Drogkaris P., Lambrinoudakis C., Gritzalis S., «Introducing Federated Identities to One-Stop-Shop e-Government Environments: The Greek Case», Proceedings of the eChallenges 2009 Conference, P. Cunningham (Ed.), Istanbul, Turkey, October 2009.
Geneiatakis D., Lambrinoudakis C., Gritzalis S., «A Hierarchical Model for Cross-Domain Communication of Health-Care Units», Proceedings of NSS 2009 – 3rd International Conference on Network and System Security, Y. Xiang, J. Lopez, H. Wang (Eds.), IEEE Computer Society Press, Gold Coast, Australia, October 2009.
Geneiatakis D., Lambrinoudakis C., Gritzalis S., «A Hierarchical Model for Cross-Domain Communication of Health-Care Units», Proceedings of NSS 2009 – 3rd International Conference on Network and System Security, Y. Xiang, J. Lopez, H. Wang (Eds.), IEEE Computer Society Press, Gold Coast, Australia, October 2009.
Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., «Information Systems Security Management: A review and a classification of the ISO standards», Proceedings of the e-Democracy 2009 – 3rd Conference on Electronic Democracy – Next Generation Society: Technological and Legal Issues, A. Sideridis (Ed.), Springer Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics […]
G. Spathoulas and S. Katsikas, “Using a fuzzy inference system to reduce false positives in intrusion detection”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-4, 2009. (Invited).
Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, SERSC http://www.sersc.org/journals/IJDRBC, 2009.
Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, SERSC http://www.sersc.org/journals/IJDRBC, 2009.
Drogkaris P., Gritzalis S., Lambrinoudakis C., «Enabling Secure Data Management in e-Government Environments: The Greek Case», Proceedings of ongoing research and projects of EGOV 09 – 8th International Conference, EGOV 2009, H. J. Scholl, M. Janssen, R. Traunmuller, M. A. Wimmer (Eds.), Trauner Verlag, Linz, Austria, September 2009.
Tsohou A., Rizomiliotis P., Lambrinoudakis C., Gritzalis S., «Security and Privacy Issues in Bipolar Disorder Research», Proceedings of the 7th International Conference on Information and Communication Technologies in Health (ICICTH), A. Hasman et al. (Eds.), INEAG, Samos, Greece, July 2009.
Geneiatakis D., Lambrinoudakis C., Kambourakis G., Kafkalas A., Ehlert S., “A First Order Logic Security Verification Model for SIP”, Proceedings of the IEEE International Conference on Communications, Communications and Information Systems Security Symposium (ICC’09-CISS), IEEE Press, Dresden, Germany, June 2009.
Geneiatakis D., Lambrinoudakis C., Kambourakis G., Kafkalas A., Ehlert S., “A First Order Logic Security Verification Model for SIP”, Proceedings of the IEEE International Conference on Communications, Communications and Information Systems Security Symposium (ICC’09-CISS), IEEE Press, Dresden, Germany, June 2009.
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009.
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009.
I. Kantzavelou and S. Katsikas, “Playing games with internal attackers repeatedly”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-6, 2009. (Invited).
T. Kostis, A. Goudosis, K. Galanis and S.K. Katsikas, “Applying simulator-defined radar countermeasure systems techniques to computer network security systems”, in Proceedings, European Modelling and Simulation Conference, Athens, Greece, pp. 130-135, 2009.
G. Spathoulas and S. Katsikas, “Using a fuzzy inference system to reduce false positives in intrusion detection”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-4, 2009. (Invited).
Christoforos Ntantogian, Christos Xenakis, “One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks,” Wireless Personal Communications, Springer, Vol. 48, Issue 4, pp: 569-584, March 2009.
Christoforos Ntantogian, Christos Xenakis, “One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks,” Wireless Personal Communications, Springer, Vol. 48, Issue 4, pp: 569-584, March 2009.
T.G. Kostis, K. Galanis and S.K. Katsikas, “Angular glint effects generation for false naval target verisimility requirements”, Measurement Science and Technology, vol. 20, no. 10, [Note(s): 104016.1-104016.13], 2009.
G. Aggelinos and S.K. Katsikas, “Integrating Disaster Recovery Plan Activities into the System Development Life Cycle”, in Proceedings, Mediterranean Conference of Information Systems (MCIS 2009), Athens, Greece, pp. 835-845, 2009.
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009.