Остановите войну!
for scientists:
default search action
Dimitris Gritzalis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j97]Nikolaos Tsinganos, Panagiotis E. Fouliras, Ioannis Mavridis, Dimitris Gritzalis:
CSE-ARS: Deep Learning-Based Late Fusion of Multimodal Information for Chat-Based Social Engineering Attack Recognition. IEEE Access 12: 16072-16088 (2024) - [j96]Konstantinos Adamos, George Stergiopoulos, Michalis Karamousadakis, Dimitris Gritzalis:
Enhancing attack resilience of cyber-physical systems through state dependency graph models. Int. J. Inf. Sec. 23(1): 187-198 (2024) - 2023
- [j95]Athanasios Dimitriadis, Efstratios Lontzetidis, Boonserm Kulvatunyou, Nenad Ivezic, Dimitris Gritzalis, Ioannis Mavridis:
Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks. IEEE Access 11: 728-743 (2023) - [j94]Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis:
Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering. IEEE Access 11: 106172-106189 (2023) - [j93]Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis:
Correction to: A decentralized honeypot for IoT Protocols based on Android devices. Int. J. Inf. Sec. 22(1): 303 (2023) - [j92]Menelaos N. Katsantonis, Athanassios Manikas, Ioannis Mavridis, Dimitris Gritzalis:
Cyber range design framework for cyber security education and training. Int. J. Inf. Sec. 22(4): 1005-1027 (2023) - [c94]Argiro Anagnostopoulou, Ioannis Mavridis, Dimitris Gritzalis:
Risk-Based Illegal Information Flow Detection in the IIoT. SECRYPT 2023: 377-384 - 2022
- [j91]Nikolaos Tsinganos, Ioannis Mavridis, Dimitris Gritzalis:
Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks. IEEE Access 10: 108517-108529 (2022) - [j90]George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis:
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0. Int. J. Inf. Sec. 21(1): 37-59 (2022) - [j89]Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis:
A decentralized honeypot for IoT Protocols based on Android devices. Int. J. Inf. Sec. 21(6): 1211-1222 (2022) - [c93]Panagiotis Dedousis, Melina Raptaki, George Stergiopoulos, Dimitris Gritzalis:
Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach. SECRYPT 2022: 35-46 - [e10]Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri:
Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings. Lecture Notes in Computer Science 13620, Springer 2022, ISBN 978-3-031-21279-6 [contents] - 2021
- [j88]Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis:
A Security-Aware Framework for Designing Industrial Engineering Processes. IEEE Access 9: 163065-163085 (2021) - [j87]George Stergiopoulos, Dimitris Gritzalis, Efstratios Vasilellis, Argiro Anagnostopoulou:
Dropping malware through sound injection: A comparative analysis on Android operating systems. Comput. Secur. 105: 102228 (2021) - [j86]Menelaos N. Katsantonis, Ioannis Mavridis, Dimitris Gritzalis:
Design and Evaluation of COFELET-based Approaches for Cyber Security Learning and Training. Comput. Secur. 105: 102263 (2021) - [j85]George Iakovakis, Constantinos-Giovanni Xarhoulacos, Konstantinos Giovas, Dimitris Gritzalis:
Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era. Secur. Commun. Networks 2021: 3187205:1-3187205:21 (2021) - [j84]Dimitris Gritzalis, Grammati E. Pantziou, Rodrigo Roman Castro:
Sensors Cybersecurity. Sensors 21(5): 1762 (2021) - [j83]Athanasios Dimitriadis, Christos Prassas, Jose Luis Flores, Boonserm Kulvatunyou, Nenad Ivezic, Dimitris Gritzalis, Ioannis Mavridis:
Contextualized Filtering for Shared Cyber Threat Information. Sensors 21(14): 4890 (2021) - [j82]Constantinos-Giovanni Xarhoulacos, Argiro Anagnostopoulou, George Stergiopoulos, Dimitris Gritzalis:
Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection. Sensors 21(16): 5496 (2021) - [c92]Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis:
Towards Integrating Security in Industrial Engineering Design Practices. SECRYPT 2021: 161-172 - 2020
- [j81]George Stergiopoulos, Dimitris Gritzalis, Evangelos Limnaios:
Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns. IEEE Access 8: 128440-128475 (2020) - [j80]Georgia Lykou, Panagiotis Dedousis, George Stergiopoulos, Dimitris Gritzalis:
Assessing Interdependencies and Congestion Delays in the Aviation Network. IEEE Access 8: 223234-223254 (2020) - [j79]Alkmini Gkritzali, Eleni Mavragani, Dimitris Gritzalis:
Negative MWOM and value co-destruction during destination crises. Bus. Process. Manag. J. 26(4): 839-856 (2020) - [j78]George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis:
Automatic network restructuring and risk mitigation through business process asset dependency analysis. Comput. Secur. 96: 101869 (2020) - [j77]George Stergiopoulos, Nick Kapetanas, Efstratios Vasilellis, Dimitris Gritzalis:
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis. Secur. Priv. 3(4) (2020) - [j76]Georgia Lykou, Dimitrios Moustakas, Dimitris Gritzalis:
Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies. Sensors 20(12): 3537 (2020) - [c91]Panagiotis Dedousis, George Stergiopoulos, Dimitris Gritzalis:
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems. ICETE (Selected Papers) 2020: 1-23 - [c90]George Stergiopoulos, Eirini Lygerou, Nikolaos Tsalis, Dimitris Tomaras, Dimitris Gritzalis:
Avoiding Network and Host Detection using Packet Bit-masking. ICETE (2) 2020: 52-63
2010 – 2019
- 2019
- [j75]George Stergiopoulos, Georgia Chronopoulou, Evangelos Bitsikas, Nikolaos Tsalis, Dimitris Gritzalis:
Using side channel TCP features for real-time detection of malware connections. J. Comput. Secur. 27(5): 507-520 (2019) - [j74]Georgia Lykou, Argiro Anagnostopoulou, Dimitris Gritzalis:
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls. Sensors 19(1): 19 (2019) - [p5]Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis:
Towards Indeterminacy-Tolerant Access Control in IoT. Handbook of Big Data and IoT Security 2019: 53-71 - [p4]Stavros Salonikias, Antonios Gouglidis, Ioannis Mavridis, Dimitris Gritzalis:
Access Control in the Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 95-114 - 2018
- [j73]George Stergiopoulos, Evangelos Valvis, Dimitris Mitrodimas, Dimitrios Lekkas, Dimitris Gritzalis:
Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure. IEEE Access 6: 63823-63832 (2018) - [j72]George Stergiopoulos, Dimitris Gritzalis, Vasilis Kouktzoglou:
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment. Comput. Networks 134: 23-45 (2018) - [j71]Kosmas Pipyros, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual. Comput. Secur. 74: 371-383 (2018) - [j70]Georgia Lykou, Despina Mentzelioti, Dimitris Gritzalis:
A new methodology toward effectively assessing data center sustainability. Comput. Secur. 76: 327-340 (2018) - [j69]Dimitris Gritzalis, Giulia Iseppi, Alexios Mylonas, Vasilis Stavrou:
Exiting the Risk Assessment Maze: A Meta-Survey. ACM Comput. Surv. 51(1): 11:1-11:30 (2018) - [c89]Georgia Lykou, Argiro Anagnostopoulou, George Stergiopoulos, Dimitris Gritzalis:
Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures. CRITIS 2018: 129-142 - [c88]George Stergiopoulos, Alexander Talavari, Evangelos Bitsikas, Dimitris Gritzalis:
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets. ESORICS (1) 2018: 346-362 - [c87]Georgia Lykou, Argiro Anagnostopoulou, Dimitris Gritzalis:
Implementing Cyber-Security Measures in Airports to Improve Cyber-Resilience. GIoTS 2018: 1-6 - [c86]Nikolaos Tsalis, George Stergiopoulos, Evangelos Bitsikas, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. ICETE (2) 2018: 219-229 - 2017
- [j68]Nikolaos Tsalis, Alexios Mylonas, Antonia Nisioti, Dimitris Gritzalis, Vasilios Katos:
Exploring the protection of private browsing in desktop browsers. Comput. Secur. 67: 181-197 (2017) - [j67]Miltiadis Kandias, Dimitris Gritzalis, Vasilis Stavrou, Kostas Nikoloulis:
Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module. Comput. Secur. 69: 3-17 (2017) - [j66]George Stergiopoulos, Panayiotis Katsaros, Dimitris Gritzalis:
Program analysis with risk-based classification of dynamic invariants for logical error detection. Comput. Secur. 71: 36-50 (2017) - [j65]George Stergiopoulos, Vasilis Kouktzoglou, Marianthi Theocharidou, Dimitris Gritzalis:
A process-based dependency risk analysis methodology for critical infrastructures. Int. J. Crit. Infrastructures 13(2/3): 184-205 (2017) - [j64]Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:
Profiling online social networks users: an omniopticon tool. Int. J. Soc. Netw. Min. 2(4): 293-313 (2017) - [j63]George Stergiopoulos, Evangelos Valvis, Foivos Anagnou-Misyris, Nick Bozovic, Dimitris Gritzalis:
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures. SIGMETRICS Perform. Evaluation Rev. 45(2): 119-124 (2017) - [c85]Georgia Lykou, George Iakovakis, George Chronis, Dimitris Gritzalis:
Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning. CRITIS 2017: 37-47 - [c84]Georgia Lykou, George Stergiopoulos, Antonios Papachrysanthou, Dimitris Gritzalis:
Protecting the Transportation Sector from the Negative Impacts of Climate Change. Critical Infrastructure Protection 2017: 3-21 - 2016
- [j62]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Georgia Lykou, Dimitris Gritzalis:
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. Int. J. Crit. Infrastructure Prot. 12: 46-60 (2016) - [j61]Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare. Inf. Comput. Secur. 24(1): 38-52 (2016) - [c83]Shamal Faily, Georgia Lykou, Anton Partridge, Dimitris Gritzalis, Alexios Mylonas, Vasilios Katos:
Human-Centered Specification Exemplars for Critical Infrastructure Environments. BCS HCI 2016 - [c82]Dimitris Gritzalis, George Stergiopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos, Georgia Lykou:
Critical Infrastructure Protection: A Holistic Methodology for Greece. CyberICPS@ESORICS 2016: 19-34 - [c81]George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Classification and Comparison of Critical Infrastructure Protection Tools. Critical Infrastructure Protection 2016: 239-255 - [c80]Kosmas Pipyros, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Cyber-Attacks Evaluation Using Simple Additive Weighting Method on the Basis of Schmitt's Analysis. MCIS 2016: 41 - [c79]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. SECRYPT 2016: 28-40 - 2015
- [j60]George Stergiopoulos, Dimitris Gritzalis:
Hacking and Penetration Testing with Low Power Devices. Comput. Secur. 49: 274-275 (2015) - [j59]Nikos Virvilis, Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis:
Security Busters: Web browser security vs. rogue sites. Comput. Secur. 52: 90-105 (2015) - [j58]Nikolaos Tsalis, Dimitris Gritzalis:
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015). Comput. Secur. 55: 113 (2015) - [j57]Vasilis Stavrou, Dimitris Gritzalis:
Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015). Comput. Secur. 55: 128-129 (2015) - [j56]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Dimitris Gritzalis:
Risk mitigation strategies for critical infrastructures based on graph centrality analysis. Int. J. Crit. Infrastructure Prot. 10: 34-44 (2015) - [c78]Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis:
An Intensive Analysis of Security and Privacy Browser Add-Ons. CRiSIS 2015: 258-273 - [c77]Stavros Salonikias, Ioannis Mavridis, Dimitris Gritzalis:
Access Control Issues in Utilizing Fog Computing for Transport Infrastructure. CRITIS 2015: 15-26 - [c76]Shamal Faily, George Stergiopoulos, Vasilios Katos, Dimitris Gritzalis:
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar. CRITIS 2015: 243-246 - [c75]George Stergiopoulos, Marianthi Theocharidou, Dimitris Gritzalis:
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures. HCI (22) 2015: 672-683 - [c74]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis:
Execution Path Classification for Vulnerability Analysis and Detection. ICETE (Selected Papers) 2015: 293-317 - [c73]George Stergiopoulos, Marianthi Theocharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation. Critical Infrastructure Protection 2015: 299-314 - [c72]George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position. SECRYPT 2015: 100-111 - 2014
- [j55]Lakshmish Ramaswamy, Barbara Carminati, Lujo Bauer, Dongwan Shin, James Joshi, Calton Pu, Dimitris Gritzalis:
Editorial. Comput. Secur. 41: 1-2 (2014) - [j54]Nikos Virvilis, Dimitris Gritzalis:
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks. Comput. Secur. 42: 191-192 (2014) - [j53]George Stergiopoulos, Dimitris Gritzalis:
A Bug Hunter's Diary. Comput. Secur. 43: 188 (2014) - [j52]Nikolaos Tsalis, Dimitris Gritzalis:
Securing cloud and mobility: A practitioner's guide. Comput. Secur. 45: 305 (2014) - [j51]Vasilis Stavrou, Dimitris Gritzalis:
Introduction to Computer and Network Security: Navigating Shades of Gray. Comput. Secur. 46: 173 (2014) - [j50]Yannis Soupionis, Remous-Aris Koutsiamanis, Pavlos S. Efraimidis, Dimitris Gritzalis:
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication. J. Comput. Secur. 22(3): 383-413 (2014) - [c71]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Detection of Logical Errors in Programs. CRiSIS 2014: 35-51 - [c70]Nikolaos Tsalis, Nikos Virvilis, Alexios Mylonas, Theodore K. Apostolopoulos, Dimitris Gritzalis:
Browser Blacklists: The Utopia of Phishing Protection. ICETE (Selected Papers) 2014: 278-293 - [c69]Dimitris Gritzalis, Vasilis Stavrou, Miltiadis Kandias, George Stergiopoulos:
Insider Threat: Enhancing BPM through Social Media. NTMS 2014: 1-6 - [c68]Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis:
Mobile Devices - A Phisher's Paradise. SECRYPT 2014: 79-87 - [c67]Vasilis Stavrou, Miltiadis Kandias, Georgios Karoulas, Dimitris Gritzalis:
Business Process Modeling for Insider Threat Monitoring and Handling. TrustBus 2014: 119-131 - [e9]Dimitris Gritzalis, Aggelos Kiayias, Ioannis G. Askoxylakis:
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings. Lecture Notes in Computer Science 8813, Springer 2014, ISBN 978-3-319-12279-3 [contents] - 2013
- [j49]Yannis Soupionis, Dimitris Gritzalis:
Hacking VoIP. Comput. Secur. 32: 267 (2013) - [j48]Miltiadis Kandias, Dimitris Gritzalis:
Metasploit the Penetration Tester's Guide. Comput. Secur. 32: 268-269 (2013) - [j47]Alexios Mylonas, Anastasia Kastania, Dimitris Gritzalis:
Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34: 47-66 (2013) - [j46]Dimitris Gritzalis, Gurvirender Tejay:
Cybercrime in the Digital Economy - Editorial. Comput. Secur. 38: 1-2 (2013) - [j45]Alexios Mylonas, Vasilis Meletiadis, Lilian Mitrou, Dimitris Gritzalis:
Smartphone sensor data as digital evidence. Comput. Secur. 38: 51-75 (2013) - [j44]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Assessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastructures 9(1/2): 93-110 (2013) - [c66]Nikos Virvilis, Dimitris Gritzalis:
The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? ARES 2013: 248-254 - [c65]Nikolaos Pitropakis, Costas Lambrinoudakis, Dimitris Geneiatakis, Dimitris Gritzalis:
A Practical Steganographic Approach for Matroska Based High Quality Video Files. AINA Workshops 2013: 684-688 - [c64]Nikolaos Tsalis, Marianthi Theoharidou, Dimitris Gritzalis:
Return on Security Investment for Cloud Platforms. CloudCom (2) 2013: 132-137 - [c63]Marianthi Theoharidou, Nick Papanikolaou, Siani Pearson, Dimitris Gritzalis:
Privacy Risk, Security, Accountability in the Cloud. CloudCom (1) 2013: 177-184 - [c62]Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:
Youtube User and Usage Profiling: Stories of Political Horror and Security Success. ICETE (Selected Papers) 2013: 270-289 - [c61]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Cascading Effects of Common-Cause Failures in Critical Infrastructures. Critical Infrastructure Protection 2013: 171-182 - [c60]Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis:
In Cloud We Trust: Risk-Assessment-as-a-Service. IFIPTM 2013: 100-110 - [c59]Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, Panajotis Katsaros, Anakreon Mentis:
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? IISA 2013: 1-6 - [c58]Despoina Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, Christos Douligeris, Marianthi Theoharidou, Dimitris Gritzalis:
S-Port: Collaborative security management of Port Information systems. IISA 2013: 1-6 - [c57]Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis:
Insiders Trapped in the Mirror Reveal Themselves in Social Media. NSS 2013: 220-235 - [c56]George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis:
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. NSS 2013: 236-249 - [c55]Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis:
Assessing Privacy Risks in Android: A User-Centric Approach. RISK@ICTSS 2013: 21-37 - [c54]Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:
Which Side Are You On? - A New Panopticon vs. Privacy. SECRYPT 2013: 98-110 - [c53]George Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis:
Approaching Encryption through Complex Number Logarithms. SECRYPT 2013: 574-579 - [c52]Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis:
Evaluating the Manageability of Web Browsers Controls. STM 2013: 82-98 - [c51]Alexios Mylonas, Dimitris Gritzalis, Bill Tsoumas, Theodore K. Apostolopoulos:
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users. TrustBus 2013: 173-184 - [c50]Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Lilian Mitrou, Dimitris Gritzalis:
Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling. UIC/ATC 2013: 347-354 - [c49]Nikos Virvilis, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? UIC/ATC 2013: 396-403 - [c48]Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Dimitris Gritzalis:
Proactive insider threat detection through social media: the YouTube case. WPES 2013: 261-266 - [e8]Sandro Bologna, Bernhard M. Hämmerli, Dimitris Gritzalis, Stephen D. Wolthusen:
Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6983, Springer 2013, ISBN 978-3-642-41475-6 [contents] - 2012
- [j43]Bill Tsoumas, Dimitris Gritzalis:
Inside Cyber Warfare: Mapping the Cyber Underworld. Comput. Secur. 31(6): 801 (2012) - [j42]Alexios Mylonas, Dimitris Gritzalis:
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. Comput. Secur. 31(6): 802-803 (2012) - [j41]Theodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis:
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services. Int. J. Electron. Secur. Digit. Forensics 4(2/3): 164-177 (2012) - [j40]Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, Yannis Soupionis:
Formal analysis for robust anti-SPIT protection using model checking. Int. J. Inf. Sec. 11(2): 121-135 (2012) - [c47]Emmanouela Stachtiari, Yannis Soupionis, Panagiotis Katsaros, Anakreontas Mentis, Dimitris Gritzalis:
Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection. CRITIS 2012: 143-154 - [c46]George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis:
Hunting Application-Level Logical Errors. ESSoS 2012: 135-142 - [c45]Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis:
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. SEC 2012: 249-260 - [c44]Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis:
A Risk Assessment Method for Smartphones. SEC 2012: 443-456 - [e7]Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou:
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology 376, Springer 2012, ISBN 978-3-642-30435-4 [contents] - 2011
- [j39]Dimitris Gritzalis, James Joshi:
Editorial. Comput. Secur. 30(2-3): 89-90 (2011) - [j38]Dimitris Gritzalis, Giannis F. Marias, Yacine Rebahi, Yannis Soupionis, Sven Ehlert:
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT). J. Comput. Secur. 19(5): 835-867 (2011) - [j37]Dimitris Gritzalis:
Guest Editor's Preface. J. Comput. Secur. 19(6): 1027-1028 (2011) - [c43]Yannis Soupionis, Dimitris Gritzalis:
ASPF: Adaptive anti-SPIT Policy-based Framework. ARES 2011: 153-160 - [c42]Miltiadis Kandias, Nikos Virvilis, Dimitris Gritzalis:
The Insider Threat in Cloud Computing. CRITIS 2011: 93-103 - [c41]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. CRITIS 2011: 104-115 - [c40]Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:
On the Feasibility of Malware Attacks in Smartphone Platforms. ICETE (Selected Papers) 2011: 217-232 - [c39]Theodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis:
Economic Evaluation of Interactive Audio Media for Securing Internet Services. ICGS3/e-Democracy 2011: 46-53 - [c38]Marianthi Theoharidou, Miltiadis Kandias, Dimitris Gritzalis:
Securing Transportation-Critical Infrastructures: Trends and Perspectives. ICGS3/e-Democracy 2011: 171-178 - [c37]Miltiadis Kandias, Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis:
Exploitation of auctions for outsourcing security-critical projects. ISCC 2011: 646-651 - [c36]Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:
Smartphone Security Evaluation - The Malware Attack Case . SECRYPT 2011: 25-36 - [c35]Alexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis:
A Secure Smartphone Applications Roll-out Scheme. TrustBus 2011: 49-61 - [c34]Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis:
Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation. TrustBus 2011: 74-85 - 2010
- [j36]Dimitris Gritzalis, Jan H. P. Eloff:
Editorial. Comput. Secur. 29(1): 1-2 (2010) - [j35]Dimitris Gritzalis, Sabrina De Capitani di Vimercati:
Editorial. Comput. Secur. 29(2): 165-166 (2010) - [j34]Dimitris Gritzalis, Pierangela Samarati:
Editorial. Comput. Secur. 29(4): 381-382 (2010) - [j33]Dimitris Gritzalis, Javier López:
Editorial. Comput. Secur. 29(5): 521-522 (2010) - [j32]Yannis Soupionis, Dimitris Gritzalis:
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. Comput. Secur. 29(5): 603-618 (2010) - [j31]Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
A multi-layer Criticality Assessment methodology based on interdependencies. Comput. Secur. 29(6): 643-658 (2010) - [j30]Dimitrios Lekkas, Dimitris Gritzalis:
e-Passports as a means towards a Globally Interoperable Public Key Infrastructure. J. Comput. Secur. 18(3): 379-396 (2010) - [c33]Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis:
A Cloud Provider-Agnostic Secure Storage Protocol. CRITIS 2010: 104-115 - [c32]Yannis Soupionis, Stylianos Basagiannis, Panagiotis Katsaros, Dimitris Gritzalis:
A Formally Verified Mechanism for Countering SPIT. CRITIS 2010: 128-139 - [c31]Miltiadis Kandias, Alexios Mylonas, Nikos Virvilis, Marianthi Theoharidou, Dimitris Gritzalis:
An Insider Threat Prediction Model. TrustBus 2010: 26-37 - [e6]Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou:
Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings. Lecture Notes in Computer Science 6345, Springer 2010, ISBN 978-3-642-15496-6 [contents]
2000 – 2009
- 2009
- [j29]Stelios Dritsas, Vicky Dritsou, Bill Tsoumas, Panos Constantopoulos, Dimitris Gritzalis:
OntoSPIT: SPIT management through ontologies. Comput. Commun. 32(1): 203-212 (2009) - [j28]Dimitris Gritzalis, Sokratis K. Katsikas:
Editorial. Comput. Secur. 28(5): 247 (2009) - [j27]Dimitris Gritzalis, Javier López:
Editorial. Comput. Secur. 28(6): 325-326 (2009) - [j26]Dimitris Gritzalis, Steven Furnell:
Editorial. Comput. Secur. 28(7): 491-492 (2009) - [j25]Dimitris Gritzalis, Tom Karygiannis:
Editorial. Comput. Secur. 28(8): 729-730 (2009) - [c30]Stelios Dritsas, Dimitris Gritzalis:
An Ontology-Driven antiSPIT Architecture. e-Democracy 2009: 189-198 - [c29]Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Risk-Based Criticality Analysis. Critical Infrastructure Protection 2009: 35-49 - [c28]George Parissis, George Xylomenos, Dimitris Gritzalis:
BLAST: Off-the-Shelf Hardware for Building an Efficient Hash-Based Cluster Storage System. NPC 2009: 148-155 - [c27]Yannis Soupionis, George Tountas, Dimitris Gritzalis:
Audio CAPTCHA for SIP-Based VoIP. SEC 2009: 25-38 - [e5]Dimitris Gritzalis, Javier López:
Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. IFIP Advances in Information and Communication Technology 297, Springer 2009, ISBN 978-3-642-01243-3 [contents] - 2008
- [j24]Dimitris Gritzalis, Yannis Mallios:
A SIP-oriented SPIT Management Framework. Comput. Secur. 27(5-6): 136-153 (2008) - [j23]Marianthi Theoharidou, Dimitra Xidara, Dimitris Gritzalis:
A CBK for Information Security and Critical Information and Communication Infrastructure Protection. Int. J. Crit. Infrastructure Prot. 1: 81-96 (2008) - [c26]Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis:
An Adaptive Policy-Based Approach to SPIT Management. ESORICS 2008: 446-460 - [c25]Stelios Dritsas, Yannis Soupionis, Marianthi Theoharidou, Yannis Mallios, Dimitris Gritzalis:
SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. SEC 2008: 381-395 - 2007
- [j22]Marianthi Theoharidou, Dimitris Gritzalis:
Common Body of Knowledge for Information Security. IEEE Secur. Priv. 5(2): 64-67 (2007) - [j21]Dimitrios Lekkas, Dimitris Gritzalis:
Long-term verifiability of the electronic healthcare records' authenticity. Int. J. Medical Informatics 76(5-6): 442-448 (2007) - [c24]John Mallios, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:
Attack Modeling of SIP-Oriented SPIT. CRITIS 2007: 299-310 - [c23]Dimitrios Lekkas, Dimitris Gritzalis:
E-Passports as a Means Towards the First World-Wide Public Key Infrastructure. EuroPKI 2007: 34-48 - [c22]Giannis F. Marias, Stelios Dritsas, Marianthi Theoharidou, John Mallios, Dimitris Gritzalis:
SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment. ICCCN 2007: 597-604 - [c21]Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis:
A CBK for Information Security and Critical Infrastructure Protection. World Conference on Information Security Education 2007: 49-56 - [c20]Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis:
Threat Analysis of the Session Initiation Protocol Regarding Spam. IPCCC 2007: 426-433 - [c19]Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis:
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33 - 2006
- [j20]Stelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis:
Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics Informatics 23(3): 196-210 (2006) - [c18]Bill Tsoumas, Dimitris Gritzalis:
Towards an Ontology-based Security Management. AINA (1) 2006: 985-992 - [c17]Bill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis:
Security-by-Ontology: A Knowledge-Centric Approach. SEC 2006: 99-110 - [c16]Stelios Dritsas, John Tsaparas, Dimitris Gritzalis:
A Generic Privacy Enhancing Technology for Pervasive Computing Environments. TrustBus 2006: 103-113 - 2005
- [j19]Dimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos:
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inf. Technol. Biomed. 9(3): 413-423 (2005) - [c15]Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis:
An Ontology-Based Approach to Information Systems Security Management. MMM-ACNS 2005: 151-164 - 2004
- [j18]Dimitrios Lekkas, Dimitris Gritzalis:
Cumulative notarization for long-term preservation of digital signatures. Comput. Secur. 23(5): 413-424 (2004) - [j17]Barry Barber, Dimitris Gritzalis, Kees Louwerse, Francesco Pinciroli:
Introduction. Int. J. Medical Informatics 73(3): 215-216 (2004) - [j16]Dimitris Gritzalis, Costas Lambrinoudakis:
A security architecture for interconnecting health information systems. Int. J. Medical Informatics 73(3): 305-309 (2004) - [j15]Dimitris Gritzalis:
Embedding privacy in IT applications development. Inf. Manag. Comput. Secur. 12(1): 8-26 (2004) - [c14]Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis:
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. EuroPKI 2004: 287-296 - 2003
- [j14]John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis:
Towards a framework for evaluating certificate status information mechanisms. Comput. Commun. 26(16): 1839-1850 (2003) - [j13]John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis:
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Comput. Commun. 26(16): 1851-1862 (2003) - [c13]Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas:
Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471 - [c12]Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis:
A Knowledge-Based Repository Model for Security Policies Management. MMM-ACNS 2003: 112-121 - [p3]Lilian Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas, Gerald Quirchmayr:
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications. Secure Electronic Voting 2003: 43-60 - [p2]Costas Lambrinoudakis, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, Spyros Ikonomopoulos:
Secure Electronic Voting: the Current Landscape. Secure Electronic Voting 2003: 101-122 - [e4]Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas:
Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece. IFIP Conference Proceedings 250, Kluwer 2003, ISBN 1-4020-7449-2 [contents] - [e3]Dimitris Gritzalis:
Secure Electronic Voting. Advances in Information Security 7, Springer 2003, ISBN 1-4020-7301-1 [contents] - 2002
- [j12]Diomidis Spinellis, Dimitris Gritzalis:
Panoptis: Intrusion Detection Using a Domain-Specific Language. J. Comput. Secur. 10(1/2): 159-176 (2002) - [c11]Costas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas:
Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. DEXA Workshops 2002: 435 - [c10]Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos:
Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78 - [c9]Lilian Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas:
Revisiting Legal and Regulatory Requirements for Secure E-Voting. SEC 2002: 469-480 - [c8]Spyros Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou:
Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520 - 2001
- [j11]Stefanos Gritzalis, Dimitris Gritzalis:
A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Secur. 9(2): 71-79 (2001) - [c7]Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis:
A Privacy-Enhancing e-Business Model Based on Infomediaries. MMM-ACNS 2001: 72-83 - [c6]Dimitris Gritzalis, Nikolaos Kyrloglou:
Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. SCCC 2001: 115-123 - [c5]Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos:
Pythia: Towards Anonymity in Authentication. SEC 2001: 1-18 - 2000
- [c4]John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas:
Evaluating certificate status information mechanisms. CCS 2000: 1-8 - [c3]Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis:
A Qualitative Approach to Information Availability. SEC 2000: 37-48 - [e2]Dimitris Gritzalis, Sushil Jajodia, Pierangela Samarati:
CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000. ACM 2000, ISBN 1-58113-203-4 [contents]
1990 – 1999
- 1999
- [j10]Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW. Comput. Secur. 18(7): 627-639 (1999) - 1998
- [j9]Dimitris Gritzalis:
Achieving quality, safety, security and reliability in software systems. Microprocess. Microsystems 21(10): 585-586 (1998) - [c2]Steven Furnell, Dimitris Gritzalis, Sokratis K. Katsikas, Konstantinos Mavroudakis, Peter W. Sanders, Matthew J. Warren:
Methods of Responding to Healthcare Security Incidents. MedInfo 1998: 1138-1142 - 1997
- [j8]Dimitris Gritzalis:
A baseline security policy for distributed healthcare information systems. Comput. Secur. 16(8): 709-719 (1997) - 1996
- [j7]Sokratis K. Katsikas, Thomas Spyrou, Dimitris Gritzalis, John Darzentas:
Model for network behaviour under viral attack. Comput. Commun. 19(2): 124-132 (1996) - [j6]Dimitris Gritzalis, Sokratis K. Katsikas:
Towards a formal system-to-system authentication protocol. Comput. Commun. 19(12): 954-961 (1996) - [c1]Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis:
Attack Modelling in Open Network Environments. Communications and Multimedia Security 1996: 268-277 - [p1]Sokratis K. Katsikas, Dimitris Gritzalis:
High Level Security Policy Guidelines. Data Security for Health Care (1) 1996: 57-81 - [e1]Sokratis K. Katsikas, Dimitris Gritzalis:
Information Systems Security, Facing the information society of the 21st Century. IFIP Conference Proceedings 54, Chapman & Hall 1996, ISBN 0-412-78120-4 [contents] - 1995
- [j5]Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas:
Design of a neural network for recognition and classification of computer viruses. Comput. Secur. 14(5): 435-448 (1995) - 1994
- [j4]Michel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis:
Intrusion detection: Approach and performance issues of the SECURENET system. Comput. Secur. 13(6): 495-508 (1994) - 1992
- [j3]Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras:
Determining access rights for medical information systems. Comput. Secur. 11(2): 149-161 (1992) - [j2]Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis:
A zero knowledge probabilistic login protocol. Comput. Secur. 11(8): 733-745 (1992) - 1991
- [j1]Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou:
Data security in medical information systems: The Greek case. Comput. Secur. 10(2): 141-159 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint