G. Spathoulas and S.K. Katsikas, “Reducing False Positives in Intrusion Detection Systems”, Computers & Security, Vol. 29, pp. 35-44, 2010.
S. Sp. Pappas, L. Economou, P. Karampelas, D.C. Karamousantas, S.K. Katsikas, G.E. Chatzarakis and P.D. Skafidas, “Electricity demand load forecasting of the Hellenic power system using an ARMA model”, Electric Power Systems Research, Vol. 80, pp. 256-264, 2010.
Tsohou Α., Kokolakis S., Lambrinoudakis C., Gritzalis S., “A Framework of ISO Security Standards to Facilitate Best Practices’ Awareness and Conformity”, Information Management & Computer Security, Vol. 18, No.5, pp. 350-365, Emerald, 2010.
G. Aggelinos and S.K. Katsikas, “Integrating Disaster Recovery Plan Activities into the System Development Life Cycle”, Journal of Information Systems Security, Vol. 6, pp. 20-35, 2010.
Kambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiouklas A., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010.
Kambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiouklas A., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010.
Drogkaris P., Gritzalis S., Lambrinoudakis C., “Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era”, Proceedings of the EGOVIS’10 International Conference on Electronic Government and the Information Systems Perspective, K. N. Andersedn, et al. (Eds.), pp. 142 -149, Springer LNCS 6267, Bilbao, Spain, September 2010.
G. Spathoulas and S.K. Katsikas, “Reducing False Positives in Intrusion Detection Systems”, Computers & Security, Vol. 29, pp. 35-44, 2010.
Vrakas Ν., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection” , Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’10), pp. 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.
Vrakas Ν., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection” , Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’10), pp. 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.
S. Sp. Pappas, L. Economou, P. Karampelas, D.C. Karamousantas, S.K. Katsikas, G.E. Chatzarakis and P.D. Skafidas, “Electricity demand load forecasting of the Hellenic power system using an ARMA model”, Electric Power Systems Research, Vol. 80, pp. 256-264, 2010.
Foivos Demertzis, Christos Xenakis, “SOMA: Self-Organized Mesh Authentication,” In Proc. 7th European Workshop on Public Key Services, Applications and Infrastructures (ΕuroPKI/10), Athens, Greece, Sept. 2010.
Nikos Vavoulas, Christos Xenakis, “A Risk Analysis Method for Deliberate Threats,” In Proc. 5th International Workshop on Critical Information Infrastructures Security, (CRITIS 2010), Athens, Greece, Sept. 2010.
Foivos Demertzis, Christos Xenakis, “SOMA: Self-Organized Mesh Authentication,” In Proc. 7th European Workshop on Public Key Services, Applications and Infrastructures (ΕuroPKI/10), Athens, Greece, Sept. 2010.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis, «A Novel Intrusion Detection System for MANETs,» In Proc. International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece, July 2010.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis, «A Novel Intrusion Detection System for MANETs,» In Proc. International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece, July 2010.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis “A Generic Mechanism for Efficient Authentication in B3G Networks,” Computers & Security, Elsevier Science, Vol. 29, Issue 4, pp: 460-475, June 2010.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis “A Generic Mechanism for Efficient Authentication in B3G Networks,” Computers & Security, Elsevier Science, Vol. 29, Issue 4, pp: 460-475, June 2010.
Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing, Special Issue on Network Security and Digital Forensics in Next Generation Communications, doi: 10.1002/wcm.1019, Wiley Interscience, 2010.
Vrakas Ν., Kalloniatis C., Tsohou A., Lambrinoudakis C., “Privacy Requirements Engineering for Trustworthy e-government Services”, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST’10), pp. 298-307, Springer LNCS 6101, Berlin, Germany, June 2010.
Vrakas Ν., Kalloniatis C., Tsohou A., Lambrinoudakis C., “Privacy Requirements Engineering for Trustworthy e-government Services”, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST’10), pp. 298-307, Springer LNCS 6101, Berlin, Germany, June 2010.
Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Unifying ISO Security Standards Practices into a Single Security Framework”, Proceedings of the 12th Annual IFIP Workshop on Information Security Management (South African Information Security Multi-Conference), pp. 188-203, Port Elizabeth, South Africa, May 2010.
Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Privacy and Identity Management, Vol. xi, No. 1, pp.32-37, also in Novatica journal, Issue 202 (www.ati.es/novatica), 2010.
G. Spathoulas and S.K. Katsikas, “Reducing False Positives in Intrusion Detection Systems”, Computers & Security, Vol. 29, pp. 35-44, 2010.