Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, “The weakest link on the network: exploiting ADSL routers to perform cyber-attacks”, 13th IEEE International Symposium on Signal Processing and Information Technology, (ISSPIT 2013), Athens, Greece, December 2013
Pitropakis N., Darra E., Vrakas N., Lambrinoudakis C., “It’s all in the Cloud: Reviewing Cloud Security “, Proceedings of the 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), pp. 355-362, IEEE Xplore, Vietri sul Mare, Italy, December 2013.
Haralampos Petrou, Christoforos Ntantogian, Christos Xenakis, “A better time approximation scheme for e-passports”, In Proc. of 10th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2013), Prague, Czech Republic, August 2013.
Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis, “Discovering authentication credentials in volatile memory of Android mobile devices”, In Proc. 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013), Athens, Greece, April 2013.
Pitropakis N., Lambrinoudakis C., Geneiatakis D., Gritzalis D., «A Practical Steganographic Approach for Matroska based High Quality Video files», 7th International Symposium on Security and Multimodality in Pervasive Environment (SMPE-2013), IEEE Computer Society Press Barcelona, Spain, March 2013.
Christoforos Ntantogian, Dimitris Gkikakis, Christos Xenakis, “PRIPAY: A Privacy Preserving Architecture for Secure Micropayments”, ICSNC 2012, Lisbon, Portugal, Nov 2012
Lalas E., Papathanasiou A., Lambrinoudakis C., «Privacy and Traceability in Social Networking Sites», Proceedings of the 16th Panhellenic Conference on Informatics (PCI 2012), pp. 127-132, IEEE Xplore, Piraeus, Greece, October 2012.
Dimitris Tsolkas, Nikos Passas, Christos Xenakis, Vassilis Papataxiarhis, Vassileios Tsetsos, “Busfinder: a personalized multimodal transportation guide with dynamic routing,” In Proc. 16th Panhellenic Conference on Informatics (PCI 2012), Piraeus, Greece, October 2012.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks”, International Information Security and Privacy Conference (IFIP SEC2012), Heraklion, Crete, Greece, June 2012
G. Aggelinos and S.K. Katsikas, “Disaster Recovery Analysis and Management Method (DRAMM): An IT Management tool”, in Proceedings, PCI 2012, Piraeus, Greece, 2012.
Christoforos Panos, Platon Kotzias, Christos Xenakis, Ioannis Stavrakakis, » Securing the 802.11 MAC in MANETs: A Specification-based Intrusion Detection Engine,» In Proc. IEEE/IFIP, 9th International Conference on Wireless On-demand Network Systems and Services (WONS 2012), Courmayeur, Italy, January 2012.
Vrakas Ν., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection” , Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’10), pp. 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis, «An Evaluation of Anomaly-based Intrusion Detection Engines for Mobile Ad Hoc Networks,» In Proc. 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse France, August 2011.
Eleni Darra, Christoforos Ntantogian, Christos Xenakis, Sokratis Katsikas, «A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks,» In Proc. 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse France, August 2011.
(3) Agudo I., Nuñez D., Giammatteo G., Rizomiliotis P., Lambrinoudakis C., «Cryptography goes to the Cloud», Proceedings of the 1st International Workshop on Security & Trust for Applications in Virtualised Environments (STAVE 2011), pp. 190-197, Springer, Loutraki, Greece, 2011.
Drogkaris P., Gritzalis S., Lambrinoudakis C., “Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era”, Proceedings of the EGOVIS’10 International Conference on Electronic Government and the Information Systems Perspective, K. N. Andersedn, et al. (Eds.), pp. 142 -149, Springer LNCS 6267, Bilbao, Spain, September 2010.
Vrakas Ν., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection” , Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’10), pp. 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.
Nikos Vavoulas, Christos Xenakis, “A Risk Analysis Method for Deliberate Threats,” In Proc. 5th International Workshop on Critical Information Infrastructures Security, (CRITIS 2010), Athens, Greece, Sept. 2010.
Foivos Demertzis, Christos Xenakis, “SOMA: Self-Organized Mesh Authentication,” In Proc. 7th European Workshop on Public Key Services, Applications and Infrastructures (ΕuroPKI/10), Athens, Greece, Sept. 2010.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis, «A Novel Intrusion Detection System for MANETs,» In Proc. International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece, July 2010.
Vrakas Ν., Kalloniatis C., Tsohou A., Lambrinoudakis C., “Privacy Requirements Engineering for Trustworthy e-government Services”, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST’10), pp. 298-307, Springer LNCS 6101, Berlin, Germany, June 2010.
Vrakas Ν., Kalloniatis C., Tsohou A., Lambrinoudakis C., “Privacy Requirements Engineering for Trustworthy e-government Services”, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST’10), pp. 298-307, Springer LNCS 6101, Berlin, Germany, June 2010.
Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Unifying ISO Security Standards Practices into a Single Security Framework”, Proceedings of the 12th Annual IFIP Workshop on Information Security Management (South African Information Security Multi-Conference), pp. 188-203, Port Elizabeth, South Africa, May 2010.
Drogkaris P., Lambrinoudakis C., Gritzalis S., «Introducing Federated Identities to One-Stop-Shop e-Government Environments: The Greek Case», Proceedings of the eChallenges 2009 Conference, P. Cunningham (Ed.), Istanbul, Turkey, October 2009.
Geneiatakis D., Lambrinoudakis C., Gritzalis S., «A Hierarchical Model for Cross-Domain Communication of Health-Care Units», Proceedings of NSS 2009 – 3rd International Conference on Network and System Security, Y. Xiang, J. Lopez, H. Wang (Eds.), IEEE Computer Society Press, Gold Coast, Australia, October 2009.
Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., «Information Systems Security Management: A review and a classification of the ISO standards», Proceedings of the e-Democracy 2009 – 3rd Conference on Electronic Democracy – Next Generation Society: Technological and Legal Issues, A. Sideridis (Ed.), Springer Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics […]
G. Spathoulas and S. Katsikas, “Using a fuzzy inference system to reduce false positives in intrusion detection”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-4, 2009. (Invited).
Drogkaris P., Gritzalis S., Lambrinoudakis C., «Enabling Secure Data Management in e-Government Environments: The Greek Case», Proceedings of ongoing research and projects of EGOV 09 – 8th International Conference, EGOV 2009, H. J. Scholl, M. Janssen, R. Traunmuller, M. A. Wimmer (Eds.), Trauner Verlag, Linz, Austria, September 2009.
Tsohou A., Rizomiliotis P., Lambrinoudakis C., Gritzalis S., «Security and Privacy Issues in Bipolar Disorder Research», Proceedings of the 7th International Conference on Information and Communication Technologies in Health (ICICTH), A. Hasman et al. (Eds.), INEAG, Samos, Greece, July 2009.
Geneiatakis D., Lambrinoudakis C., Kambourakis G., Kafkalas A., Ehlert S., “A First Order Logic Security Verification Model for SIP”, Proceedings of the IEEE International Conference on Communications, Communications and Information Systems Security Symposium (ICC’09-CISS), IEEE Press, Dresden, Germany, June 2009.
I. Kantzavelou and S. Katsikas, “Playing games with internal attackers repeatedly”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-6, 2009. (Invited).
T. Kostis, A. Goudosis, K. Galanis and S.K. Katsikas, “Applying simulator-defined radar countermeasure systems techniques to computer network security systems”, in Proceedings, European Modelling and Simulation Conference, Athens, Greece, pp. 130-135, 2009.
G. Aggelinos and S.K. Katsikas, “Integrating Disaster Recovery Plan Activities into the System Development Life Cycle”, in Proceedings, Mediterranean Conference of Information Systems (MCIS 2009), Athens, Greece, pp. 835-845, 2009.
Christos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis “A Qualitative Risk Analysis for the GPRS Technology “, In Proc. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-08), Shanghai, China, December 2008.
A.N. Yannacopoulos, C. Lambrinoudakis, S. Gritzalis, S.Z. Xanthopoulos, S.K. Katsikas, “Modeling privacy insurance contracts and their utilization in risk management for ICT firms”, in Proceedings, Malaga, Spain, ESORICS 2008.
Yiannakopoulos A., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., Katsikas S., “Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms”, Proceedings of the 13th European Symposium on Research in Computer Security – ESORICS 2008, Jajodia S., Lopez J. (Eds), pp. 207-222, Springer LNCS 5283, Malaga, Spain, October 2008.
I. Kantzavelou, S. Katsikas, “A generic intrusion detection game model in IT security”, in Proceedings, TrustBus 2008, Regensburg, Germany, σελ. 151-162, 2008.
Drogkaris P., Geneiatakis D., Lambrinoudakis C., Gritzalis S., “Towards an Enhanced Authentication Framework in eGovernment: The Greek case”, EGOV’08 – 7th International Conference on Electronic Government, M. Wimmer et al. (Eds.), Trauner Proceedings (Proceedings on ongoing research, projects, and general development issues), Turin, Italy, September 2008.
Geneiatakis D., Kambourakis G., Lambrinoudakis C., “A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony”, Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’08), pp. 59-68, Springer LNCS 5185, Turin, Italy, September 2008.
E. Michailidis, S.K. Katsikas, E. Georgopoulos, “Intrusion detection using evolutionary neural networks”, in Proceedings, PCI , Samos, Greece, 2008.
T.G. Kostis, K.G. Galanis, S.K. Katsikas, “Simulator implementation of an IF-ISAR system for studies in target glint”, in Proceedings, PCI Samos, Greece, 2008.
S.S. Pappas, N. Harkiolakis, P. Karampelas, L. Economou, S.K. Katsikas, “A new algorithm for on-line multivariate ARMA identification using multimodel partitioning theory”, in Proceedings, PCI, Samos, Greece, 2008.
Dimitris Ztoupis, Kyriakos Zarifis, Christos Xenakis, Ioannis Stavrakakis “Towards a Security Framework for an Established Autonomous Network “, In Proc. IEEE International Symposium on Wireless Pervasive Computing, Santorini, Greece, May 2008.
Geneiatakis D., Lambrinoudakis C., “A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks”, Proceedings of the IMS and Mobile Multimedia Workshop, in conjunction with the 4th International Mobile Multimedia Communications Conference – MobiMedia 2008, ACM International Conference Proceedings, Oulu, Finland, 2008.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Reducing the User Authentication Cost in Next Generation Networks “, In Proc. 5th IEEE/IFIP Annual Conference on Wireless On demand Network Systems and Services (WONS 2008), Garmisch-Partenkirchen, Germany, Jan 2008.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Efficient Authentication for Users Autonomy in Next Generation All-IP Networks”, In Proc. 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (BIONETICS 2007), Budapest, Hungary, Dec 2007.
Christoforos Ntantogian, Christos Xenakis, “Reducing Authentication Traffic in 3G-WLAN Integrated Networks”, In Proc. 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2007), Athens, Greece, Sept 2007.
Christoforos Ntantogian, Christos Xenakis, “A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks”, In Proc. 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2007), Athens, Greece, Sept 2007.
Christoforos Ntantogian, Christos Xenakis, “A Security Binding for Efficient Authentication in 3G-WLAN Heterogeneous Networks”, PhD poster presented in the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 2007.
Kyriakos Zarifis, Dimitris Ztoupis, Christos Xenakis, “Security Issues in an Established Autonomous Wireless Network”, PhD poster presented in the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 2007.
Kyriakos Zarifis, Dimitris Ztoupis, Christos Xenakis, “Security Issues in an Established Autonomous Wireless Network”, PhD poster presented in the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 2007.
P. Belsis, S. Gritzalis, S. Katsikas, “Optimized Multi-domain Secure Interoperation using Soft Constraints”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 78-85, 2006.
Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study” Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), M. Logothetis et al. (Eds), Patras, Greece, July 2006.
Christoforos Ntantogian, Christos Xenakis, Lazaros Merakos, “An enhanced EAP-SIM authentication scheme for securing WLAN,” Proc. 15th IST Mobile & Wireless Communications, Mykonos, Greece, June 2006.
Z. Le, J. Ford, V. Karkaletsis, V. Spiliopoulos, S. Katsikas, and F. Makedon, “Secure Group Collaboration in an Open Healthcare Environment”, in Proceedings of the Fourth Annual International Conference on Information Communication Technologies in Health (ICICTH 2006), Samos, Greece, 2006.
Gymnopoulos L., Karyda M., Balopoulos T., Dritsas S., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Developing a Security Patterns Repository for Secure Applications Design”, Proceedings of the ECIW 2006 5th European Conference on Information Warfare and Security, D. Remenyi et al. (Eds.), pp. 51-60, published by ACL Academic Conferences Limited, Helsinki, Finland, June 2006.
G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Source code author identification based on N-gram author profiles”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, June 2006, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 508-515, 2006.
Kambourakis G., Geneiatakis D., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “Towards effective SIP load Balancing: The SNOCER approach”, Proceedings of the Third Annual VoIP Security Workshop, in cooperation with ACM SIGCOMM, D. Sisalem et al. (Eds), ACM Press, Berlin, Germany, June 2006.
G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Effective Identification of Source Code Authors Using Byte-Level Information”, in Proceedings of the 28th International Conference on Software Engineering ICSE 2006 – Emerging Results Track, May 2006, Shanghai, China, ACM Press, σελ. 893-896, 2006.
Christos Xenakis, Lazaros Merakos, “Vulnerabilities and Possible Attacks against the GPRS Backbone Network,” In Proc. International Workshop on Critical Information Infrastructures Security, (CRITIS’06), LNCS 4347, Springer, 2006, pp. 262 – 272.
P. Belsis, S. Gritzalis, S.K.Katsikas, “Partial and Fuzzy Constraint satisfaction to Support coalition formation”, in Proceedings of the STM 2006 2nd Workshop on Security and Trust Management (in conjunction with ESORICS 2006), P. Samarati, S. Etalle (Eds.), σελ. 130-141, 2006.
Christos Xenakis, Nikos Loukas, Lazaros Merakos, “A Secure Mobile VPN Scheme for UMTS,” In Proc. European Wireless 2006, Athens, Greece, April 2006.
Karyda M., Balopoulos T., Dritsas S., Gymnopoulos L., Kokolakis S., Lambrinoudakis C., Gritzalis S., “An Ontology for Secure e-Government Applications”, Proceedings of the DeSeGov’06 Workshop on Dependability and Security in eGovernment (in conjunction with ARES 2006 1st International Conference on Availability, Reliability, and Security), A. Tjoa, E. Schweighofer (Eds.), pp. 1033-1037, IEEE Computer Society Press, […]
T. Balopoulos, L. Gymnopoulos, M. Karyda, S. Kokolakis, S. Gritzalis, S.K. Katsikas, “A Framework for exploiting security expertise in application development”, in Proceedings of TRUSTBUS 2006, Copenhagen, Denmark, σελ. 62-70, 2006.
S.S. Pappas, A.K. Leros, S.K. Katsikas, “Multivariate AR model order estimation with unknown process order”, in Proceedings, 10th Panhellenic Conference on Informatics, Volos, Greece, σελ. 787-797, 2005.
Katsikas S., Yannacopoulos A., Gritzalis S., Lambrinoudakis C., Hatzopoulos P., “How much should we pay for security?”, Proceedings of the IFIP WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, P. Dowland, S. Furnell, B. Thuraisingham, X. C. Wang (Eds.), pp.59-70, Vol.193, Springer, Fairfax, USA, December […]
S.K. Katsikas, A.N. Yannacopoulos, S. Gritzalis, C. Lambrinoudakis and P. Hatzopoulos, “How much should we pay for security?”, in Proceedings, IFIP 11.1/11.5 Joint Working Conference on Security Management, Integrity and Internal Control in Information Systems, Fairfax, Virginia, σελ. 59-70, Fairfax, VA, USA, 2005.
V.C. Moussas, S.D. Likothanassis, S.K. Katsikas, and A.K. Leros, “Adaptive On-Line Multiple Source Detection”, in Proceedings, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’05), Philadelphia, PA, USA, σελ. IV1029 – IV1032, 2005.
Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., “Security and Privacy issues towards ENUM protocol”, Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT’05), pp.478-483, IEEE Computer Society Press, Athens, Greece, December 2005.
T. Balopoulos, S. Gritzalis and S. Katsikas, “Specifying electronic Voting Protocols in Typed MSR”, in Proceedings of the ACM CCS 2005 Computer and Communications Security Conference – Workshop on Privacy in the Electronic Society (WPES), Alexandria, VA, USA, σελ. 35-39, 2005.
P. Belsis, S. Gritzalis and S.K. Katsikas, “A scalable security architecture enabling coalition formation between autonomous domains”, in Proceedings, 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT ’05), Athens, Greece, σελ. 560-565, 2005.
S.K. Katsikas, J. Lopez and G. Pernul, “Trust, privacy and security in e-business: Requirements and solutions”, in Proceedings, 10th Panhellenic Conference on Informatics, Volos, Greece, σελ. 548-558, 2005.
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Employing Ontologies for the Development of Security Critical Applications: The Secure e-Poll Paradigm”, Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernemnt, Funabashi M., Grzech A. (Eds.), pp.187-201, Springer, Poznan, Poland, October 2005.
Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “A Framework for Detecting Malformed Messages in SIP Networks”, Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2005), Ramakrishnan K. (Ed.), IEEE Press, Chania, Greece, September 2005.
F. Trochoutsos, S. Gritzalis, S. Katsikas, G. Haramis, “Information Systems Security Effective Guidelines for Participants”, in Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, September 2005, Athens, Greece.
Dritsas S., Mallios J., Gritzalis D., Lambrinoudakis C., “Applicability of Privacy Enhancing Technologies in Ubiquitous Computing Environments”, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005 – Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU’05, P. Georgiadis, S. Gritzalis, Y. Marias (Eds.), pp. 61-70, Diaylos Press, Santorini, Greece, […]
S.K. Katsikas, “Assuring Critical Information Infrastructure”, in Proceedings, NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, σελ. 43-55, 2005.
Geneiatakis D., Kambourakis G., Dagiuklas T., Lambrinoudakis C., Gritzalis S., “SIP Security Mechanisms: A state-of-the-art review”, Proceedings of the 5th International Network Conference (INC’2005), S. Furnell, S. Katsikas (Eds.), pp. 147-156, Samos, Greece, July 2005.
Dimitris Karteris, Christos Xenakis, Lazaros Merakos, “Context-Aware Service Provisioning in All-IP Networks”, In Proc. 13th IST Mobile & Wireless Communications, Lyon, France, June 2005.
S.K. Katsikas, “Educating health stakeholders in Health Information Systems security”, in Proceedings, EFMI STC 2005 on “Health and Medical Informatics Applications: Educational Aspects”, Athens, Greece, σελ. 29-31, 2005.
V.C. Moussas and S.K. Katsikas, “A multi-model approach to fatigue crack growth monitoring and prediction”, in Proceedings, 12th IEEE IWSSIP 2005, Chalkis, Greece, σελ. 57-61, 2005.
Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “SIP Message Tampering: The SQL code INJECTION attack”, Proceedings of the 13th IEEE International Conference on Software Telecommunications and Computer Networks (SoftCOM 2005), N. Rozic et al. (Eds.), pp. 176-181, IEEE Press, Split, Croatia, September 2005.
Lambrinoudakis C., Platis A., Leros A., “A PKI Security reliability assessment methodology”, Proceeding of the European Safety & Reliability Conference (ESREL 2005), Poland, 2005.
S.S. Pappas, A.K. Leros and S.K. Katsikas, “MV AR model order identification using partitioning theory”, in Proceedings, 12th IEEE IWSSIP 2005, Chalkis, Greece, σελ. 51-55, 2005.
S.K. Katsikas, “Doctoral Programme on Information and Communication Systems Security at the University of the Aegean”, in Proceedings, SEC2004, Toulouse, France, 2004.
T. Balopoulos, S. Gritzalis, S.K. Katsikas, “An Extension of Typed MSR for specifying Esoteric Protocols and their Dolev-Yao Intruder”, in Proceedings of the CMS’2004 IFIP TC6/TC11 International Conference on Communications and Multimedia Security, Salford, UK, σελ. 209-221, 2004.
V.C. Moussas, S.K. Katsikas, D.G. Lainiotis, “Application of partitioning algorithms to fatigue crack growth identification and improved lifetime prediction”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.
V.C. Moussas, S.K. Katsikas, D.G. Lainiotis, “Component reliability improvement using extended Kalman filters and non-linear FCG models”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.
Aggelis G., Gritzalis S., Lambrinoudakis C., “Addressing Authentication and Authorization Issues in the Grid”, Proceedings of the 4th International Network Conference (INC’2004), S. Furnell (Ed.), pp. 319-326, published by IEE & University of Plymouth, Plymouth, UK, July 2004.
Platis A., Lambrinoudakis C., Leros A., “A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions”, Proceedings of the 1st European PKI Workshop (EuroPKI’2004), S. Katsikas, S. Gritzalis, J. Lopez (Eds), pp. 149-160, Springer, Lecture Notes in Computer Science LNCS 3093, Samos, Greece, June 2004.
Deftereos S., Lambrinoudakis C., Gritzalis D., “High Level Security Policies for Health: From Theory to Practice”, Proceedings of the Electronic Health Record Security Workshop, International Congress on Medical and Care Compunetics (ICMCC), pp. 416-423, IOS Press, The Hague, Netherlands, June 2004.
S.K. Katsikas, S.D. Likothanassis, A.K. Leros, V.C. Moussas, “An adaptive algorithm for multiple source detection”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.