laboratory (SSL) of the University of Piraeus and Professor Christos Xenakis participated in a research conducted by the company Pylones Hellas in the context of the effort for a continuous and thorough understanding of the conditions prevailing in digital security on the subject of cloud computing security. The aim of the research “The […]
Professor Christos Xenakis Department of Digital Systems University of Piraeus The continuous development of computer science and communication technologies has infiltrated in every aspect of our lives, affecting the development in the modern world. The growth of E-Business and the modernization of Public Administration (E-Government) for citizens is an example that society is facing a […]
Significant distinction for the Postgraduate Program in “Digital Systems Security” of the Department of Digital Systems of the University of Piraeus. The program is included once again in the list of the 100 CyberSecurity Courses that exist in Europe and it is the only one in the region of Attica. The primary purpose for the […]
This October is the 8th European Cyber Security Month (ECSM) to raise online security awareness about threats and malicious cyber-attacks. The cyber awareness campaign is coordinated by the European Union Agency for Cybersecurity (ENISA) and the European Commission with the aim of promoting cybersecurity among EU Citizens and organizations through training and the exchange of […]
Member of the Systems Security Laboratory organized on September 17th, 2020, the 1st Workshop on Dependability and Safety Emerging Cloud and Fog Systems (DeSECSyS) under the framework of ESORICS 2020. The clustering event was held online via Zoom, and our team members supported the event both as participants and presenters. The workshop, under the coordinated […]
Postdoctoral position in Security Knowledge Management from the Department of Information Security and Communication Technology of NTNU, Norway. For more information click here: Postdoctoral Position
The development of the Internet of Things (IοT) has boosted entrepreneurship in a variety of market sectors, such as the sector of smart cities. IοT solutions for smart cities refer to a long list of applications, including: parking management, side road lights control, pollution / temperature monitoring, and many others. Already, some of these […]
For the 5th consecutive year, we are happy to announce the Greek participation in the European Cyber Security Challenge 2020 (ECSC20), which will take place 3-7 November 2020 in Vienna, Austria. The competition is an initiative of the European Union Agency for Cybersecurity (ENISA) and it is actively supported by the Greek Ministry of Digital Governance. […]
Members of the SSL Team participated in the 3rd plenary meeting of the EU-funded H2020 project SPIDER: a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services (GA No 833685), which took place in Athens. SPIDER aims to deliver an innovative Cyber Range as a Service (CRaaS) platform that extends and combines the capabilities […]
The future of digital security was discussed by Prof. Christos Xenakis and Demosthenes Economou, Head of Operational Security Unit of ENISA, in the “Athens Calling” broadcast on Greek National Radio (Proto Programma – ERT). The honorable guests, along with the radio host, participated in a two-hour conversation about the risks of the Internet, the digital […]
CUREX: seCUre and pRivate hEalth data eXchange Innovative solutions for protecting health data Systems Security Laboratory is coordinating a new project entitled “CUREX: seCUre and pRivate hEalth data eXchange”, which has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 826404. CUREX aims at enabling secure and authorized […]
University of Piraeus Research Center participated at the kick-off meeting of the SECONDO project which is a Marie Skłodowska-Curie Action. UPRC will participate and will be the project coordinator as well as the technical and innovation coordinator. UPRC will take advantage of the exchange program to perform joint processing and publications where possible. The staff of […]
Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID The SealedGRID is an innovative platform, that builds on a realistic architectural image of industrial installations considering the special characteristics of energy infrastructures, their cyber and physical requirements. The SealedGRID is expected to contribute to the fulfilment of the objective of efficient operation of critical infrastructure, […]
Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis, “Evaluating the privacy of Android mobile applications under forensic analysis”, Computers and Security, Elsevier Science, (Accepted for Publication)
Christos Xenakis, Christoforos Ntantogian, “An Advanced Persistent Threat in 3G Networks: Attacking the Home Network from Roaming Networks”, Computers and Security, Elsevier Science, Vol. 40, Issue 1, pp:84-94, February 2014
Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, “The weakest link on the network: exploiting ADSL routers to perform cyber-attacks”, 13th IEEE International Symposium on Signal Processing and Information Technology, (ISSPIT 2013), Athens, Greece, December 2013
Pitropakis N., Darra E., Vrakas N., Lambrinoudakis C., “It’s all in the Cloud: Reviewing Cloud Security “, Proceedings of the 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), pp. 355-362, IEEE Xplore, Vietri sul Mare, Italy, December 2013.
Haralampos Petrou, Christoforos Ntantogian, Christos Xenakis, “A better time approximation scheme for e-passports”, In Proc. of 10th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2013), Prague, Czech Republic, August 2013.
Foivos Demertzis, Christos Xenakis, “SOMA-E: Self-Organised Mesh Authentication Extended,” Mathematical and Computer Modeling, Elsevier Science, Vol. 57, Issue 7-8, pp: 1606 – 1616, April 2013.
Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis, «Discovering authentication credentials in volatile memory of Android mobile devices», In Proc. 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013), Athens, Greece, April 2013.
Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis, “Discovering authentication credentials in volatile memory of Android mobile devices”, In Proc. 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013), Athens, Greece, April 2013.
Pitropakis N., Lambrinoudakis C., Geneiatakis D., Gritzalis D., «A Practical Steganographic Approach for Matroska based High Quality Video files», 7th International Symposium on Security and Multimodality in Pervasive Environment (SMPE-2013), IEEE Computer Society Press Barcelona, Spain, March 2013.
http://www.secnews.gr/archives/73505
There aren’t journals.
Christoforos Ntantogian, Dimitris Gkikakis, Christos Xenakis, “PRIPAY: A Privacy Preserving Architecture for Secure Micropayments”, ICSNC 2012, Lisbon, Portugal, Nov 2012
Christoforos Ntantogian, Dimitris Gkikakis, Christos Xenakis, «PRIPAY: A Privacy Preserving Architecture for Secure Micropayments», In Proc. The Seventh International Conference on Systems and Networks Communications (ICSNC 2012), Lisbon, Portugal, November 2012.
Lalas E., Papathanasiou A., Lambrinoudakis C., «Privacy and Traceability in Social Networking Sites», Proceedings of the 16th Panhellenic Conference on Informatics (PCI 2012), pp. 127-132, IEEE Xplore, Piraeus, Greece, October 2012.
Dimitris Tsolkas, Nikos Passas, Christos Xenakis, Vassilis Papataxiarhis, Vassileios Tsetsos, “Busfinder: a personalized multimodal transportation guide with dynamic routing,” In Proc. 16th Panhellenic Conference on Informatics (PCI 2012), Piraeus, Greece, October 2012.
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Obscuring Users’ Identity in Next Generation Networks”, Computer Networks Journal (indexed in ISI/SCI-E), Elsevier (submitted).
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Obscuring Users’ Identity in Next Generation Networks”, Computer Networks Journal (indexed in ISI/SCI-E), Elsevier (submitted).
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Obscuring Users’ Identity in Next Generation Networks”, Computer Networks Journal (indexed in ISI/SCI-E), Elsevier (submitted).
Vrakas N., Lambrinoudakis C., “An Intrusion Detection and Prevention System for IMS and VoIP Services”, International Journal of Information Security (indexed in ISI/SCI-E), Springer (to appear).
Vrakas N., Lambrinoudakis C., “An Intrusion Detection and Prevention System for IMS and VoIP Services”, International Journal of Information Security (indexed in ISI/SCI-E), Springer (to appear).
Christoforos Ntantogian, Christos Xenakis, “Questioning the Feasibility of UMTS-GSM Interworking Attacks,” Wireless Personal Communications, Springer, Vol. 65, No. 1, pp:157-163, July 2012.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks,” In Proc. 27th IFIP International Information Security and Privacy Conference (SEC 2012), Heraklion, Crete, Greece, June 2012.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks”, International Information Security and Privacy Conference (IFIP SEC2012), Heraklion, Crete, Greece, June 2012
G. Aggelinos and S.K. Katsikas, “Disaster Recovery Analysis and Management Method (DRAMM): An IT Management tool”, in Proceedings, PCI 2012, Piraeus, Greece, 2012.
Christoforos Panos, Platon Kotzias, Christos Xenakis, Ioannis Stavrakakis, » Securing the 802.11 MAC in MANETs: A Specification-based Intrusion Detection Engine,» In Proc. IEEE/IFIP, 9th International Conference on Wireless On-demand Network Systems and Services (WONS 2012), Courmayeur, Italy, January 2012.
Christoforos Panos, Platon Kotzias, Christos Xenakis, Ioannis Stavrakakis, » Securing the 802.11 MAC in MANETs: A Specification-based Intrusion Detection Engine,» In Proc. IEEE/IFIP, 9th International Conference on Wireless On-demand Network Systems and Services (WONS 2012), Courmayeur, Italy, January 2012.
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments”, IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), IEEE Press, 2012 (to appear).
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments”, IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), IEEE Press, 2012 (to appear).
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments”, IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), IEEE Press, 2012 (to appear).
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Reducing False Synchronizations in 3G-WLAN Integrated Networks”, IEEE Transactions on Wireless Communications , Vol. 10, No. 11, pp: 3765-3773, Nov. 2011.
Kontoudis D., Fouliras P., Lambrinoudakis C., “A Survey of Network Virtualization Environment Modeling», International Journal of Network Management (indexed in ISI/SCI-E), Wiley (to appear).
G. Aggelinos and S.K. Katsikas, “Enhancing SSADM with Disaster Recovery Plan Activities”, Information Management and Computer Security, Vol. 19, pp. 248-261, 2011.
Lambrinoudakis C., “Evaluating and Enriching Information and Communication Technologies Compliance Frameworks with Regard to Privacy”, Information Management & Computer Security, Emerald (to appear).
Vrakas Ν., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection” , Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’10), pp. 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.
E. Darra, C. Ntantogian, C. Xenakis, S. Katsikas, “A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks”, in Proceeding, Trust, Privacy and Security in Digital Business – 8th International Conference, TrustBus 2011, Toulouse, France, σελ. 138-149, 2011.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis, «An Evaluation of Anomaly-based Intrusion Detection Engines for Mobile Ad Hoc Networks,» In Proc. 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse France, August 2011.
Eleni Darra, Christoforos Ntantogian, Christos Xenakis, Sokratis Katsikas, «A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks,» In Proc. 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse France, August 2011.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis, «An Evaluation of Anomaly-based Intrusion Detection Engines for Mobile Ad Hoc Networks,» In Proc. 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse France, August 2011.
Eleni Darra, Christoforos Ntantogian, Christos Xenakis, Sokratis Katsikas, “A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks,” In Proc. 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse France, August 2011
Eleni Darra, Christoforos Ntantogian, Christos Xenakis, Sokratis Katsikas, «A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks,» In Proc. 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse France, August 2011.
Vrakas N., Geneiatakis D., Lambrinoudakis C., «Is IP Multimedia Subsystem Affected by ‘Malformed Message’ Attacks? – An Evaluation of OpenIMS», Proceedings of the International Conference on Security and Cryptography (SECRYPT 2011), pp. 275-280, Science and Technology Publications Digital Library, Seville, Spain, 2011.
(3) Agudo I., Nuñez D., Giammatteo G., Rizomiliotis P., Lambrinoudakis C., «Cryptography goes to the Cloud», Proceedings of the 1st International Workshop on Security & Trust for Applications in Virtualised Environments (STAVE 2011), pp. 190-197, Springer, Loutraki, Greece, 2011.
Vrakas N., Lambrinoudakis C., “A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services”, International Journal of Information Technologies and the Systems Approach, Vol.4, Issue 2, pp. 32-47, IGI Global, 2011.
Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing (indexed in ISI/SCI-E), Vol.11, Issue 2, pp. 289-302, Wiley, 2011.
Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis “A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks,” Computers & Security, Elsevier Science, Vol. 30, Issue 1, pp: 63-80, Jan. 2011.
Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis “A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks,” Computers & Security, Elsevier Science, Vol. 30, Issue 1, pp: 63-80, Jan. 2011.
G. Spathoulas and S.K. Katsikas, “Reducing False Positives in Intrusion Detection Systems”, Computers & Security, Vol. 29, pp. 35-44, 2010.
S. Sp. Pappas, L. Economou, P. Karampelas, D.C. Karamousantas, S.K. Katsikas, G.E. Chatzarakis and P.D. Skafidas, “Electricity demand load forecasting of the Hellenic power system using an ARMA model”, Electric Power Systems Research, Vol. 80, pp. 256-264, 2010.
Tsohou Α., Kokolakis S., Lambrinoudakis C., Gritzalis S., “A Framework of ISO Security Standards to Facilitate Best Practices’ Awareness and Conformity”, Information Management & Computer Security, Vol. 18, No.5, pp. 350-365, Emerald, 2010.
G. Aggelinos and S.K. Katsikas, “Integrating Disaster Recovery Plan Activities into the System Development Life Cycle”, Journal of Information Systems Security, Vol. 6, pp. 20-35, 2010.
Kambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiouklas A., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010.
Kambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiouklas A., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010.
Drogkaris P., Gritzalis S., Lambrinoudakis C., “Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era”, Proceedings of the EGOVIS’10 International Conference on Electronic Government and the Information Systems Perspective, K. N. Andersedn, et al. (Eds.), pp. 142 -149, Springer LNCS 6267, Bilbao, Spain, September 2010.
G. Spathoulas and S.K. Katsikas, “Reducing False Positives in Intrusion Detection Systems”, Computers & Security, Vol. 29, pp. 35-44, 2010.
Vrakas Ν., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection” , Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’10), pp. 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.
Vrakas Ν., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection” , Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’10), pp. 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.
S. Sp. Pappas, L. Economou, P. Karampelas, D.C. Karamousantas, S.K. Katsikas, G.E. Chatzarakis and P.D. Skafidas, “Electricity demand load forecasting of the Hellenic power system using an ARMA model”, Electric Power Systems Research, Vol. 80, pp. 256-264, 2010.
Foivos Demertzis, Christos Xenakis, “SOMA: Self-Organized Mesh Authentication,” In Proc. 7th European Workshop on Public Key Services, Applications and Infrastructures (ΕuroPKI/10), Athens, Greece, Sept. 2010.
Nikos Vavoulas, Christos Xenakis, “A Risk Analysis Method for Deliberate Threats,” In Proc. 5th International Workshop on Critical Information Infrastructures Security, (CRITIS 2010), Athens, Greece, Sept. 2010.
Foivos Demertzis, Christos Xenakis, “SOMA: Self-Organized Mesh Authentication,” In Proc. 7th European Workshop on Public Key Services, Applications and Infrastructures (ΕuroPKI/10), Athens, Greece, Sept. 2010.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis, «A Novel Intrusion Detection System for MANETs,» In Proc. International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece, July 2010.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis, «A Novel Intrusion Detection System for MANETs,» In Proc. International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece, July 2010.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis “A Generic Mechanism for Efficient Authentication in B3G Networks,” Computers & Security, Elsevier Science, Vol. 29, Issue 4, pp: 460-475, June 2010.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis “A Generic Mechanism for Efficient Authentication in B3G Networks,” Computers & Security, Elsevier Science, Vol. 29, Issue 4, pp: 460-475, June 2010.
Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing, Special Issue on Network Security and Digital Forensics in Next Generation Communications, doi: 10.1002/wcm.1019, Wiley Interscience, 2010.
Vrakas Ν., Kalloniatis C., Tsohou A., Lambrinoudakis C., “Privacy Requirements Engineering for Trustworthy e-government Services”, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST’10), pp. 298-307, Springer LNCS 6101, Berlin, Germany, June 2010.
Vrakas Ν., Kalloniatis C., Tsohou A., Lambrinoudakis C., “Privacy Requirements Engineering for Trustworthy e-government Services”, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST’10), pp. 298-307, Springer LNCS 6101, Berlin, Germany, June 2010.
Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Unifying ISO Security Standards Practices into a Single Security Framework”, Proceedings of the 12th Annual IFIP Workshop on Information Security Management (South African Information Security Multi-Conference), pp. 188-203, Port Elizabeth, South Africa, May 2010.
Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Privacy and Identity Management, Vol. xi, No. 1, pp.32-37, also in Novatica journal, Issue 202 (www.ati.es/novatica), 2010.
G. Spathoulas and S.K. Katsikas, “Reducing False Positives in Intrusion Detection Systems”, Computers & Security, Vol. 29, pp. 35-44, 2010.
Drogkaris P., Lambrinoudakis C., Gritzalis S., «Introducing Federated Identities to One-Stop-Shop e-Government Environments: The Greek Case», Proceedings of the eChallenges 2009 Conference, P. Cunningham (Ed.), Istanbul, Turkey, October 2009.
Geneiatakis D., Lambrinoudakis C., Gritzalis S., «A Hierarchical Model for Cross-Domain Communication of Health-Care Units», Proceedings of NSS 2009 – 3rd International Conference on Network and System Security, Y. Xiang, J. Lopez, H. Wang (Eds.), IEEE Computer Society Press, Gold Coast, Australia, October 2009.
Geneiatakis D., Lambrinoudakis C., Gritzalis S., «A Hierarchical Model for Cross-Domain Communication of Health-Care Units», Proceedings of NSS 2009 – 3rd International Conference on Network and System Security, Y. Xiang, J. Lopez, H. Wang (Eds.), IEEE Computer Society Press, Gold Coast, Australia, October 2009.
Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., «Information Systems Security Management: A review and a classification of the ISO standards», Proceedings of the e-Democracy 2009 – 3rd Conference on Electronic Democracy – Next Generation Society: Technological and Legal Issues, A. Sideridis (Ed.), Springer Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics […]
G. Spathoulas and S. Katsikas, “Using a fuzzy inference system to reduce false positives in intrusion detection”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-4, 2009. (Invited).
Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, SERSC http://www.sersc.org/journals/IJDRBC, 2009.
Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, SERSC http://www.sersc.org/journals/IJDRBC, 2009.
Drogkaris P., Gritzalis S., Lambrinoudakis C., «Enabling Secure Data Management in e-Government Environments: The Greek Case», Proceedings of ongoing research and projects of EGOV 09 – 8th International Conference, EGOV 2009, H. J. Scholl, M. Janssen, R. Traunmuller, M. A. Wimmer (Eds.), Trauner Verlag, Linz, Austria, September 2009.
Tsohou A., Rizomiliotis P., Lambrinoudakis C., Gritzalis S., «Security and Privacy Issues in Bipolar Disorder Research», Proceedings of the 7th International Conference on Information and Communication Technologies in Health (ICICTH), A. Hasman et al. (Eds.), INEAG, Samos, Greece, July 2009.
Geneiatakis D., Lambrinoudakis C., Kambourakis G., Kafkalas A., Ehlert S., “A First Order Logic Security Verification Model for SIP”, Proceedings of the IEEE International Conference on Communications, Communications and Information Systems Security Symposium (ICC’09-CISS), IEEE Press, Dresden, Germany, June 2009.
Geneiatakis D., Lambrinoudakis C., Kambourakis G., Kafkalas A., Ehlert S., “A First Order Logic Security Verification Model for SIP”, Proceedings of the IEEE International Conference on Communications, Communications and Information Systems Security Symposium (ICC’09-CISS), IEEE Press, Dresden, Germany, June 2009.
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009.
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009.
I. Kantzavelou and S. Katsikas, “Playing games with internal attackers repeatedly”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-6, 2009. (Invited).
T. Kostis, A. Goudosis, K. Galanis and S.K. Katsikas, “Applying simulator-defined radar countermeasure systems techniques to computer network security systems”, in Proceedings, European Modelling and Simulation Conference, Athens, Greece, pp. 130-135, 2009.
G. Spathoulas and S. Katsikas, “Using a fuzzy inference system to reduce false positives in intrusion detection”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-4, 2009. (Invited).
Christoforos Ntantogian, Christos Xenakis, “One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks,” Wireless Personal Communications, Springer, Vol. 48, Issue 4, pp: 569-584, March 2009.
Christoforos Ntantogian, Christos Xenakis, “One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks,” Wireless Personal Communications, Springer, Vol. 48, Issue 4, pp: 569-584, March 2009.
T.G. Kostis, K. Galanis and S.K. Katsikas, “Angular glint effects generation for false naval target verisimility requirements”, Measurement Science and Technology, vol. 20, no. 10, [Note(s): 104016.1-104016.13], 2009.
G. Aggelinos and S.K. Katsikas, “Integrating Disaster Recovery Plan Activities into the System Development Life Cycle”, in Proceedings, Mediterranean Conference of Information Systems (MCIS 2009), Athens, Greece, pp. 835-845, 2009.
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009.
Christos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis “A Qualitative Risk Analysis for the GPRS Technology “, In Proc. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-08), Shanghai, China, December 2008.
A.N. Yannacopoulos, C. Lambrinoudakis, S. Gritzalis, S.Z. Xanthopoulos, S.K. Katsikas, “Modeling privacy insurance contracts and their utilization in risk management for ICT firms”, in Proceedings, Malaga, Spain, ESORICS 2008.
Yiannakopoulos A., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., Katsikas S., “Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms”, Proceedings of the 13th European Symposium on Research in Computer Security – ESORICS 2008, Jajodia S., Lopez J. (Eds), pp. 207-222, Springer LNCS 5283, Malaga, Spain, October 2008.
Yiannakopoulos A., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., Katsikas S., “Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms”, Proceedings of the 13th European Symposium on Research in Computer Security – ESORICS 2008, Jajodia S., Lopez J. (Eds), pp. 207-222, Springer LNCS 5283, Malaga, Spain, October 2008.
I. Kantzavelou, S. Katsikas, “A generic intrusion detection game model in IT security”, in Proceedings, TrustBus 2008, Regensburg, Germany, σελ. 151-162, 2008.
Drogkaris P., Geneiatakis D., Lambrinoudakis C., Gritzalis S., “Towards an Enhanced Authentication Framework in eGovernment: The Greek case”, EGOV’08 – 7th International Conference on Electronic Government, M. Wimmer et al. (Eds.), Trauner Proceedings (Proceedings on ongoing research, projects, and general development issues), Turin, Italy, September 2008.
Drogkaris P., Geneiatakis D., Lambrinoudakis C., Gritzalis S., “Towards an Enhanced Authentication Framework in eGovernment: The Greek case”, EGOV’08 – 7th International Conference on Electronic Government, M. Wimmer et al. (Eds.), Trauner Proceedings (Proceedings on ongoing research, projects, and general development issues), Turin, Italy, September 2008.
Geneiatakis D., Kambourakis G., Lambrinoudakis C., “A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony”, Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’08), pp. 59-68, Springer LNCS 5185, Turin, Italy, September 2008.
Geneiatakis D., Kambourakis G., Lambrinoudakis C., “A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony”, Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’08), pp. 59-68, Springer LNCS 5185, Turin, Italy, September 2008.
Christos Xenakis, Christoforos Ntantogian, Ioannis Stavrakakis, “A network-assisted mobile VPN for securing users data in UMTS,” Computer Communications, Elsevier Science, vol. 31, No. 14, pp. 3315-3327 September 2008.
Christos Xenakis, Christoforos Ntantogian, Ioannis Stavrakakis, “A network-assisted mobile VPN for securing users data in UMTS,” Computer Communications, Elsevier Science, vol. 31, No. 14, pp. 3315-3327 September 2008.
E. Michailidis, S.K. Katsikas, E. Georgopoulos, “Intrusion detection using evolutionary neural networks”, in Proceedings, PCI , Samos, Greece, 2008.
T.G. Kostis, K.G. Galanis, S.K. Katsikas, “Simulator implementation of an IF-ISAR system for studies in target glint”, in Proceedings, PCI Samos, Greece, 2008.
S.S. Pappas, N. Harkiolakis, P. Karampelas, L. Economou, S.K. Katsikas, “A new algorithm for on-line multivariate ARMA identification using multimodel partitioning theory”, in Proceedings, PCI, Samos, Greece, 2008.
Dimitris Ztoupis, Kyriakos Zarifis, Christos Xenakis, Ioannis Stavrakakis “Towards a Security Framework for an Established Autonomous Network “, In Proc. IEEE International Symposium on Wireless Pervasive Computing, Santorini, Greece, May 2008.
A.N. Yannacopoulos, C. Lambrinoudakis, S. Gritzalis, S.Z. Xanthopoulos, S.K. Katsikas, “Modeling privacy insurance contracts and their utilization in risk management for ICT firms”, in Proceedings, Malaga, Spain, ESORICS 2008.
Geneiatakis D., Lambrinoudakis C., Kambourakis, G., “An Ontology Based-Policy for Deploying Secure SIP- based VoIP Services”, accepted for publication Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2008.
Geneiatakis D., Lambrinoudakis C., Kambourakis, G., “An Ontology Based-Policy for Deploying Secure SIP- based VoIP Services”, accepted for publication Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2008.
Christos Xenakis, “Security Measures and Weaknesses of the GPRS Security Architecture,” International Journal of Network Security, Vol.6, No.2, pp:158–169, Mar. 2008.
Geneiatakis D., Lambrinoudakis C., “A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks”, Proceedings of the IMS and Mobile Multimedia Workshop, in conjunction with the 4th International Mobile Multimedia Communications Conference – MobiMedia 2008, ACM International Conference Proceedings, Oulu, Finland, 2008.
Geneiatakis D., Lambrinoudakis C., “A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks”, Proceedings of the IMS and Mobile Multimedia Workshop, in conjunction with the 4th International Mobile Multimedia Communications Conference – MobiMedia 2008, ACM International Conference Proceedings, Oulu, Finland, 2008.
S. Pappas, L. Economou, P. Karampelas, S. K. Katsikas, P. Liatsis, “Modeling of the grounding resistance variation using ARMA models”, Simulation Modelling Practice and Theory, Vol. 16, no. 5, σελ. 560-570, 2008.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Reducing the User Authentication Cost in Next Generation Networks “, In Proc. 5th IEEE/IFIP Annual Conference on Wireless On demand Network Systems and Services (WONS 2008), Garmisch-Partenkirchen, Germany, Jan 2008.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Reducing the User Authentication Cost in Next Generation Networks “, In Proc. 5th IEEE/IFIP Annual Conference on Wireless On demand Network Systems and Services (WONS 2008), Garmisch-Partenkirchen, Germany, Jan 2008.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Efficient Authentication for Users Autonomy in Next Generation All-IP Networks”, In Proc. 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (BIONETICS 2007), Budapest, Hungary, Dec 2007.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Efficient Authentication for Users Autonomy in Next Generation All-IP Networks”, In Proc. 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (BIONETICS 2007), Budapest, Hungary, Dec 2007.
Christoforos Ntantogian, Christos Xenakis, “A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks”, In Proc. 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2007), Athens, Greece, Sept 2007.
Geneiatakis D., Lambrinoudakis C., “A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment”, Telecommunication Systems (indexed in ISI/SCI-E), Vol.36, No.4, pp. 153-159, Springer, 2007.
Geneiatakis D., Lambrinoudakis C., “A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment”, Telecommunication Systems (indexed in ISI/SCI-E), Vol.36, No.4, pp. 153-159, Springer, 2007.
Christoforos Ntantogian, Christos Xenakis, “Reducing Authentication Traffic in 3G-WLAN Integrated Networks”, In Proc. 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2007), Athens, Greece, Sept 2007.
Christoforos Ntantogian, Christos Xenakis, “Reducing Authentication Traffic in 3G-WLAN Integrated Networks”, In Proc. 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2007), Athens, Greece, Sept 2007.
Christoforos Ntantogian, Christos Xenakis, “A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks”, In Proc. 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2007), Athens, Greece, Sept 2007.
S. Gritzalis, A.N. Yannacopoulos, C. Lambrinoudakis, P. Hatzopoulos, S.K. Katsikas, “A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments”, International Journal of Information Security, Vol. 6, σελ. 197-211, 2007.
Christos Xenakis, Christoforos Ntantogian, “Security Architectures for B3G Mobile Networks”, Telecommunication Systems,” Springer, Vol.35, pp: 123-139, Aug. 2007.
Christos Xenakis, Christoforos Ntantogian, “Security Architectures for B3G Mobile Networks”, Telecommunication Systems,” Springer, Vol.35, pp: 123-139, Aug. 2007.
Geneiatakis D., Lambrinoudakis C., “An Ontology Description for SIP Security Flaws”, Computer Communications (indexed in ISI/SCI-E), Vol. 30, Issue 6, pp. 1367-1374, Elsevier, 2007.
Geneiatakis D., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, submitted to Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2007.
Christoforos Ntantogian, Christos Xenakis, “A Security Binding for Efficient Authentication in 3G-WLAN Heterogeneous Networks”, PhD poster presented in the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 2007.
Kyriakos Zarifis, Dimitris Ztoupis, Christos Xenakis, “Security Issues in an Established Autonomous Wireless Network”, PhD poster presented in the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 2007.
Kyriakos Zarifis, Dimitris Ztoupis, Christos Xenakis, “Security Issues in an Established Autonomous Wireless Network”, PhD poster presented in the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 2007.
S. Gritzalis, A.N. Yannacopoulos, C. Lambrinoudakis, P. Hatzopoulos, S.K. Katsikas, “A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments”, International Journal of Information Security, Vol. 6, σελ. 197-211, 2007.
S. Gritzalis, P. Belsis and S.K. Katsikas, “Interconnecting Autonomous Medical Domains: Security, Interoperability and Semantic-Driven Perspectives for Electronic Health Records”, IEEE Engineering in Medicine and Biology Magazine, Vol. 26, Issue 5, σελ. 23-28, 2007.
Gritzalis S., Yannacopoulos A., Lambrinoudakis C., Hatzopoulos P., Katsikas S., “A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments”, International Journal of Information Security, Vol.6, No.4, pp. 197-211, Springer, 2007.
P. Belsis, S. Gritzalis, S.K.Katsikas, “Partial and Fuzzy Constraint satisfaction to Support coalition formation”, Electronic Notes in Theoretical Computer Science, Vol. 179, σελ. 75-86, 2007.
Geneiatakis D., Kambourakis G., Lambrinoudakis C., Dagiuklas A., Gritzalis S., “A Framework for Protecting a SIP-based Infrastructure against Malformed Message Attacks”, Computer Networks Journal (indexed in ISI/SCI-E), Vol. 51, Issue 10, pp. 2580-2593, Elsevier, 2007.
Gritzalis S., Yannacopoulos A., Lambrinoudakis C., Hatzopoulos P., Katsikas S., “A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments”, International Journal of Information Security, Vol.6, No.4, pp. 197-211, Springer, 2007.
Geneiatakis D., Kambourakis G., Lambrinoudakis C., Dagiuklas A., Gritzalis S., “A Framework for Protecting a SIP-based Infrastructure against Malformed Message Attacks”, Computer Networks Journal (indexed in ISI/SCI-E), Vol. 51, Issue 10, pp. 2580-2593, Elsevier, 2007.
Geneiatakis D., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, submitted to Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2007.
Geneiatakis D., Lambrinoudakis C., “An Ontology Description for SIP Security Flaws”, Computer Communications (indexed in ISI/SCI-E), Vol. 30, Issue 6, pp. 1367-1374, Elsevier, 2007.
Christos Xenakis, “Malicious actions against the GPRS technology,” Computer Virology, Springer, Vol. 2, No. 2, Nov. 2006, pp. 121-133.
Christos Xenakis, Nikos Laoutaris, Lazaros Merakos, Ioannis Stavrakakis, “A Generic Characterization of the Overheads Imposed by IPsec and Associated Cryptographic Algorithms,” Computer Networks, Elsevier Science, Vol. 50, No. 17, Dec 2006, pp. 3225-3241.
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Katsikas S., “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, October 2006.
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Katsikas S., “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, October 2006.
S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis and S. Katsikas, “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools and Applications (eJETA), http://www.ejeta.org, Vol. 2, Issue 1, 2006.
Geneiatakis D., Dagiouklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., «Survey of Security Vulnerabilities in Session Initiation Protocol», IEEE Communications Surveys and Tutorials, Vol.8, No.3, pp. 68-81, IEEE Press, 3rd Quarter 2006.
P. Belsis, S. Gritzalis, S. Katsikas, “Optimized Multi-domain Secure Interoperation using Soft Constraints”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 78-85, 2006.
S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis and S. Katsikas, “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools and Applications (eJETA), http://www.ejeta.org, Vol. 2, Issue 1, 2006.
Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study” Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), M. Logothetis et al. (Eds), Patras, Greece, July 2006.
Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study” Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), M. Logothetis et al. (Eds), Patras, Greece, July 2006.
Christoforos Ntantogian, Christos Xenakis, Lazaros Merakos, “An enhanced EAP-SIM authentication scheme for securing WLAN,” Proc. 15th IST Mobile & Wireless Communications, Mykonos, Greece, June 2006.
Z. Le, J. Ford, V. Karkaletsis, V. Spiliopoulos, S. Katsikas, and F. Makedon, “Secure Group Collaboration in an Open Healthcare Environment”, in Proceedings of the Fourth Annual International Conference on Information Communication Technologies in Health (ICICTH 2006), Samos, Greece, 2006.
Christoforos Ntantogian, Christos Xenakis, Lazaros Merakos, “An enhanced EAP-SIM authentication scheme for securing WLAN,” Proc. 15th IST Mobile & Wireless Communications, Mykonos, Greece, June 2006.
Gymnopoulos L., Karyda M., Balopoulos T., Dritsas S., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Developing a Security Patterns Repository for Secure Applications Design”, Proceedings of the ECIW 2006 5th European Conference on Information Warfare and Security, D. Remenyi et al. (Eds.), pp. 51-60, published by ACL Academic Conferences Limited, Helsinki, Finland, June 2006.
G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Source code author identification based on N-gram author profiles”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, June 2006, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 508-515, 2006.
Kambourakis G., Geneiatakis D., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “Towards effective SIP load Balancing: The SNOCER approach”, Proceedings of the Third Annual VoIP Security Workshop, in cooperation with ACM SIGCOMM, D. Sisalem et al. (Eds), ACM Press, Berlin, Germany, June 2006.
S.K. Katsikas, J.-P. Burguignon, A. Hyland, N. Ryan, M. Breen, K. Pukelis, C. Miceli, I. Jedlickova, Z. Dika, P. Cardew, “Implementing Learning Outcomes in Eight European Universities: Experiences and challenges”, The Quality of Higher Education, 2006.
S.S. Pappas, A.K. Leros and S.K. Katsikas, “Joint Order and Parameter Estimation of Multivariate Autoregressive Models Using Multi – Model Partitioning Theory”, Digital Signal Processing, Vol. 16, Issue 6, σελ. 782-795, 2006.
Lekkas D., Lambrinoudakis C., “Outsourcing Digital Signatures: A solution to key management burden”, Information Management and Computer Security Journal, Special issue on Security Issues of IT Outsourcing, Vol. 14, No. 5, pp. 436-449, Emerald, 2006.
G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Effective Identification of Source Code Authors Using Byte-Level Information”, in Proceedings of the 28th International Conference on Software Engineering ICSE 2006 – Emerging Results Track, May 2006, Shanghai, China, ACM Press, σελ. 893-896, 2006.
Christos Xenakis, Lazaros Merakos, “Vulnerabilities and Possible Attacks against the GPRS Backbone Network,” In Proc. International Workshop on Critical Information Infrastructures Security, (CRITIS’06), LNCS 4347, Springer, 2006, pp. 262 – 272.
P. Belsis, S. Gritzalis, S.K.Katsikas, “Partial and Fuzzy Constraint satisfaction to Support coalition formation”, in Proceedings of the STM 2006 2nd Workshop on Security and Trust Management (in conjunction with ESORICS 2006), P. Samarati, S. Etalle (Eds.), σελ. 130-141, 2006.
K. Lamprou, S. Gritzalis and S.K. Katsikas, “Security Architectures for Online Distance Learning and Training: A state-of-the-art review”, Themes in Education, Vol. 7, no 1, σελ. 63-77, 2006.
Geneiatakis D., Dagiouklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., «Survey of Security Vulnerabilities in Session Initiation Protocol», IEEE Communications Surveys and Tutorials, Vol.8, No.3, pp. 68-81, IEEE Press, 3rd Quarter 2006.
Christos Xenakis, Nikos Loukas, Lazaros Merakos, “A Secure Mobile VPN Scheme for UMTS,” In Proc. European Wireless 2006, Athens, Greece, April 2006.
Karyda M., Balopoulos T., Dritsas S., Gymnopoulos L., Kokolakis S., Lambrinoudakis C., Gritzalis S., “An Ontology for Secure e-Government Applications”, Proceedings of the DeSeGov’06 Workshop on Dependability and Security in eGovernment (in conjunction with ARES 2006 1st International Conference on Availability, Reliability, and Security), A. Tjoa, E. Schweighofer (Eds.), pp. 1033-1037, IEEE Computer Society Press, […]
Maglogiannis I., Zaropoulos E., Platis A., Lambrinoudakis C., “Risk analysis of a patient monitoring system using Bayesian Network modeling”, Journal of Biomedical Informatics (indexed in ISI/SCI-E), Vol. 39, No. 6, pp. 637-647, Elsevier, 2006.
T. Balopoulos, L. Gymnopoulos, M. Karyda, S. Kokolakis, S. Gritzalis, S.K. Katsikas, “A Framework for exploiting security expertise in application development”, in Proceedings of TRUSTBUS 2006, Copenhagen, Denmark, σελ. 62-70, 2006.
Dritsas S., Gritzalis D., Lambrinoudakis C., “Protecting privacy and anonymity in pervasive computing: trends and perspectives”, Telematics and Informatics Journal, Special Issue on Privacy and Anonymity in the Global Village, Vol. 23, No. 3, pp. 196-210, Elsevier, 2006.
D.L. Delivasilis and S.K. Katsikas, “Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices”, International Journal of Network Security, Vol. 3, σελ. 44-50, 2006.
Christos Xenakis, Lazaros Merakos, “Alternative Schemes for Dynamic Secure VPN Deployment over UMTS,” Wireless Personal Communications, Springer, Vol. 36, No. 2, Jan 2006, pp. 163-194.
S.S. Pappas, A.K. Leros, S.K. Katsikas, “Multivariate AR model order estimation with unknown process order”, in Proceedings, 10th Panhellenic Conference on Informatics, Volos, Greece, σελ. 787-797, 2005.
Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., “Security and Privacy issues towards ENUM protocol”, Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT’05), pp.478-483, IEEE Computer Society Press, Athens, Greece, December 2005.
Katsikas S., Yannacopoulos A., Gritzalis S., Lambrinoudakis C., Hatzopoulos P., “How much should we pay for security?”, Proceedings of the IFIP WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, P. Dowland, S. Furnell, B. Thuraisingham, X. C. Wang (Eds.), pp.59-70, Vol.193, Springer, Fairfax, USA, December […]
S.K. Katsikas, A.N. Yannacopoulos, S. Gritzalis, C. Lambrinoudakis and P. Hatzopoulos, “How much should we pay for security?”, in Proceedings, IFIP 11.1/11.5 Joint Working Conference on Security Management, Integrity and Internal Control in Information Systems, Fairfax, Virginia, σελ. 59-70, Fairfax, VA, USA, 2005.
V.C. Moussas, S.D. Likothanassis, S.K. Katsikas, and A.K. Leros, “Adaptive On-Line Multiple Source Detection”, in Proceedings, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’05), Philadelphia, PA, USA, σελ. IV1029 – IV1032, 2005.
Katsikas S., Yannacopoulos A., Gritzalis S., Lambrinoudakis C., Hatzopoulos P., “How much should we pay for security?”, Proceedings of the IFIP WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, P. Dowland, S. Furnell, B. Thuraisingham, X. C. Wang (Eds.), pp.59-70, Vol.193, Springer, Fairfax, USA, December […]
Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., “Security and Privacy issues towards ENUM protocol”, Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT’05), pp.478-483, IEEE Computer Society Press, Athens, Greece, December 2005.
T. Balopoulos, S. Gritzalis and S. Katsikas, “Specifying electronic Voting Protocols in Typed MSR”, in Proceedings of the ACM CCS 2005 Computer and Communications Security Conference – Workshop on Privacy in the Electronic Society (WPES), Alexandria, VA, USA, σελ. 35-39, 2005.
P. Belsis, S. Gritzalis and S.K. Katsikas, “A scalable security architecture enabling coalition formation between autonomous domains”, in Proceedings, 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT ’05), Athens, Greece, σελ. 560-565, 2005.
S.K. Katsikas, J. Lopez and G. Pernul, “Trust, privacy and security in e-business: Requirements and solutions”, in Proceedings, 10th Panhellenic Conference on Informatics, Volos, Greece, σελ. 548-558, 2005.
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Employing Ontologies for the Development of Security Critical Applications: The Secure e-Poll Paradigm”, Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernemnt, Funabashi M., Grzech A. (Eds.), pp.187-201, Springer, Poznan, Poland, October 2005.
C. Lambrinoudakis, S. Gritzalis, P. Hatzopoulos, A.N. Yannacopoulos, and S.K. Katsikas, “A Formal Model for Pricing Information Systems Insurance Contracts”, Computer Standards and Interfaces, Vol. 27, σελ. 521-532, 2005.
T. Balopoulos, S. Gritzalis, S.K. Katsikas, “Specifying privacy-preserving protocols in Typed MSR”, Computer Standards and Interfaces, Vol. 27, σελ. 501-512, 2005.
Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “A Framework for Detecting Malformed Messages in SIP Networks”, Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2005), Ramakrishnan K. (Ed.), IEEE Press, Chania, Greece, September 2005.
Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “SIP Message Tampering: The SQL code INJECTION attack”, Proceedings of the 13th IEEE International Conference on Software Telecommunications and Computer Networks (SoftCOM 2005), N. Rozic et al. (Eds.), pp. 176-181, IEEE Press, Split, Croatia, September 2005.
Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “A Framework for Detecting Malformed Messages in SIP Networks”, Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2005), Ramakrishnan K. (Ed.), IEEE Press, Chania, Greece, September 2005.
F. Trochoutsos, S. Gritzalis, S. Katsikas, G. Haramis, “Information Systems Security Effective Guidelines for Participants”, in Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, September 2005, Athens, Greece.
V. Moussas, S.K. Katsikas and D.G. Lainiotis, “Adaptive estimation of FCG using non-linear state space models”, Stochastic Analysis and Applications, Vol. 23, No. 1, σελ. 1-18, 2005.
C. Lambrinoudakis, S. Gritzalis, P. Hatzopoulos, A.N. Yannacopoulos, and S.K. Katsikas, “A Formal Model for Pricing Information Systems Insurance Contracts”, Computer Standards and Interfaces, Vol. 27, σελ. 521-532, 2005.
Dritsas S., Mallios J., Gritzalis D., Lambrinoudakis C., “Applicability of Privacy Enhancing Technologies in Ubiquitous Computing Environments”, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005 – Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU’05, P. Georgiadis, S. Gritzalis, Y. Marias (Eds.), pp. 61-70, Diaylos Press, Santorini, Greece, […]
S.K. Katsikas, “Assuring Critical Information Infrastructure”, in Proceedings, NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, σελ. 43-55, 2005.
Geneiatakis D., Kambourakis G., Dagiuklas T., Lambrinoudakis C., Gritzalis S., “SIP Security Mechanisms: A state-of-the-art review”, Proceedings of the 5th International Network Conference (INC’2005), S. Furnell, S. Katsikas (Eds.), pp. 147-156, Samos, Greece, July 2005.
Geneiatakis D., Kambourakis G., Dagiuklas T., Lambrinoudakis C., Gritzalis S., “SIP Security Mechanisms: A state-of-the-art review”, Proceedings of the 5th International Network Conference (INC’2005), S. Furnell, S. Katsikas (Eds.), pp. 147-156, Samos, Greece, July 2005.
Kokolakis S., Lambrinoudakis C., “ICT Security Standards for Healthcare Applications”, Upgrade electronic journal (www.upgrade-cepis.org), Special Issue: Standardization for ICT Security, Vol. 6, No. 4, also in Novatica journal, Issue 176 (www.ati.es/novatica), 2005.
Kambourakis G., Geneiatakis D., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “Towards effective SIP load Balancing: The SNOCER approach”, Proceedings of the Third Annual VoIP Security Workshop, in cooperation with ACM SIGCOMM, D. Sisalem et al. (Eds), ACM Press, Berlin, Germany, June 2006.
Dimitris Karteris, Christos Xenakis, Lazaros Merakos, “Context-Aware Service Provisioning in All-IP Networks”, In Proc. 13th IST Mobile & Wireless Communications, Lyon, France, June 2005.
S.K. Katsikas, “Educating health stakeholders in Health Information Systems security”, in Proceedings, EFMI STC 2005 on “Health and Medical Informatics Applications: Educational Aspects”, Athens, Greece, σελ. 29-31, 2005.
S.K. Katsikas, A.N. Yannacopoulos, S. Gritzalis, C. Lambrinoudakis and P. Hatzopoulos, “How much should we pay for security?”, in Proceedings, IFIP 11.1/11.5 Joint Working Conference on Security Management, Integrity and Internal Control in Information Systems, Fairfax, Virginia, σελ. 59-70, Fairfax, VA, USA, 2005.
Gritzalis S., Lambrinoudakis C., Lekkas D., Deftereos S., “Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments”, IEEE Transactions on Information Technology in BioMedicine (indexed in ISI/SCI-E), Vol. 9, No. 3, pp. 413-423, IEEE Press, 2005.
Lambrinoudakis C., Gritzalis S., Hatzopoulos P., Yannacopoulos A., Katsikas S., “A formal model for pricing information systems insurance contracts”, Computer Standards and Interfaces (indexed in ISI/SCI-E), Vol. 7, No. 5, pp. 521-532, Elsevier, 2005.
V.C. Moussas and S.K. Katsikas, “A multi-model approach to fatigue crack growth monitoring and prediction”, in Proceedings, 12th IEEE IWSSIP 2005, Chalkis, Greece, σελ. 57-61, 2005.
Lambrinoudakis C., Gritzalis S., Hatzopoulos P., Yannacopoulos A., Katsikas S., “A formal model for pricing information systems insurance contracts”, Computer Standards and Interfaces (indexed in ISI/SCI-E), Vol. 7, No. 5, pp. 521-532, Elsevier, 2005.
Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “SIP Message Tampering: The SQL code INJECTION attack”, Proceedings of the 13th IEEE International Conference on Software Telecommunications and Computer Networks (SoftCOM 2005), N. Rozic et al. (Eds.), pp. 176-181, IEEE Press, Split, Croatia, September 2005.
Lambrinoudakis C., Platis A., Leros A., “A PKI Security reliability assessment methodology”, Proceeding of the European Safety & Reliability Conference (ESREL 2005), Poland, 2005.
S.S. Pappas, A.K. Leros and S.K. Katsikas, “MV AR model order identification using partitioning theory”, in Proceedings, 12th IEEE IWSSIP 2005, Chalkis, Greece, σελ. 51-55, 2005.
S.K. Katsikas, J. Lopez and G. Pernul, “Trust, Privacy and Security in Digital Business”, Computer Science, Systems and Engineering, Vol. 6, σελ. 391-399, 2005.
S.K. Katsikas, “Doctoral Programme on Information and Communication Systems Security at the University of the Aegean”, in Proceedings, SEC2004, Toulouse, France, 2004.
T. Balopoulos, S. Gritzalis, S.K. Katsikas, “An Extension of Typed MSR for specifying Esoteric Protocols and their Dolev-Yao Intruder”, in Proceedings of the CMS’2004 IFIP TC6/TC11 International Conference on Communications and Multimedia Security, Salford, UK, σελ. 209-221, 2004.
V.C. Moussas, S.K. Katsikas, D.G. Lainiotis, “Application of partitioning algorithms to fatigue crack growth identification and improved lifetime prediction”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.
V.C. Moussas, S.K. Katsikas, D.G. Lainiotis, “Component reliability improvement using extended Kalman filters and non-linear FCG models”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.
Aggelis G., Gritzalis S., Lambrinoudakis C., “Addressing Authentication and Authorization Issues in the Grid”, Proceedings of the 4th International Network Conference (INC’2004), S. Furnell (Ed.), pp. 319-326, published by IEE & University of Plymouth, Plymouth, UK, July 2004.
Platis A., Lambrinoudakis C., Leros A., “A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions”, Proceedings of the 1st European PKI Workshop (EuroPKI’2004), S. Katsikas, S. Gritzalis, J. Lopez (Eds), pp. 149-160, Springer, Lecture Notes in Computer Science LNCS 3093, Samos, Greece, June 2004.
Deftereos S., Lambrinoudakis C., Gritzalis D., “High Level Security Policies for Health: From Theory to Practice”, Proceedings of the Electronic Health Record Security Workshop, International Congress on Medical and Care Compunetics (ICMCC), pp. 416-423, IOS Press, The Hague, Netherlands, June 2004.
Christos Xenakis, Lazaros Merakos, “Security in third Generation Mobile Networks,” Computer Communications, Elsevier Science, Vol. 27, No. 7, pp. 638-650, May 2004. (Most requested article of the Journal).
Aggelis G., Gritzalis S., Lambrinoudakis C., “Mechanisms for Controlling Access in the Global Grid Environment”, Internet Research (indexed in ISI/SCI-E), Vol. 14, No. 5, pp. 347-352, Emerald, 2004.
Gritzalis D., Lambrinoudakis C., “A Security Architecture for Interconnecting Health Information Systems”, International Journal of Medical Informatics (indexed in ISI/SCI-E), Vol. 73, Issue 3, pp. 305-309, Elsevier, 2004.
S.K. Katsikas, S.D. Likothanassis, A.K. Leros, V.C. Moussas, “An adaptive algorithm for multiple source detection”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.