Christos Xenakis, “Malicious actions against the GPRS technology,” Computer Virology, Springer, Vol. 2, No. 2, Nov. 2006, pp. 121-133.
Christos Xenakis, Nikos Laoutaris, Lazaros Merakos, Ioannis Stavrakakis, “A Generic Characterization of the Overheads Imposed by IPsec and Associated Cryptographic Algorithms,” Computer Networks, Elsevier Science, Vol. 50, No. 17, Dec 2006, pp. 3225-3241.
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Katsikas S., “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, October 2006.
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Katsikas S., “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, October 2006.
S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis and S. Katsikas, “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools and Applications (eJETA), http://www.ejeta.org, Vol. 2, Issue 1, 2006.
Geneiatakis D., Dagiouklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., «Survey of Security Vulnerabilities in Session Initiation Protocol», IEEE Communications Surveys and Tutorials, Vol.8, No.3, pp. 68-81, IEEE Press, 3rd Quarter 2006.
P. Belsis, S. Gritzalis, S. Katsikas, “Optimized Multi-domain Secure Interoperation using Soft Constraints”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 78-85, 2006.
S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis and S. Katsikas, “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools and Applications (eJETA), http://www.ejeta.org, Vol. 2, Issue 1, 2006.
Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study” Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), M. Logothetis et al. (Eds), Patras, Greece, July 2006.
Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study” Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), M. Logothetis et al. (Eds), Patras, Greece, July 2006.
Christoforos Ntantogian, Christos Xenakis, Lazaros Merakos, “An enhanced EAP-SIM authentication scheme for securing WLAN,” Proc. 15th IST Mobile & Wireless Communications, Mykonos, Greece, June 2006.
Z. Le, J. Ford, V. Karkaletsis, V. Spiliopoulos, S. Katsikas, and F. Makedon, “Secure Group Collaboration in an Open Healthcare Environment”, in Proceedings of the Fourth Annual International Conference on Information Communication Technologies in Health (ICICTH 2006), Samos, Greece, 2006.
Christoforos Ntantogian, Christos Xenakis, Lazaros Merakos, “An enhanced EAP-SIM authentication scheme for securing WLAN,” Proc. 15th IST Mobile & Wireless Communications, Mykonos, Greece, June 2006.
Gymnopoulos L., Karyda M., Balopoulos T., Dritsas S., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Developing a Security Patterns Repository for Secure Applications Design”, Proceedings of the ECIW 2006 5th European Conference on Information Warfare and Security, D. Remenyi et al. (Eds.), pp. 51-60, published by ACL Academic Conferences Limited, Helsinki, Finland, June 2006.
G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Source code author identification based on N-gram author profiles”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, June 2006, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 508-515, 2006.
Kambourakis G., Geneiatakis D., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “Towards effective SIP load Balancing: The SNOCER approach”, Proceedings of the Third Annual VoIP Security Workshop, in cooperation with ACM SIGCOMM, D. Sisalem et al. (Eds), ACM Press, Berlin, Germany, June 2006.
S.K. Katsikas, J.-P. Burguignon, A. Hyland, N. Ryan, M. Breen, K. Pukelis, C. Miceli, I. Jedlickova, Z. Dika, P. Cardew, “Implementing Learning Outcomes in Eight European Universities: Experiences and challenges”, The Quality of Higher Education, 2006.
S.S. Pappas, A.K. Leros and S.K. Katsikas, “Joint Order and Parameter Estimation of Multivariate Autoregressive Models Using Multi – Model Partitioning Theory”, Digital Signal Processing, Vol. 16, Issue 6, σελ. 782-795, 2006.
Lekkas D., Lambrinoudakis C., “Outsourcing Digital Signatures: A solution to key management burden”, Information Management and Computer Security Journal, Special issue on Security Issues of IT Outsourcing, Vol. 14, No. 5, pp. 436-449, Emerald, 2006.
G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Effective Identification of Source Code Authors Using Byte-Level Information”, in Proceedings of the 28th International Conference on Software Engineering ICSE 2006 – Emerging Results Track, May 2006, Shanghai, China, ACM Press, σελ. 893-896, 2006.
Christos Xenakis, Lazaros Merakos, “Vulnerabilities and Possible Attacks against the GPRS Backbone Network,” In Proc. International Workshop on Critical Information Infrastructures Security, (CRITIS’06), LNCS 4347, Springer, 2006, pp. 262 – 272.
P. Belsis, S. Gritzalis, S.K.Katsikas, “Partial and Fuzzy Constraint satisfaction to Support coalition formation”, in Proceedings of the STM 2006 2nd Workshop on Security and Trust Management (in conjunction with ESORICS 2006), P. Samarati, S. Etalle (Eds.), σελ. 130-141, 2006.
K. Lamprou, S. Gritzalis and S.K. Katsikas, “Security Architectures for Online Distance Learning and Training: A state-of-the-art review”, Themes in Education, Vol. 7, no 1, σελ. 63-77, 2006.
Geneiatakis D., Dagiouklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., «Survey of Security Vulnerabilities in Session Initiation Protocol», IEEE Communications Surveys and Tutorials, Vol.8, No.3, pp. 68-81, IEEE Press, 3rd Quarter 2006.
Christos Xenakis, Nikos Loukas, Lazaros Merakos, “A Secure Mobile VPN Scheme for UMTS,” In Proc. European Wireless 2006, Athens, Greece, April 2006.
Karyda M., Balopoulos T., Dritsas S., Gymnopoulos L., Kokolakis S., Lambrinoudakis C., Gritzalis S., “An Ontology for Secure e-Government Applications”, Proceedings of the DeSeGov’06 Workshop on Dependability and Security in eGovernment (in conjunction with ARES 2006 1st International Conference on Availability, Reliability, and Security), A. Tjoa, E. Schweighofer (Eds.), pp. 1033-1037, IEEE Computer Society Press, […]
Maglogiannis I., Zaropoulos E., Platis A., Lambrinoudakis C., “Risk analysis of a patient monitoring system using Bayesian Network modeling”, Journal of Biomedical Informatics (indexed in ISI/SCI-E), Vol. 39, No. 6, pp. 637-647, Elsevier, 2006.
T. Balopoulos, L. Gymnopoulos, M. Karyda, S. Kokolakis, S. Gritzalis, S.K. Katsikas, “A Framework for exploiting security expertise in application development”, in Proceedings of TRUSTBUS 2006, Copenhagen, Denmark, σελ. 62-70, 2006.
Dritsas S., Gritzalis D., Lambrinoudakis C., “Protecting privacy and anonymity in pervasive computing: trends and perspectives”, Telematics and Informatics Journal, Special Issue on Privacy and Anonymity in the Global Village, Vol. 23, No. 3, pp. 196-210, Elsevier, 2006.
D.L. Delivasilis and S.K. Katsikas, “Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices”, International Journal of Network Security, Vol. 3, σελ. 44-50, 2006.
Christos Xenakis, Lazaros Merakos, “Alternative Schemes for Dynamic Secure VPN Deployment over UMTS,” Wireless Personal Communications, Springer, Vol. 36, No. 2, Jan 2006, pp. 163-194.