S.S. Pappas, A.K. Leros and S.K. Katsikas, “Joint Order and Parameter Estimation of Multivariate Autoregressive Models Using Multi – Model Partitioning Theory”, Digital Signal Processing, Vol. 16, Issue 6, σελ. 782-795, 2006.
Lekkas D., Lambrinoudakis C., “Outsourcing Digital Signatures: A solution to key management burden”, Information Management and Computer Security Journal, Special issue on Security Issues of IT Outsourcing, Vol. 14, No. 5, pp. 436-449, Emerald, 2006.
G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Effective Identification of Source Code Authors Using Byte-Level Information”, in Proceedings of the 28th International Conference on Software Engineering ICSE 2006 – Emerging Results Track, May 2006, Shanghai, China, ACM Press, σελ. 893-896, 2006.
Christos Xenakis, Lazaros Merakos, “Vulnerabilities and Possible Attacks against the GPRS Backbone Network,” In Proc. International Workshop on Critical Information Infrastructures Security, (CRITIS’06), LNCS 4347, Springer, 2006, pp. 262 – 272.
P. Belsis, S. Gritzalis, S.K.Katsikas, “Partial and Fuzzy Constraint satisfaction to Support coalition formation”, in Proceedings of the STM 2006 2nd Workshop on Security and Trust Management (in conjunction with ESORICS 2006), P. Samarati, S. Etalle (Eds.), σελ. 130-141, 2006.
K. Lamprou, S. Gritzalis and S.K. Katsikas, “Security Architectures for Online Distance Learning and Training: A state-of-the-art review”, Themes in Education, Vol. 7, no 1, σελ. 63-77, 2006.
Geneiatakis D., Dagiouklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., «Survey of Security Vulnerabilities in Session Initiation Protocol», IEEE Communications Surveys and Tutorials, Vol.8, No.3, pp. 68-81, IEEE Press, 3rd Quarter 2006.