Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis, “Evaluating the privacy of Android mobile applications under forensic analysis”, Computers and Security, Elsevier Science, (Accepted for Publication)
Christos Xenakis, Christoforos Ntantogian, “An Advanced Persistent Threat in 3G Networks: Attacking the Home Network from Roaming Networks”, Computers and Security, Elsevier Science, Vol. 40, Issue 1, pp:84-94, February 2014
Foivos Demertzis, Christos Xenakis, “SOMA-E: Self-Organised Mesh Authentication Extended,” Mathematical and Computer Modeling, Elsevier Science, Vol. 57, Issue 7-8, pp: 1606 – 1616, April 2013.
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Obscuring Users’ Identity in Next Generation Networks”, Computer Networks Journal (indexed in ISI/SCI-E), Elsevier (submitted).
Vrakas N., Lambrinoudakis C., “An Intrusion Detection and Prevention System for IMS and VoIP Services”, International Journal of Information Security (indexed in ISI/SCI-E), Springer (to appear).
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments”, IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), IEEE Press, 2012 (to appear).
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis, “Reducing False Synchronizations in 3G-WLAN Integrated Networks”, IEEE Transactions on Wireless Communications , Vol. 10, No. 11, pp: 3765-3773, Nov. 2011.
Kontoudis D., Fouliras P., Lambrinoudakis C., “A Survey of Network Virtualization Environment Modeling», International Journal of Network Management (indexed in ISI/SCI-E), Wiley (to appear).
G. Aggelinos and S.K. Katsikas, “Enhancing SSADM with Disaster Recovery Plan Activities”, Information Management and Computer Security, Vol. 19, pp. 248-261, 2011.
Lambrinoudakis C., “Evaluating and Enriching Information and Communication Technologies Compliance Frameworks with Regard to Privacy”, Information Management & Computer Security, Emerald (to appear).
Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing (indexed in ISI/SCI-E), Vol.11, Issue 2, pp. 289-302, Wiley, 2011.
Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis “A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks,” Computers & Security, Elsevier Science, Vol. 30, Issue 1, pp: 63-80, Jan. 2011.
S. Sp. Pappas, L. Economou, P. Karampelas, D.C. Karamousantas, S.K. Katsikas, G.E. Chatzarakis and P.D. Skafidas, “Electricity demand load forecasting of the Hellenic power system using an ARMA model”, Electric Power Systems Research, Vol. 80, pp. 256-264, 2010.
Tsohou Α., Kokolakis S., Lambrinoudakis C., Gritzalis S., “A Framework of ISO Security Standards to Facilitate Best Practices’ Awareness and Conformity”, Information Management & Computer Security, Vol. 18, No.5, pp. 350-365, Emerald, 2010.
G. Aggelinos and S.K. Katsikas, “Integrating Disaster Recovery Plan Activities into the System Development Life Cycle”, Journal of Information Systems Security, Vol. 6, pp. 20-35, 2010.
Kambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiouklas A., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010.
G. Spathoulas and S.K. Katsikas, “Reducing False Positives in Intrusion Detection Systems”, Computers & Security, Vol. 29, pp. 35-44, 2010.
S. Sp. Pappas, L. Economou, P. Karampelas, D.C. Karamousantas, S.K. Katsikas, G.E. Chatzarakis and P.D. Skafidas, “Electricity demand load forecasting of the Hellenic power system using an ARMA model”, Electric Power Systems Research, Vol. 80, pp. 256-264, 2010.
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis “A Generic Mechanism for Efficient Authentication in B3G Networks,” Computers & Security, Elsevier Science, Vol. 29, Issue 4, pp: 460-475, June 2010.
Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing, Special Issue on Network Security and Digital Forensics in Next Generation Communications, doi: 10.1002/wcm.1019, Wiley Interscience, 2010.
Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Privacy and Identity Management, Vol. xi, No. 1, pp.32-37, also in Novatica journal, Issue 202 (www.ati.es/novatica), 2010.
G. Spathoulas and S.K. Katsikas, “Reducing False Positives in Intrusion Detection Systems”, Computers & Security, Vol. 29, pp. 35-44, 2010.
Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., Ehlert S., Fiedler J., «High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation», International Journal of Disaster Recovery and Business Continuity, SERSC http://www.sersc.org/journals/IJDRBC, 2009.
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009.
Christoforos Ntantogian, Christos Xenakis, “One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks,” Wireless Personal Communications, Springer, Vol. 48, Issue 4, pp: 569-584, March 2009.
T.G. Kostis, K. Galanis and S.K. Katsikas, “Angular glint effects generation for false naval target verisimility requirements”, Measurement Science and Technology, vol. 20, no. 10, [Note(s): 104016.1-104016.13], 2009.
Christos Xenakis, Christoforos Ntantogian, Ioannis Stavrakakis, “A network-assisted mobile VPN for securing users data in UMTS,” Computer Communications, Elsevier Science, vol. 31, No. 14, pp. 3315-3327 September 2008.
Geneiatakis D., Lambrinoudakis C., Kambourakis, G., “An Ontology Based-Policy for Deploying Secure SIP- based VoIP Services”, accepted for publication Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2008.
Christos Xenakis, “Security Measures and Weaknesses of the GPRS Security Architecture,” International Journal of Network Security, Vol.6, No.2, pp:158–169, Mar. 2008.
S. Pappas, L. Economou, P. Karampelas, S. K. Katsikas, P. Liatsis, “Modeling of the grounding resistance variation using ARMA models”, Simulation Modelling Practice and Theory, Vol. 16, no. 5, σελ. 560-570, 2008.
Geneiatakis D., Lambrinoudakis C., “A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment”, Telecommunication Systems (indexed in ISI/SCI-E), Vol.36, No.4, pp. 153-159, Springer, 2007.
S. Gritzalis, A.N. Yannacopoulos, C. Lambrinoudakis, P. Hatzopoulos, S.K. Katsikas, “A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments”, International Journal of Information Security, Vol. 6, σελ. 197-211, 2007.
Christos Xenakis, Christoforos Ntantogian, “Security Architectures for B3G Mobile Networks”, Telecommunication Systems,” Springer, Vol.35, pp: 123-139, Aug. 2007.
Geneiatakis D., Lambrinoudakis C., “An Ontology Description for SIP Security Flaws”, Computer Communications (indexed in ISI/SCI-E), Vol. 30, Issue 6, pp. 1367-1374, Elsevier, 2007.
Geneiatakis D., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, submitted to Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2007.
S. Gritzalis, P. Belsis and S.K. Katsikas, “Interconnecting Autonomous Medical Domains: Security, Interoperability and Semantic-Driven Perspectives for Electronic Health Records”, IEEE Engineering in Medicine and Biology Magazine, Vol. 26, Issue 5, σελ. 23-28, 2007.
P. Belsis, S. Gritzalis, S.K.Katsikas, “Partial and Fuzzy Constraint satisfaction to Support coalition formation”, Electronic Notes in Theoretical Computer Science, Vol. 179, σελ. 75-86, 2007.
Gritzalis S., Yannacopoulos A., Lambrinoudakis C., Hatzopoulos P., Katsikas S., “A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments”, International Journal of Information Security, Vol.6, No.4, pp. 197-211, Springer, 2007.
Geneiatakis D., Kambourakis G., Lambrinoudakis C., Dagiuklas A., Gritzalis S., “A Framework for Protecting a SIP-based Infrastructure against Malformed Message Attacks”, Computer Networks Journal (indexed in ISI/SCI-E), Vol. 51, Issue 10, pp. 2580-2593, Elsevier, 2007.
Geneiatakis D., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, submitted to Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2007.
Christos Xenakis, “Malicious actions against the GPRS technology,” Computer Virology, Springer, Vol. 2, No. 2, Nov. 2006, pp. 121-133.
Christos Xenakis, Nikos Laoutaris, Lazaros Merakos, Ioannis Stavrakakis, “A Generic Characterization of the Overheads Imposed by IPsec and Associated Cryptographic Algorithms,” Computer Networks, Elsevier Science, Vol. 50, No. 17, Dec 2006, pp. 3225-3241.
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Katsikas S., “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, October 2006.
S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis and S. Katsikas, “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools and Applications (eJETA), http://www.ejeta.org, Vol. 2, Issue 1, 2006.
S.K. Katsikas, J.-P. Burguignon, A. Hyland, N. Ryan, M. Breen, K. Pukelis, C. Miceli, I. Jedlickova, Z. Dika, P. Cardew, “Implementing Learning Outcomes in Eight European Universities: Experiences and challenges”, The Quality of Higher Education, 2006.
S.S. Pappas, A.K. Leros and S.K. Katsikas, “Joint Order and Parameter Estimation of Multivariate Autoregressive Models Using Multi – Model Partitioning Theory”, Digital Signal Processing, Vol. 16, Issue 6, σελ. 782-795, 2006.
Lekkas D., Lambrinoudakis C., “Outsourcing Digital Signatures: A solution to key management burden”, Information Management and Computer Security Journal, Special issue on Security Issues of IT Outsourcing, Vol. 14, No. 5, pp. 436-449, Emerald, 2006.
K. Lamprou, S. Gritzalis and S.K. Katsikas, “Security Architectures for Online Distance Learning and Training: A state-of-the-art review”, Themes in Education, Vol. 7, no 1, σελ. 63-77, 2006.
Geneiatakis D., Dagiouklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., «Survey of Security Vulnerabilities in Session Initiation Protocol», IEEE Communications Surveys and Tutorials, Vol.8, No.3, pp. 68-81, IEEE Press, 3rd Quarter 2006.
Maglogiannis I., Zaropoulos E., Platis A., Lambrinoudakis C., “Risk analysis of a patient monitoring system using Bayesian Network modeling”, Journal of Biomedical Informatics (indexed in ISI/SCI-E), Vol. 39, No. 6, pp. 637-647, Elsevier, 2006.
Dritsas S., Gritzalis D., Lambrinoudakis C., “Protecting privacy and anonymity in pervasive computing: trends and perspectives”, Telematics and Informatics Journal, Special Issue on Privacy and Anonymity in the Global Village, Vol. 23, No. 3, pp. 196-210, Elsevier, 2006.
D.L. Delivasilis and S.K. Katsikas, “Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices”, International Journal of Network Security, Vol. 3, σελ. 44-50, 2006.
Christos Xenakis, Lazaros Merakos, “Alternative Schemes for Dynamic Secure VPN Deployment over UMTS,” Wireless Personal Communications, Springer, Vol. 36, No. 2, Jan 2006, pp. 163-194.
C. Lambrinoudakis, S. Gritzalis, P. Hatzopoulos, A.N. Yannacopoulos, and S.K. Katsikas, “A Formal Model for Pricing Information Systems Insurance Contracts”, Computer Standards and Interfaces, Vol. 27, σελ. 521-532, 2005.
T. Balopoulos, S. Gritzalis, S.K. Katsikas, “Specifying privacy-preserving protocols in Typed MSR”, Computer Standards and Interfaces, Vol. 27, σελ. 501-512, 2005.
V. Moussas, S.K. Katsikas and D.G. Lainiotis, “Adaptive estimation of FCG using non-linear state space models”, Stochastic Analysis and Applications, Vol. 23, No. 1, σελ. 1-18, 2005.
Kokolakis S., Lambrinoudakis C., “ICT Security Standards for Healthcare Applications”, Upgrade electronic journal (www.upgrade-cepis.org), Special Issue: Standardization for ICT Security, Vol. 6, No. 4, also in Novatica journal, Issue 176 (www.ati.es/novatica), 2005.
Gritzalis S., Lambrinoudakis C., Lekkas D., Deftereos S., “Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments”, IEEE Transactions on Information Technology in BioMedicine (indexed in ISI/SCI-E), Vol. 9, No. 3, pp. 413-423, IEEE Press, 2005.
Lambrinoudakis C., Gritzalis S., Hatzopoulos P., Yannacopoulos A., Katsikas S., “A formal model for pricing information systems insurance contracts”, Computer Standards and Interfaces (indexed in ISI/SCI-E), Vol. 7, No. 5, pp. 521-532, Elsevier, 2005.
S.K. Katsikas, J. Lopez and G. Pernul, “Trust, Privacy and Security in Digital Business”, Computer Science, Systems and Engineering, Vol. 6, σελ. 391-399, 2005.
Christos Xenakis, Lazaros Merakos, “Security in third Generation Mobile Networks,” Computer Communications, Elsevier Science, Vol. 27, No. 7, pp. 638-650, May 2004. (Most requested article of the Journal).
Aggelis G., Gritzalis S., Lambrinoudakis C., “Mechanisms for Controlling Access in the Global Grid Environment”, Internet Research (indexed in ISI/SCI-E), Vol. 14, No. 5, pp. 347-352, Emerald, 2004.
Gritzalis D., Lambrinoudakis C., “A Security Architecture for Interconnecting Health Information Systems”, International Journal of Medical Informatics (indexed in ISI/SCI-E), Vol. 73, Issue 3, pp. 305-309, Elsevier, 2004.