{"id":1004,"date":"2018-12-25T22:45:18","date_gmt":"2018-12-25T20:45:18","guid":{"rendered":"http:\/\/ssl.ds.unipi.gr\/?page_id=1004"},"modified":"2020-01-16T18:40:31","modified_gmt":"2020-01-16T16:40:31","slug":"stefanosgritzalis","status":"publish","type":"page","link":"https:\/\/laboratories.ds.unipi.gr\/ssl\/stefanosgritzalis\/","title":{"rendered":"Prof. Stefanos Gritzalis"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1004\" class=\"elementor elementor-1004\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7777debd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7777debd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b4e538d\" data-id=\"5b4e538d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-564911dd elementor-widget elementor-widget-text-editor\" data-id=\"564911dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong><a href=\"http:\/\/ssl.ds.unipi.gr\/wp-content\/uploads\/2019\/01\/Gritzalis-Stefanos.jpg\"><img decoding=\"async\" class=\"size-full wp-image-2059 alignleft\" src=\"http:\/\/ssl.ds.unipi.gr\/wp-content\/uploads\/2020\/01\/sgritz-46-1.jpg\" alt=\"\" width=\"250\" height=\"162\" \/><\/a><\/strong><\/p><p style=\"text-align: justify;\"><strong>Stefanos Gritzalis<\/strong> is a Professor of Information and Communication Systems Security, at the Lab. of Systems Security, Dept. of Digital Systems, University of Piraeus, Greece (06.2019+).<\/p><p style=\"text-align: justify;\">Previously, he was a Professor at the University of the Aegean, Greece, School of Engineering, Dept. of Information and Communication Systems Engineering, and member of the Info-Sec-Lab Laboratory of Information and Communication Systems Security (2002-2019). He was the Rector of the University of the Aegean, Greece (2014-2018), Head of the Dept. of Information and Communication Systems Engineering (2005-2009), Deputy Head of the Dept. of Information and Communication Systems Engineering (2012-2014), and Director of the Lab. of Information and Communication Systems Security (2005-2009).<\/p><p style=\"text-align: justify;\">He has acted as Special Secretary for the Hellenic Ministry for Administrative Reform and Electronic Government (2009-2012).<\/p><p style=\"text-align: justify;\">He holds a BSc in Physics, an MSc in Electronic Automation, and a PhD in Information and Communications Security from the Department of Informatics and Telecommunications, University of Athens, Greece.<\/p><p style=\"text-align: justify;\">His published scientific work includes more than 10 books, 33 book chapters (including the book \u201cDigital Privacy: Theory, Technologies and Practices\u201d, co-edited by A. Acquisti, S. Gritzalis, C. Lambrinoudakis and S. De Capitani di Vimercati, Auerbach Publications, Taylor and Francis Group). Moreover, his work has been published in 314 papers (133 in refereed journals and 181 in the proceedings of international refereed conferences and workshops). He has co-authored papers with more than 130 researchers from 25 countries during the last 28 years. The focus of his publications is on Information and Communications Security and Privacy. His most frequently cited papers have more than 6.400 citations, h-index=45, i10-index=142, as measured by Google Scholar.<\/p><p style=\"text-align: justify;\">He acts as Area Editor for the prestigious \u201cIEEE Communications Surveys and Tutorials\u201d journal (IF=22.97 for the year 2018, ranked 1st in Telecommunications and Computer Science domains). He is the Editor-in-Chief or Editor or Editorial Board member in 35 journals and a Reviewer in more than 78 scientific journals. He has acted as Guest Editor in 34 journal special issues, he has been General Chair or Program Committee Chair in more than 45 international conferences and workshops, he has served as a Program Committee member of more than 563 international conferences and workshops.<\/p><p style=\"text-align: justify;\">He has supervised 14 PhD dissertations and has acted as external evaluator for more than 50 PhD students from Germany, Italy, Spain, India, Greece, etc.<\/p><p style=\"text-align: justify;\">He has been involved in several National and EU funded R&amp;D projects receiving research and development grants of over \u20ac 5.0 million.<\/p><p style=\"text-align: justify;\">He has acted as External Reviewer for research proposals submitted to: ERC European Research Council, The Netherlands Organisation for Scientific Research, Belgian Fund for Scientific Research, Czech Science Foundation, FFG Austrian Research Promotion Agency, ETH Zurich Research Commission, Croatian Ministry of Science and Education, Slovenian Research Agency, South Africa\u2019s National Research Foundation, Qatar Foundation \u2013 Qatar National Research Fund, Cyprus Research Promotion Foundation, The University of Nicosia Research Foundation in Cyprus, Hellenic Foundation for Research and Innovation, Hellenic General Secretariat for Research and Technology, Hellenic Ministry of Economy and Development ESF Operational Programme \u201cHR Development, Education and Life Long Learning\u201d etc. Moreover, he has acted as member of the 2015 Technical Recognition Award Selection Committee for the \u201cIEEE Communications &amp; Information Security Technical Recognition Award\u201d.<\/p><p style=\"text-align: justify;\">His professional experience includes senior consulting and researcher positions in a number of private and public institutions. He was elected twice as Member of the Board (Secretary General, Treasurer) of the Greek Computer Society. He acts as member of the Hellenic Association for Information Systems AIS \u2013 Hellenic Chapter, the Association for Computing Machinery ACM, the Institute of Electrical and Electronics Engineers IEEE and the IEEE Communications Society \u201cCommunications and Information Security Technical Committee\u201d.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-de39738 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"de39738\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-89e76a2\" data-id=\"89e76a2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30716cc elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"30716cc\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-address-card\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Email: sgritz@unipi.gr<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-14a2ea0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14a2ea0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fc354d8\" data-id=\"fc354d8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27d95b9 elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"27d95b9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.linkedin.com\/in\/stefanos-gritzalis-4a99b33\/?originalSubdomain=gr\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-linkedin-square\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LinkedIn<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48f0423 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48f0423\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc902f1\" data-id=\"cc902f1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1040db2 elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"1040db2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.ds.unipi.gr\/en\/faculty\/sgritz-en\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-info\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Personal Webpage<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-36b271c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36b271c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2993705\" data-id=\"2993705\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc64c1c elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"fc64c1c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/scholar.google.com\/citations?user=E4We_ucAAAAJ&#038;hl=en\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-google\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Citations (as measured by Google Scholar)<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d2c4ebd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d2c4ebd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c9e75ed\" data-id=\"c9e75ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7629d6d elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"7629d6d\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1231\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1231\" aria-expanded=\"false\">Course<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1232\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1232\" aria-expanded=\"false\">Journals (2015 \u2013 2019)<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1233\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1233\" aria-expanded=\"false\">Conferences (2015 \u2013 2019)<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1234\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1234\" aria-expanded=\"false\">Books<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1235\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1235\" aria-expanded=\"false\">Committees - Administrative Experience<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1236\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1236\" aria-expanded=\"false\">Editor<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1231\" aria-expanded=\"false\">Course<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1231\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1231\" tabindex=\"0\" hidden=\"false\"><ul><li><a href=\"https:\/\/www.ds.unipi.gr\/en\/courses\/network-security-2\/\">Network Security<\/a><\/li><li><a href=\"https:\/\/www.ds.unipi.gr\/en\/courses\/security-policies-and-security-management-2\/\">Security Policies and Security Management<\/a><\/li><li><a href=\"https:\/\/www.ds.unipi.gr\/en\/courses\/internet-privacy-2\/\">Internet Privacy<\/a><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1232\" aria-expanded=\"false\">Journals (2015 \u2013 2019)<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1232\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1232\" tabindex=\"0\" hidden=\"hidden\"><ol><li style=\"text-align: justify;\">Giannakas F., Papasalouros A., Kambourakis G., Gritzalis S., \u201cA comprehensive Cybersecurity Learning Platform for elementary education\u201d,\u00a0<em>Information Security Journal: A Global Perspective<\/em>, Vol.28, No.3, pp.81-106, 2019, Taylor and Francis<\/li><li style=\"text-align: justify;\">Vgena A., Kitsiou A., Kalloniatis C., Kavroudakis D., Gritzalis S., \u201cTowards addressing Location Privacy Issues: New affiliations with Social and Location Attributes\u201d,\u00a0<em>Future Internet,<\/em>\u00a0Vol.11, No.234, pp.1-20, 2019, MDPI<\/li><li style=\"text-align: justify;\">Mavroeidi A., Kitsiou A., Kalloniatis C., Gritzalis S., \u201cGamification vs Privacy: Identifying and analysing the major concerns\u201d, Future Internet, Vol.11, No.3, pp.1-17, 2019, MDPI<\/li><li style=\"text-align: justify;\">Kalloniatis C., Kavroudakis D., Polydoropoulou A., Gritzalis S., \u201cDesigning Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts\u201d, International Journal of Applied Geospatial Research, Vol.10, No.1, pp.73-91, 2019, IGI Global<\/li><li style=\"text-align: justify;\">Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., \u201cEnhancing University students\u2019 privacy literacy through an educational intervention. A Greek case-study\u201d, International Journal of Electronic Governance, 2018, Inderscience Publishers<\/li><li style=\"text-align: justify;\">Sideri M., Kitsiou A., Filippopoulou A., Kalloniatis C., Gritzalis S., \u201cE-Governance in educational settings. Greek educational organizations leadership\u2019s perspectives towards social media usage for participatory decision-making\u201d, Internet Research (indexed in Thomson\u2019s ISI Web of Science), 2018, Emerald<\/li><li style=\"text-align: justify;\">Giannakas F., Kambourakis G., Papasalouros A., Gritzalis S., \u201cA critical review of 13 years of Mobile Game-based Learning\u201d, Educational Technology Research &amp; Development (indexed in Thomson\u2019s ISI Web of Science), Vol.66, pp.341-384, 2018, Springer<\/li><li style=\"text-align: justify;\">Roman R, Lopez J., Gritzalis S., \u201cEvolution and Trends in the Security of the Internet of Things\u201d, IEEE Computer (indexed in Thomson\u2019s ISI Web of Science), Vol.51, No.7, pp.16-25, 2018, IEEE<\/li><li style=\"text-align: justify;\">Pattakou A. Kalloniatis C., Gritzalis S., \u201cSecurity and Privacy under a Unified Framework: A Review\u201d, International Journal on Advances in Security, 2018, IARIA<\/li><li style=\"text-align: justify;\">Simou S., Kalloniatis C., Gritzalis S., Katos V., \u201cA Framework for Designing Cloud Forensics-enabled Services\u201d, Requirements Engineering (indexed in Thomson\u2019s ISI Web of Science), 2018, Springer<\/li><li style=\"text-align: justify;\">Islam S., Ouedraogo M., Kalloniatis C., Mouratidis H., Gritzalis S., \u201cAssurance of Security and Privacy Requirements for Cloud Deployment Model\u201d, IEEE Transactions on Cloud Computing (indexed in Thomson\u2019s ISI Web of Science), Vol.6, No.2, pp.387-400, 2018, IEEE<\/li><li style=\"text-align: justify;\">Tsekouras G., Tsimikas J., Kalloniatis C., Gritzalis S., \u201cInterpretability Constraints for Fuzzy Modelling Implemented by Constrained Particle Swarm Optimization\u201d, IEEE Transactions on Fuzzy Systems (indexed in Thomson\u2019s ISI Web of Science), Vol.26, No.4, pp.2348-2361, 2018, IEEE<\/li><li style=\"text-align: justify;\">Kalloniatis C., Pattakou A., Kavakli E., Gritzalis S., \u201cDesigning Secure and Privacy-aware Information Systems\u201d, International Journal of Secure Software Engineering, Vol.8, No.2, pp.1-25, 2017, IGI Global<\/li><li style=\"text-align: justify;\">Sideri M., Kitsiou A., Kalloniatis C., Gritzalis S., \u201cSharing secrets, revealing thoughts and feelings: Perceptions about disclosure practices and anonymity in a FB university students\u2019 community\u201d, International Journal of Electronic Governance, Vol.9, No.3-4, pp.361-384, 2017, Inderscience Publishers<\/li><li style=\"text-align: justify;\">Rahman A., Islam S., Kalloniatis C., Gritzalis S., \u201cA Risk Management Approach for a Sustainable Cloud Migration\u201d, Journal of Risk and Financial Management, Vol.10, No.4, pp.1-19, 2017, MDPI<\/li><li style=\"text-align: justify;\">Malagas K., Gritzalis S., Nikitakos N., Fragoudaki A. \u201cThe implementation of Goffee and Jones\u2019s types of organizational culture in a Greek state-owned organization that introduced new technologies\u201d, Foundations of Management journal, Vol.9, pp.225-245, 2017, De Gruyter Publishing House<\/li><li style=\"text-align: justify;\">Kollias C., Kambourakis G., Stavrou A., Gritzalis S., \u201cIntrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset\u201d, IEEE Communications Surveys and Tutorials (indexed in Thomson\u2019s ISI Web of Science), Vol.18, No.1, pp.184-208, 2016, IEEE<\/li><li style=\"text-align: justify;\">Giannakas F., Kambourakis G., Papasalouros A., Gritzalis S., \u201cSecurity Education and Awareness for K-6 going mobile\u201d, International Journal of Interactive Mobile Technologies, Vol.10, No.2, pp.41-48, 2016, \u0399\u0391\u039f\u0395<\/li><li style=\"text-align: justify;\">Malagas K., Gritzalis S., Nikitakos N., \u201cHow Institutional Factors that Emerge Within a Public Organization Affect the Use of an Innovation by its Employees: A Case Study of Olympic\u201d, T\u00c9KHNE Review of Applied Management Studies, Vol.13, No.2, pp.158-171, 2016, Elsevier<\/li><li style=\"text-align: justify;\">Anagnostopoulos M., Kambourakis G., Gritzalis S., \u201cNew facets of Mobile Botnet: Architecture and Evaluation\u201d, International Journal of Information Security (indexed in Thomson\u2019s ISI Web of Science), Vol.15, No.5., pp.455-473, 2016, Springer<\/li><li style=\"text-align: justify;\">Simou S., Kalloniatis C., Gritzalis S., Mouratidis H., \u201cA Survey on Cloud Forensics Challenges and Solutions\u201d, Security and Communication Networks (indexed in Thomson\u2019s ISI Web of Science), Vol.9, No.18, pp.6285-6134, 2016, Wiley<\/li><li style=\"text-align: justify;\">Diamantatos P., Kavallieratou E., Gritzalis S., \u201cSkeleton Hinge Distribution for Writer Identification\u201d, International Journal on Artificial Intelligence Tools (indexed in Thomson\u2019s ISI Web of Science), Vol.25, No.3, pp. 1-14, 2016, Springer<\/li><li style=\"text-align: justify;\">Drogkaris P., Gritzalis S., Kalloniatis C., Lambrinoudakis C., \u201cA Hierarchical Multitier Approach for Privacy Policies in e-Government Environments\u201d, Future Internet, Vol.7, No.4, pp.500-515, 2015, MDPI Publishers<\/li><li style=\"text-align: justify;\">Kavakli E., Kalloniatis C., Mouratidis H., Gritzalis S., \u201cPrivacy as an integral part for the implementation of cloud solutions\u201d, The Computer Journal (indexed in Thomson\u2019s ISI Web of Science), Vol.58, No.10, pp.2213-2224, 2015, Oxford University Press<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1233\" aria-expanded=\"false\">Conferences (2015 \u2013 2019)<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1233\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1233\" tabindex=\"0\" hidden=\"hidden\"><ol><li style=\"text-align: justify;\">Sideri M., Fontaras A., Gritzalis S., \u201cWhat Do We Know about our Rights to Data Protection? A Greek Case Study\u201c,\u00a0<em>Proceedings of the 8<sup>th<\/sup>\u00a0<\/em><em>International Conference on<\/em><em>\u00a0e-Democracy 2019<\/em><strong>,<\/strong>\u00a0S. Katsikas, V. Zorkadis (Eds.), December 2019, Athens, Greece, Springer Communications in Computer and Information Science<\/li><li style=\"text-align: justify;\">Simou S., Kalloniatis C., Gritzalis S., Katos V., \u201cA Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-enabled Cloud Services\u201c,\u00a0<em>Proceedings of the 8<sup>th<\/sup>\u00a0<\/em><em>International Conference on<\/em><em>\u00a0e-Democracy 2019<\/em>, S. Katsikas, V. Zorkadis (Eds.), December 2019, Athens, Greece, Springer Communications in Computer and Information Science<\/li><li style=\"text-align: justify;\">Routzouni A., Deligiannis A., Gritzalis S., \u201cA Generalized co-evaluation Model of Public Policies\u201d,\u00a0<em>Proceedings of the MCIS 2019 13<sup>th<\/sup>\u00a0Mediterranean Conference on Information Systems,<\/em>\u00a0September 2019, Naples, Italy, Springer Lecture Notes in Information Systems and Organisation<\/li><li style=\"text-align: justify;\">Rizomiliotis P., Gritzalis S., \u201cSimple Forward and Backward Private Searchable Symmetric Encryption Schemes with constant number of Roundtrips\u201c,\u00a0<em>Proceedings of the ACM\u00a0<\/em><em>CCSW 2019 11<sup>th<\/sup>\u00a0ACM Cloud Computing Security Workshop<\/em>, C. Papamanthou, R. Sion (Eds.), November 2019, London, UK, ACM Press<\/li><li style=\"text-align: justify;\">Routzouni A., Deligiannis A., Gritzalis S., \u201d An intercountry survey of participatory practices used for Open Government Partnership National Action Plan development\u201d, Proceedings of the EGOV-CeDEM-ePart, September 2019, San Benedetto Del Tronto, Italy, Springer LNCS<\/li><li style=\"text-align: justify;\">Polydropoulou A., Kalloniatis C., Kavroudakis D., Gritzalis S., \u201cSecure and Privacy-Aware Intelligent Transport Systems and their Role on Smart Cities Development\u201d, Proceedings of the Transportation Research Board TRB\u2019s 98th Meeting, January 2019, Washington, USA, TRB<\/li><li style=\"text-align: justify;\">Routzouni A., Gritzalis S., \u201cThe Civil Society as an Innovation Partner in public policy making: Co-creating the Greek National Action Plan on Open Government\u201d, Proceedings of the MCIS 2018 12th Mediterranean Conference on Information Systems, P. Kourouthanassis et al. (Eds.), September 2018, Corfu, Greece, AIS<\/li><li style=\"text-align: justify;\">Pattakou A., Mavroidi A., Diamantopoulou V., Kalloniatis C., Gritzalis S., \u201cTowards the Design of Usable Privacy by Design Methodologies\u201d, Proceedings of the ESPRE 2018 5th International Workshop on Evolving Security and Privacy Requirements Engineering, S. Faily et al. (Eds.), August 2018, Banff, Canada, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Simou S., Troumbis I., Kalloniatis C., Kavroudakis D., Gritzalis S., \u201cA Decision-Making Approach for Improving Organizations\u2019 Cloud Forensic Readiness\u201d, Proceedings of the TRUSTBUS 2018 14th International Conference on Trust, Privacy and Security in Digital Business, S. Furnell (Ed.), pp.150-164, September 2018, Regensburg, Germany, Springer LNCS<\/li><li style=\"text-align: justify;\">Diamantopoulou V., Androutsopoulou A., Gritzalis S., Charalabidis Y., \u201cAn Assessment of Privacy Preservation in Crowdsourcing Approaches: Towards GDPR Compliance\u201d, Proceedings of the IEEE RCIS 12th International Conference on Research Challenges in Information Science, B. Le Grand (Ed.), pp.1-9, May 2018, Nande, France, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Anagnostopoulos M., Kambourakis G., Gritzalis S., Yau D., \u201cNever say Never: Authoritative TLD name server-powered DNS amplification\u201d, Proceedings of the IEEE\/IFIP NOMS 2018 Network Operations and Management Symposium, Y.-T. Kim, C. Marquezan, C.-W. Yi (Eds.), pp.1-9, April 2018, Taipei, Taiwan, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., \u201cI have learned that I must think twice before: An educational intervention for enhancing students\u2019 privacy awareness in Facebook\u201d, Proceedings of the 7th International Conference on e-Democracy, S. Katsikas, A. Sideridis (Eds.), pp.79-95, December 2017, Athens, Greece, Springer CCIS Communications in Computer and Information Science Vol.792<\/li><li style=\"text-align: justify;\">Rizomiliotis P., Molla E., Gritzalis S., \u201cREX: a Searchable Symmetric Encryption Scheme Supporting Range Queries\u201d, Proceedings of the ACM CCSW 2017 9th ACM Cloud Computing Security Workshop, pp.29-37, A. Stavrou, G. Karame (Eds.), November 2017, Dallas, Texas, USA, ACM Press<\/li><li style=\"text-align: justify;\">Kalloniatis C., Kavroudakis D., Polydoropoulou A., Gritzalis S., \u201cDesigning Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts\u201d, Proceedings of the 2nd SMART-MED Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean, C. Nikolaidis (Ed.), September 2017, Heraklion, Greece, Springer<\/li><li style=\"text-align: justify;\">Chalaris E., Chalaris I., Gritzalis S., Sgouropoulou C., \u201cMaturity Level of the Quality Assurance Evaluation Procedures in Higher Education: A qualitative research\u201d, Proceedings of the PCI 2017 21st Pan-Hellenic Conference on Informatics, I. Anagnostopoulos et al. (Eds.), September 2017, Larisa, Greece, ACM Press<\/li><li style=\"text-align: justify;\">Diamantopoulou V., Tsochou A., Loukis E., Gritzalis S., \u201cDoes the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation\u201d, Proceedings of the AMCIS 2017 the 23rd Americas Conference on Information Systems, D. Strong, J. Gogan (Eds.), August 2017, Boston, USA, AIS<\/li><li style=\"text-align: justify;\">Simou S., Kalloniatis C., Gritzalis S., \u201cModelling Cloud Forensic-Enabled Services\u201d, Proceedings of the TRUSTBUS 2017 13th International Conference on Trust, Privacy and Security in Digital Business, pp.147-163, S. Fischer-Huebner, C. Lambrinoudakis (Eds.), August 2017, Lyon, France, Springer LNCS<\/li><li style=\"text-align: justify;\">Diamantopoulou V., Kalloniatis C., Gritzalis S., Mouratidis H., \u201cSupporting Privacy by Design using Privacy Process Patterns\u201d, Proceedings of the IFIP SEC 2017 32nd IFIP International Information Security Conference, pp.491-505, S. De Capitani di Vimercati, F. Martinelli, May 2017, Rome, Italy, Springer<\/li><li style=\"text-align: justify;\">Diamantopoulou V., Argyropoulos N., Kalloniatis C., Gritzalis S., \u201cSupporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns\u201d, Proceedings of the IEEE RCIS 11th International Conference on Research Challenges in Information Science, pp.187-198, S. Assar, O. Pastor (Eds.), May 2017, Brighton, UK, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Zagouras P., Kalloniatis C., Gritzalis S., \u201cManaging User Experience: Usability and Security in a New Era Supremacy\u201d, Proceedings of the HCII 2017 19th International Conference on Human-Computer Interaction, T. Tryfonas (Ed.), pp.174-188, July 2017, Vancouver, Canada, Springer LNCS<\/li><li style=\"text-align: justify;\">Pattakou A., Kalloniatis C., Gritzalis S., \u201cSecurity and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review\u201d, Proceedings of the CLOUD COMPUTING 2017 8th International Conference on Cloud Computing, GRIDs, and Virtualization, pp.145-151, P. Dini (Ed.), February 2017, Athens, Greece, IARIA<\/li><li style=\"text-align: justify;\">Sideri M., Filippopoulou A., Rouvalis G., Kalloniatis C., Gritzalis S., \u201cSocial media use for decision making process in educational settings: The Greek case for Leadership\u2019s views and attitudes in Secondary and Tertiary Education\u201d, Proceedings of the HICSS-50 2017 Hawaii International Conference on System Sciences, pp.2875\u20132884, T. Bui, R. Sprague (Eds.), January 2017, Waikoloa, Hawaii, USA, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Spiliotopoulou L., Damopoulos D., Charalabidis Y., Maragkoudakis E., Gritzalis S., \u201cEurope in the shadow of financial crisis: Policy Making via Stance Classification\u201d, Proceedings of the HICSS-50 2017 Hawaii International Conference on System Sciences, pp.2835\u20132844, T. Bui, R. Sprague (Eds.), January 2017, Waikoloa, Hawaii, USA, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Argyropoulos N., Shei S., Kalloniatis C., Mouratidis H., Delaney A., Fish A., Gritzalis S., \u201cA Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements\u201d, Proceedings of the HICSS-50 2017 Hawaii International Conference on System Sciences, pp.4827-4836, T. Bui, R. Sprague (Eds.), January 2017, Waikoloa, Hawaii, USA, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Kitsiou A., Tzortzaki E., Sideri M., Gritzalis S., \u201cDigital Privacy and Social Capital on Social Network Sites. Friends or Foes?\u201d, Proceedings of the STAST 2016 6th International Workshop on Socio-Technical Aspects of Security and Trust, pp.3-16, Z. Benenson, C. Gates (Eds.), December 2016, Los Angeles, USA, ACM Press<\/li><li style=\"text-align: justify;\">Tzortzaki E., Kitsiou A., Sideri M., Gritzalis S., \u201cSelf-disclosure, Privacy concerns and Social Capital benefits interaction in Facebook: A case study\u201d, Proceedings of the PCI 2016 20th Pan-Hellenic Conference on Informatics, V. Verykios et al. (Eds.), November 2016, Patras, Greece, ACM Press<\/li><li style=\"text-align: justify;\">Tsiatsikas Z., Geneiatakis D., Kambourakis G., Gritzalis S., \u201cRealtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade\u201d, Proceedings of the NSS 2016 10th International Conference on Network and System Security, pp.126-139, M. Yung et al. (Eds.), September 2016, Taipei, Taiwan, Springer LNCS<\/li><li style=\"text-align: justify;\">Simou S., Kalloniatis C., Mouratidis H., Gritzalis S., \u201cTowards a Model-Based Framework for Forensic-Enabled Cloud Information Systems\u201d, Proceedings of the TRUSTBUS \u201816 13th International Conference on Trust, Privacy and Security in Digital Business, pp.35-47, S. Katsikas, C. Lambrinoudakis (Eds.), September 2016, Porto, Portugal, Springer LNCS<\/li><li style=\"text-align: justify;\">Pattakou A., Kalloniatis C., Gritzalis S., \u201cReasoning about security and privacy in cloud computing under a unified meta-model\u201d, Proceedings of the HAISA 2016 10th International Symposium on Human Aspects of Information Security &amp; Assurance, pp.56-66, N. Clarke, S. Furnell (Eds.), July 2016, Frankfurt, Germany, HAISA<\/li><li style=\"text-align: justify;\">Sideri M., Kitsiou A., Kalloniatis C., Gritzalis S., \u201cPrivacy and Facebook Universities students\u2019 communities for confessions and secrets: The Greek case\u201d, Proceedings of the 6th International Conference on e-Democracy, pp. 77-94, S. Katsikas, A. Sideridis (Eds.), December 2015, Athens, Greece, Springer CCIS Communications in Computer and Information Science<\/li><li style=\"text-align: justify;\">Giannakas F., Kambourakis G., Gritzalis S., \u201cCyberAware: A Mobile Game-based app for Cybersecurity Education and Awareness\u201d, Proceedings of the IMCL 2015 International Conference on Interactive Mobile Communication, Technologies and Learning, M. Auer (Ed.), pp.54-58, November 2015, Thessaloniki, Greece, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Rizomiliotis P., Gritzalis S., \u201cORAM Oblivious RAM based forward privacy preserving Dynamic Searchable Symmetric Encryption Schemes\u201d, Proceedings of the ACM CCSW 2015 7th ACM Cloud Computing Security Workshop, pp.65-76, C. Nita-Rotaru, F. Kerschbaum (Eds.), October 2015, Denver, USA, ACM Press<\/li><li style=\"text-align: justify;\">Simou S., Kalloniatis C., Mouratidis H., Gritzalis S., \u201cA Meta-model for assisting a Cloud Forensics Process\u201d, Proceedings of the CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems, pp.177-187, A. Gabillon (Ed.), July 2015, Mytilene, Greece, Springer LNCS<\/li><li style=\"text-align: justify;\">Kavakli E., Bantimaroudis P., Kalloniatis C., Gritzalis S., Avgeri K., \u201cTowards the Design of Trustworthy Websites for Cultural Organizations: A Visitor\u2019s perspective\u201d, Proceedings of the EMCIS 2015 12th Mediterranean and Middle Eastern Conference on Information Systems, pp.1-11, V. Morabito (Ed.), June 2015, Athens, Greece, EMCIS<\/li><li style=\"text-align: justify;\">Simou S., Kalloniatis C., Mouratidis H., Gritzalis S., \u201cTowards the development of a Cloud Forensics Methodology: A Conceptual Model\u201d, Proceedings of the WISSE 2015 5th International Workshop on Information Systems Security Engineering, D. Rosado (Ed.), pp.470-481, June 2015, Stockholm, Sweden, Springer LNCS<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1234\" aria-expanded=\"false\">Books<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1234\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1234\" tabindex=\"0\" hidden=\"hidden\"><ol><li>Burmester, S. Gritzalis, S. K. Katsikas, V. Chryssikopoulos, (eds) Modern Cryptography: Theory and Applications, 2011, Athens, Greece, Papasotiriou Pubs. (in Greek)<\/li><li>Gritzalis S., Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C.,\u00a0<em>\u201cSustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy\u201d<\/em>, chapter in:\u00a0<em>Selected Papers in Honor of Professor Nikolaos Alexandris,<\/em>\u00a0G. Tsihrintzis, M. Virvou (Eds.), 2019, Springer<\/li><li>Sideri M., Diamantopoulou V., Gritzalis S.,\u00a0<em>\u201cPrivacy preservation in modern e-Participation environments: The Crowdsourcing case\u201d<\/em>, chapter in:\u00a0<em>The Digital Future<\/em><em>,\u00a0<\/em>G. Doukidis (Ed.), 2019, Sideri Pubs. (in Greek)<\/li><li>Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S.,\u00a0<em>\u201c<\/em><em>Towards an integrated socio-technical approach for designing adaptive Privacy-Aware Services in Cloud computing\u201d<\/em>, chapter in:\u00a0<em>Cyber Influence and Congitive Threats<\/em>, V. Benson, J. McAlaney (Eds.), pp.9-27, Academic Press, 2019, Elsevier<\/li><li>Kalloniatis C., Pattakou A., Kavakli E., Gritzalis S.,\u00a0<em>\u201cDesigning Secure and Privacy-aware Information Systems\u201d<\/em>, chapter in:\u00a0<em>Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications,\u00a0<\/em>Vol.1, pp.390-418, 2019, IGI Global<\/li><li>Sideri M., Kitsiou A., Filippopoulou A., Kalloniatis C., Gritzalis S.,\u00a0<em>\u201cE-governance model in Education. Citizenship cultivation, enhancing participation and collective decision making in Greek educational structures through the use of social media\u201d<\/em>, chapter in:\u00a0<em>Innovation, Sustainability and Educational Design,<\/em>\u00a0M. Kaila et al. (Eds.), 2019, Diadrasi Pubs. (in Greek)<\/li><li>Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S.,\u00a0<em>\u201c\u2018\u2026 having freedom of speech, does not mean that we can write whatever we want. Our freedom stops where others\u2019 rights of begin\u2019. An educational intervention for enhancing privacy awareness in digital social networks\u201d<\/em>, chapter in:\u00a0<em>Sustainability, Sustainable Development, Nature and Human Nature: Our World? Quo Vadis?,<\/em>\u00a0M. Kaila et al. (Eds.), pp. 98-116, 2018, Diadrasi Pubs. (in Greek)<\/li><li>Kalloniatis C., Kavakli E., Gritzalis S., \u201c<em>Addressing Privacy in Traditional and Cloud-based Systems<\/em>\u201c, chapter in:\u00a0<em>Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications,<\/em>\u00a0Mehdi Khosrow-Pour (Ed.), pp. 1900-1930<em>,\u00a0<\/em>2017, IGI Global<\/li><li>Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S.,\u00a0<em>\u201cPrivacy Protection in Digital Social Networks. A necessary condition for maintaining social cohesion in the Information Society?\u201d,<\/em>\u00a0chapter in:\u00a0<em>Social and Cultural Sustainability,\u00a0<\/em>V. Papavasiliou, P. Fokiali, E. Nikolaou, D. Mantzanos, M. Kaila (Eds.), pp. 134-174, 2017, e-book (in Greek)<\/li><li>Katsikas S., Gritzalis S.,\u00a0<em>\u201c<\/em><em>Digitalization in Greece: State of play, barriers, challenges, solutions\u201d<\/em>, chapter in:\u00a0<em>Beyond Bureaucracy: Towards Sustainable Governance Informatization,<\/em>\u00a0A. Paulin, L. Anthopoulos, C. Reddick (Eds.), pp.355-375, 2017, Springer<\/li><li>Sideri M., Kitsiou A., Kalloniatis C., Gritzalis S.,\u00a0<em>\u201cFree expression and social control enforcement in social media: The Greek Students\u2019 online communities on Facebook case\u201d<\/em>\u00a0chapter in:\u00a0<em>Environmental Training and Sustainable Development. Concern Texts with innovative approaches,<\/em>\u00a0E. Theodoropoulou, P. Fokiali, V. Papavasiliou, M. Kaila (Ed.), pp. 56-65, 2016, Diadrasi Pubs. (in Greek)<\/li><li>Gritzalis S.,<em>\u00a0\u201cAdministrative Reform for the Citizens and the Businesses: Problems and Solutions\u201d<\/em>, chapter in:\u00a0<em>From the University to the Public Management,\u00a0<\/em>pp. 17-45, 2014, Papazisi Pubs.<\/li><li>\u00a0<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1235\" aria-expanded=\"false\">Committees - Administrative Experience<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1235\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1235\" tabindex=\"0\" hidden=\"hidden\"><ul><li style=\"text-align: justify;\">Rector, University of the Aegean (9.2014-8.2018)<\/li><li style=\"text-align: justify;\">Head, Dept. of Information and Communication Systems Engineering (2005-2009)<\/li><li style=\"text-align: justify;\">Director, Info-Sec-Lab Laboratory of Information and Communication Systems Security (2005-2009)<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1236\" aria-expanded=\"false\">Editor<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1236\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1236\" tabindex=\"0\" hidden=\"hidden\"><p><strong>Conferences Proceedings Editor<\/strong><\/p><ol><li style=\"text-align: justify;\">Mylopoulos, C. Kalloniatis, A. Antone, S. Gritzalis, (eds) Proceedings of the SECPRE 2018 2nd International Workshop on SECurity and Privacy Requirements Engineering (in conjuction with ESORICS 2018), September 2018, Barcelona, Spain, Springer LNCS Lecture Notes in Computer Science<\/li><li style=\"text-align: justify;\">Mylopoulos, C. Kalloniatis, A. Antone, S. Gritzalis, (eds) Proceedings of the SECPRE 2017 1st International Workshop on SECurity and Privacy Requirements Engineering (in conjuction with ESORICS 2017), September 2017, Oslo, Norway, Springer LNCS Lecture Notes in Computer Science<\/li><li style=\"text-align: justify;\">Karanikolas, M. Nikolaidou, S. Gritzalis, P. Tsanakas, (eds) Proceedings of the PCI 2015 19th Panhellenic Conference on Informatics, October 2015, Athens, Greece, ACM Press<\/li><li style=\"text-align: justify;\">Gritzalis, R. Roman, J. Clarke, (eds) Proceedings of the SecIoT 2011 2nd International Workshop on the Security of the Internet of Things, in conjunction with IEEE iThings 2011 International Conference on Internet of Things, October 2011, Dalian, China, IEEE Conference Publishing Services<\/li><li style=\"text-align: justify;\">Clarke, S. Gritzalis, R. Roman, J. Zhou, (eds) Proceedings of the SecIoT 2010 1st International Workshop on the Security of the Internet of Things, Novenber 2010, Tokyo, Japan<\/li><li style=\"text-align: justify;\">Gritzalis, G. Hogben, (eds) Proceedings of the OTM IS 2010 5th International Symposium on Information Security, October 2010, Crete, Greece, Springer Lecture Notes in Computer Science<\/li><li style=\"text-align: justify;\">Xiadong, L. Jianwei, S. Gritzalis, (eds) Proceedings of the CHINACOM 2010 5th International Conference on Communications and Networking \u2013 Network and Information Security Symposium, September 2010, Beijing, China, IEEE CPS Conference Publishing Services<\/li><li style=\"text-align: justify;\">Gritzalis, X. Cheng, K. Hwang, (eds) OTM IS\u201909 4th International Symposium on Information Security, Novenber 2009, Vilamoura, Portugal, Springer Lecture Notes in Computer Science<\/li><li style=\"text-align: justify;\">Mueller, S. Gritzalis, J. Misic, C. Lambrinoudakis, (eds) SecPri_WiMob 2009 2nd International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications, October 2009, Marrakech, Morocco, IEEE CPS<\/li><li style=\"text-align: justify;\">Dhillon, S. Gritzalis, S. Kokolakis, (eds) MCIS 2009 4th Mediterranean Conference on Information Systems \u2013 Information Security Track , September 2009, Athens, Greece, Association for Information Systems<\/li><li style=\"text-align: justify;\">Boutaba, S. Gritzalis, J. Hu, P. Mueller, (eds) IEEE ICC 2009 International Conference on Communications &#8211; Communications and Information Systems Security Symposium, June 2009, Dresden, Germany, IEEE CPS<\/li><li style=\"text-align: justify;\">Ghita, S. Gritzalis, R. Savola, E. Chen, (eds) SECURWARE 2009 3rd International Conference on Emerging Security Information, Systems and Technologies , June 2009, IEEE CPS<\/li><li style=\"text-align: justify;\">Mueller, S. Gritzalis, C. Lambrinoudakis, K. Nyberg, (eds) SecPri_WiMob 2008 International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications, October 2008, Avignon, France, IEEE CPS<\/li><li style=\"text-align: justify;\">Gritzalis, D. Plexousakis, D. Pnevmatikatos, (eds) PCI 2008 12th Pan-Hellenic Conference on Informatics, with international participation , August 2008, IEEE CPS<\/li><li style=\"text-align: justify;\">Gritzalis, G. F. Marias, (eds) SecPerU 2008 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, July 2008, Sorrento, Italy, ACM Press<\/li><li style=\"text-align: justify;\">Coronato, S. Gritzalis, S. Hussain, (eds) Proceedings of the SMPE 2008 2nd International Symposium on Multimodal Pervasive Environments, in conjunction with MOBIQUITOUS 2008 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, July 2008, Dublin, Ireland, IEEE Conference Publishing Services<\/li><li style=\"text-align: justify;\">Gritzalis, K. J. Kim, (eds) Proceedings of the MUE 2008 2nd International Conference on Multimedia and Ubiquitous Engineering \u2013 Multimedia and Ubiquitous Security Track, April 2008, Busan, Korea, IEEE Conference Publishing Services<\/li><li style=\"text-align: justify;\">Preneel, S. Gritzalis, S. Kokolakis, T. Tryfonas, (eds) WDFIA 2007 2nd Annual Workshop on Digital Forensics and Incident Analysis, August 2007, Samos, Greece, IEEE CPS<\/li><li style=\"text-align: justify;\">Georgiadis, J. Lopez, S. Gritzalis, G. F. Marias, (eds) SecPerU 2007 3rd International Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing (in conjunction with IEEE ICPS 3rd IEEE International Conference on Pervasive Services) , July 2007, Istanbul, Turkey, IEEE CPS<\/li><li style=\"text-align: justify;\">K. Katsikas, J. Lopez, M. Backs , S. Gritzalis, B. Preneel, (eds) ISC&#8217;2006 9th Information Security Conference, September 2006, Samos, Greece, Springer Lecture Notes in Computer Science<\/li><li style=\"text-align: justify;\">Georgiadis, J. Lopez, S. Gritzalis, G. F. Marias, (eds) SecPerU 2006 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (in conjunction with IEEE ICPS 2nd IEEE International Conference on Pervasive Services 2006), June 2006, Lyon, France, IEEE CPS<\/li><li style=\"text-align: justify;\">Gritzalis, A. Rouskas, C. Skianis, (eds) SecPri_MobiWi 2006 Workshop on Security and Privacy in Mobile and Wireless Networking (in conjunction with IFIP NETWORKING 2006), May 2006, Coimbra, Portugal<\/li><li style=\"text-align: justify;\">Gritzalis, C. Lambrinoudakis, (eds) Invited Session on Security and Privacy in eBusiness, eCommerce, eGovernment Environments (in conjunction with ISSPIT&#8217;05 5th IEEE International Symposium on Signal Processing and Information Technology), December 2005, Athens, Greece, IEEE CPS<\/li><li style=\"text-align: justify;\">K. Katsikas, S. Gritzalis, (eds) Invited Session on Security and Privacy in Wireless and Mobile Computing, (in conjunction with ISSPIT&#8217;05 5th IEEE International Symposium on Signal Processing and Information Technology), December 2005, Athens, Greece, IEEE CPS<\/li><li style=\"text-align: justify;\">Georgiadis, S. Gritzalis, G. F. Marias, (eds) SecPerU 2005 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (in conjunction with IEEE ICPS 1st IEEE International Conference on Pervasive Services 2005), July 2005, Santorini, Greece, Diaulos Pubs.<\/li><li style=\"text-align: justify;\">K. Katsikas, S. Gritzalis, J. Lopez, (eds) EuroPKI 2004 1st European PKI Workshop: Research and Applications, June 2004, Samos, Greece, Springer Lecture Notes in Computer Science<\/li><li style=\"text-align: justify;\">\u00a0<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Stefanos Gritzalis is a Professor of Information and Communication Systems Security, at the Lab. of Systems Security, Dept. of Digital Systems, University of Piraeus, Greece (06.2019+). Previously, he was a Professor at the University of the Aegean, Greece, School of Engineering, Dept. of Information and Communication Systems Engineering, and member of the Info-Sec-Lab Laboratory of [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1004"}],"collection":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/comments?post=1004"}],"version-history":[{"count":37,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1004\/revisions"}],"predecessor-version":[{"id":2060,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1004\/revisions\/2060"}],"wp:attachment":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/media?parent=1004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}