Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security
   
Publications
Journals
Conferences
Books
Chapter In Books
Conferences Proceedings Editor
Filter:

Year: Members:


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.

Journals

1G. Kambourakis, Draper-Gil G., Sanchez I., What email servers can tell to Johnny: An empirical study of provider-to-provider email security, IEEE Access, 2020, IEEE Press,
https://ieeexplore.ieee.org/document/9139968
, indexed in SCI-E, IF = 4.640
2G. Kambourakis, C. Kolias, D. Geneiatakis, G. Karopoulos, G. M. Makrakis, I. Kounelis, A state-of-the-art review on the security of mainstream IoT Wireless PAN protocol stacks, Symmetry, 2020, MDPI,
https://www.mdpi.com/2073-8994/12/4/579
, indexed in SCI-E, IF = 2.645
3A. Fakis, G. Karopoulos, G. Kambourakis, Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks, Future Internet, 2020, MDPI,
https://www.mdpi.com/1999-5903/12/5/92

4V. Kouliaridis, G. Kambourakis, D. Geneiatakis, N. Potha, Two anatomists are better than one: Dual-level Android malware detection, Symmetry, Vol. 12, No. 7, 2020, MDPI,
https://www.mdpi.com/2073-8994/12/7/1128
, indexed in SCI-E, IF = 2.645
5V. Kouliaridis, K. Barbatsalou, G. Kambourakis, S. Chen, A Survey on Mobile Malware Detection Techniques, IEICE Transactions on Information & Systems, 2020, IEICE,
https://search.ieice.org/
, indexed in SCI-E, IF = 0.770
6Martin T., G. Karopoulos, J. L. Hernandez-Ramos, G. Kambourakis, I. N. Fovino, Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps, Wireless Communications and Mobile Computing, 2020, Wiley/Hindawi,
https://www.hindawi.com/journals/wcmc/
, indexed in SCI-E, IF = 1.819
7V. Diamantopoulou, A. Tsohou, M. Karyda, From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR Compliance Controls, Information and Computer Security, Vol. 28, No. 4, 2020, Emerald,
https://www.emerald.com/insight/content/doi/10.1108/ICS-01-2020-0004/full/html

8N. Potha, V. Kouliaridis, G. Kambourakis, An Extrinsic Random-based Ensemble Approach for Android Malware Detection, Connection Science, 2020, Taylor and Francis,
https://www.tandfonline.com/toc/ccos20/current
, indexed in SCI-E, IF = 1.042
9A. Skalkos, A. Tsohou, M. Karyda, S. Kokolakis, Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis, Computers in Human Behavior Reports, Vol. 2C, No. 100034, 2020, Elsevier,
http://www.sciencedirect.com/science/article/pii/S2451958820300348

10I. Topa, M. Karyda, From Theory to Practice: Guidelines for Enhancing Information Security Management, Journal of Information and Computer Security, Vol. 27, No. 3, pp. 326-342, 2019, Emerald Publishing

11F. Giannakas, A. Papasalouros, G. Kambourakis, S. Gritzalis, A comprehensive cybersecurity learning platform for elementary education, Information Security Journal: A Global Perspective, Vol. 28, No. 3, pp. 81-106, 2019, Taylor and Francis,
https://www.tandfonline.com/toc/uiss20/current

12P. Mavriki, M. Karyda, Automated data- driven profiling: Threats for group privacy, Information and Computer Security, 2019, Emerald , (to appear)

13M. Sideri, A. Kitsiou , E. Tzortzaki, C. Kalloniatis, S. Gritzalis, Enhancing University students’ privacy literacy through an educational intervention. A Greek case-study, International Journal of Electronic Governance, Vol. 11, No. 3-4, pp. 333-360, 2019, Inderscience Publishers,
https://www.inderscience.com/jhome.php?jcode=ijeg

14G. Fotiadis, E. Konstantinou, TNFS Resistant Families of Pairing-Friendly Elliptic Curves, Journal of Theoretical Computer Science, Vol. 800, pp. 73-89, 2019, Elsevier

15K. Vemou, M. Karyda, Requirements for Private Communications over Public Spheres, Information and Computer Security, Vol. 28, No. 1, pp. 68-96, 2019, Emerald Publishing Limited,
https://doi.org/10.1108/ICS-01-2019-0002

16K. Vemou, M. Karyda, Evaluating privacy impact assessment methods: guidelines and best practice, Information & Computer Security, Vol. 28, No. 1, pp. 35-53, 2019, Emerald Publishing Limited,
https://doi.org/10.1108/ICS-04-2019-0047

17D. Papamartzivanos, Félix Gómez Mármol, G. Kambourakis, Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems, IEEE Access, Vol. 7, No. 1, pp. 13546-13560, 2019, IEEE Press,
https://ieeexplore.ieee.org/abstract/document/8620986
, indexed in SCI-E, IF = 4.640
18M. Zago, P. Nespoli, D. Papamartzivanos, M. G. Perez, Félix Gómez Mármol, G. Kambourakis, G. M. Perez, Screening out social bots interference: are there any silver bullets?, IEEE Communications Magazine, 2019, IEEE Press,
https://www.comsoc.org/publications/magazines/ieee-communications-magazine
, indexed in SCI-E, IF = 12.730
19D. Damopoulos, G. Kambourakis, Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices, Journal of Information Security and Applications, Vol. 46, pp. 138-150, 2019, Elsevier,
https://www.journals.elsevier.com/journal-of-information-security-and-applicatio....
, IF = 2.327
20Pantaleone Nespoli, D. Papamartzivanos, Félix Gómez Mármol, G. Kambourakis, Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks, IEEE Communications Surveys and Tutorials, Vol. 20, No. 2, pp. 1361-1396, 2018, IEEE Press,
http://ieeexplore.ieee.org/document/8169023/
, indexed in SCI-E, IF = 17.188
21G. Fotiadis, E. Konstantinou, Generating Pairing-Friendly Elliptic Curve Parameters Using Sparse Families, Journal of Mathematical Cryptology, Vol. 12, No. 2, pp. 83-99, 2018, Walter de Gruyter GmbH, Berlin/Boston,
https://doi.org/10.1515/jmc-2017-0024

22F. Giannakas, G. Kambourakis, A. Papasalouros, S. Gritzalis, A critical review of 13 years of Mobile Game-based Learning, Educational Technology Research and Development, Vol. 66, pp. 341-384, 2018, Springer,
http://rdcu.be/BdTM
, indexed in SCI-E, IF = 2.115
23P. Mavriki, M. Karyda, Big Data analysis in political communication: Implications for Group Privacy , International Journal of Electronic Governance, 2018

24L. Mitrou, A. Vorras, Artificial Intelligence and Personal Data – A perception in the light of the European General Data Protection Regulation (ΕU) 2016/679, DIKAIO MESON ENIMEROSIS KAI EPIKOINONIAS (DIMEE), No. 4, pp. 460-466, 2018, NOMIKI VIVLIOTHIKI

25Pipyros K., Thraskias Ch. , L. Mitrou, D. Gritzalis, Apostolopoulos T., A new strategy for improving cyber-attack evaluation in the context of Tallinn Manual, Computers and Security, No. 74, pp. 371-383, 2018

26Pipyros K., L. Mitrou, Cyberattack or cyberwar?, DIMEE, No. 2, pp. 192-201, 2018

27D. Papamartzivanos, Félix Gómez Mármol, G. Kambourakis, Dendron: Genetic Trees driven Rule Induction for Network Intrusion Detection Systems, Future Generation Computer Systems, Vol. 79, No. 2, pp. 558-574, 2018, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167739X16305465
, indexed in SCI-E, IF = 5.768
28Z. Tsiatsikas, G. Kambourakis, D. Geneiatakis, H. Wang, The devil is in the detail: SDP-driven malformed message attacks and mitigation in SIP ecosystems, IEEE Access, Vol. 7, pp. 2401-2417, 2018, IEEE Press,
https://ieeexplore.ieee.org/abstract/document/8575131
, indexed in SCI-E, IF = 4.098
29A. Tsohou, E. Kosta, Enabling valid informed consent for location tracking through privacy awareness of users: A process theory, Computer Law & Security Review: The International Journal of Technology Law and Practice, 2017, (to appear),
http://www.sciencedirect.com/science/article/pii/S026736491730119X
, indexed in SCI-E, IF = 0.373
30C. Kolias, V. Kolias, G. Kambourakis, TermID: A Distributed Swarm Intelligence Based Approach for Wireless Intrusion Detection, International Journal of Information Security, Vol. 16, No. 4, pp. 401-416, 2017, Springer,
https://link.springer.com/article/10.1007/s10207-016-0335-z?wt_mc=alerts.TOCjour....
, indexed in SCI-E, IF = TBD before next July
31S. A. Menesidou, V. Katos, G. Kambourakis, Cryptographic Key Management in Delay Tolerant Networks: A Survey, Future Internet, Vol. 9, No. 3, pp. 1-21, 2017, MDPI,
http://www.mdpi.com/1999-5903/9/3/26

32S. Vidros, C. Kolias, G. Kambourakis, L. Akoglu, Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset, Future Internet, 2017, MDPI,
http://www.mdpi.com/1999-5903/9/1/6

33A. Fakis, G. Karopoulos, G. Kambourakis, OnionSIP: Preserving privacy in SIP with Onion Routing, The Journal of Universal Computer Science (J.UCS), Vol. 23, No. 10, pp. 969-991, 2017, Verlag der Technischen Universität Graz,
http://www.jucs.org/jucs_23_10/onion_sip_preserving_privacy
, indexed in SCI-E, IF = 0.696
34S. Kokolakis, Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon, Computers & Security, Vol. 64, pp. 122-134, 2017, Elsevier,
https://www.researchgate.net/profile/Spyros_Kokolakis/publication/280244291_Priv....
, indexed in SCI-E, IF = 1.035
35M. Kandias, L. Mitrou, V. Stavrou, D. Gritzalis, Profiling Online Social Networks Users: An Omniopticon Tool, International Journal of Social Networks Mining, Vol. 2, No. 4, 2017

36C. Kolias, G. Kambourakis, A. Stavrou, J. Voas, DDoS in the IoT: Mirai and Other Botnets, IEEE Computer, Vol. 50, No. 7, pp. 80-84, 2017, IEEE Press,
https://www.computer.org/csdl/mags/co/2017/07/mco2017070080-abs.html
, indexed in SCI-E, IF = 3.564
37C. Kolias, G. Kambourakis, A. Stavrou, S. Gritzalis, Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset, IEEE Communications Surveys and Tutorials, Vol. 18, No. 1, pp. 184-208, 2016, IEEE Press,
http://www.comsoc.org/cst
, indexed in SCI-E, IF = 17.188
38G. Kambourakis, D. Damopoulos, D. Papamartzivanos, M. Pavlidakis, Introducing Touchstroke: Keystroke-based Authentication System for Smartphones, Security and Communication Networks, Vol. 9, No. 6, pp. 542-554, 2016, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.1061/abstract
, indexed in SCI-E, IF = 1.067
39F. Giannakas, G. Kambourakis, A. Papasalouros, S. Gritzalis, Security education and awareness for K-6 going mobile, International Journal of Interactive Mobile Technologies, Vol. 10, No. 2, pp. 41-48, 2016, International Association of Online Engineering,
http://www.i-jim.org

40S. Vidros, C. Kolias, G. Kambourakis, Online Recruitment services; yet another playground for fraudsters?, Computer Fraud & Security, Vol. 2016, No. 3, pp. 8-13, 2016, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1361372316300252

41M. Anagnostopoulos, G. Kambourakis, S. Gritzalis, New facets of Mobile Botnet: Architecture and Evaluation, International Journal of Information Security, Vol. 15, No. 5, pp. 455-473, 2016, Springer,
http://link.springer.com/journal/10207
, indexed in SCI-E, IF = 1.915
42Tasidou Aimilia, Efraimidis , I. Soupionis, L. Mitrou, V. Katos, 4. Tasidou, A., Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment., 24(1), 2-19., Information & Computer Security, Vol. 24, No. 1, pp. 18, 2016

43Pipyros K., L. Mitrou, D. Gritzalis, Apostolopoulos T., Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare, Information & Computer Security, Vol. 24, No. 1, pp. 38-52, 2016

44A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Managing the Introduction of Information Security Awareness Programs in Organisations, European Journal of Information Systems, Vol. 24, No. 1, pp. 38-58, 2015, Palgrave ,
https://www.researchgate.net/publication/257227930_Managing_the_introduction_of_....
, indexed in SCI-E, IF = 2.213
45Tsavli M., Efraimidis , V. Katos, L. Mitrou, Reengineering the user: privacy concerns about personal data on smartphones, Information and Computer Security, Vol. 23, No. 4, pp. 394-405, 2015, Emerald

46Z. Tsiatsikas, D. Geneiatakis, G. Kambourakis, A. Keromytis, An efficient and easily deployable method for dealing with DoS in SIP services, Computer Communications, Vol. 57, pp. 50-63, 2015, Elsevier,
http://www.journals.elsevier.com/computer-communications/
, indexed in SCI-E, IF = 2.099
47L. Ntalkos, G. Kambourakis, D. Damopoulos, Let, Telematics and Informatics, Vol. 32, No. 4, pp. 539-563, 2015, Elsevier,
http://www.journals.elsevier.com/telematics-and-informatics/
, indexed in SCI-E, IF = 2.261
48P. Drogkaris, S. Gritzalis, C. Kalloniatis, C. Lambrinoudakis, A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments, Future Internet , Vol. 7, No. 4, pp. 500-515, 2015, MDPI,
http://www.mdpi.com/1999-5903/7/4/500/html

49A. Tsohou, M. Karyda, S. Kokolakis, Analyzing the role of Cognitive and Cultural Biases in the Internalization of Information Security Policies: Recommendations for Information Security Awareness Programs, Computers & Security, Vol. 52, pp. 128–141, 2015, Elsevier,
https://www.researchgate.net/publication/275898027_Analyzing_the_role_of_Cogniti....
, indexed in SCI-E, IF = 1.17
50L. Mitrou, Data Protection and cloud computing, DIMEE, No. 4, pp. 534-550, 2015

51N. Nomikos, A. Nieto, P. Makris, D. N. Skoutas, D. Vouyioukas, P. Rizomiliotis, J. Lopez, C. Skianis, Relay selection for secure 5G green communications, Telecommunication Systems, Vol. 59, pp. 169-187, 2015, Springer,
http://rdcu.be/nMNV
, indexed in SCI-E, IF = 1.734
52G. Kambourakis, Anonymity and closely related terms in the Cyberspace: An analysis by example, Journal of Information Security and Applications, Vol. 19, No. 1, pp. 2-17, 2014, Elsevier,
http://www.sciencedirect.com/science/article/pii/S2214212614000209

53K. Vemou, M. Karyda, Guidelines and tools for incorporating privacy in Social Networking Platforms, IADIS International Journal on WWW/Internet, Vol. 12, No. 2, pp. 16-33, 2014,
http://www.iadisportal.org/ijwi/

54D. Kasiaras, T. Zafeiropoulos, N. Clarke, G. Kambourakis, Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices, International Journal for Information Security Research (IJISR), Vol. 4, No. 1-4, pp. 501-509, 2014, Infonomics Society,
http://www.infonomics-society.org/IJISR/

55D. Damopoulos, G. Kambourakis, S. Gritzalis, S. O. Park, Exposing mobile malware from the inside (or what is your mobile app really doing?), Peer-to-Peer Networking and Applications, Vol. 7, No. 4, pp. 687-697, 2014, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs12083-012-0179-x.pdf
, indexed in SCI-E, IF = 0.632
56N. Marangos, P. Rizomiliotis, L. Mitrou, Time Synchronization: Pivotal Element in Cloud Forensics, Security and Communication Networks , 2014, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.1056/abstract
, IF = 0.72
57Psaroudakis I., Saragiotis, V. Katos, L. Mitrou, A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description Protocol (SDP), International Journal of Electronic Security and Digital Forensics, Vol. 4, No. 6, pp. 241-267, 2014

58A. Tsohou, H. Lee, Z. Irani, Innovative Public Governance Through Cloud Computing: Information Privacy, Business Models and Performance Measurement Challenges, Transforming Government: People, Process and Policy, Vol. 8, No. 2, pp. 251-282, 2014, Emerald

59E. Rekleitis, P. Rizomiliotis, S. Gritzalis, How to Protect Security and Privacy in the Internet of Things: A Policy-based RFID tag management protocol, Security and Communication Networks, Vol. 7, No. 12, pp. 2669-2683, 2014, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.400/pdf
, indexed in SCI-E, IF = 0.72
60G. Kambourakis, Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art, International Journal of u- and e- Service, Science and Technology, Vol. 6, No. 3, pp. 67-84, 2013, SERSC,
http://www.sersc.org/journals/IJUNESST/

61A. Tsohou, Lee H., Z. Irani, V. Weerakkody , I. Osman, A Anouze, Proposing a Reference Process Model for the Citizen-Centric Evaluation of E-Government Services, Transforming Government: People, Process and Policy, Vol. 7, No. 2, pp. 240-255, 2013, Emerald

62 K. Anastasopoulou, S. Kokolakis, Exploring Citizens’ Intention to Use e-Government Services: The Role of Cultural Bias, International Journal of Electronic Governance, Vol. 6, No. 1, pp. 3-19, 2013, Inderscience,
http://www.inderscience.com/info/inarticle.php?artid=53378

63A. Mylonas, V. Meletiadis, L. Mitrou, D. Gritzalis, Smartphone sensor data as digital evidence, Computers & Security (Special Issue: Cybercrime in the Digital Economy), Vol. 38, pp. 51-75, 2013

64L. Mitrou, Privacy by Design (in Greek), Media and Communication Law, Vol. 37 , pp. 14-25, 2013

65P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, Employing Privacy Policies and Preferences in Modern e-Government Environments, International Journal of Electronic Governance, Vol. 6, No. 2, pp. 101-116, 2013, Inderscience,
http://inderscience.metapress.com/content/r4j26m562126317k/

66D. Damopoulos, G. Kambourakis, M. Anagnostopoulos, S. Gritzalis, J. H. Park, User privacy and modern mobile services: Are they on the same path?, Personal and Ubiquitous Computing, Vol. 17, No. 7, pp. 1437-1448, 2013, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs00779-012-0579-1.pdf
, indexed in SCI-E, IF = 1.616
67K. Barbatsalou, D. Damopoulos, G. Kambourakis, V. Katos, A critical review of 7 years of Mobile Device Forensics, Digital Investigation, Vol. 10, No. 4, pp. 323-349, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1742287613001096
, indexed in SCI-E, IF = 0.986
68F. Pereniguez, R. Marin-Lopez, G. Kambourakis, A. Ruiz Martinez, S. Gritzalis, A. F. Gomez, KAMU: Providing Advanced User Privacy in Kerberos Multi-Domain Scenarios, International Journal of Information Security (IJIS), Vol. 12, No. 6, pp. 505-525, 2013, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10207-013-0201-1.pdf
, indexed in SCI-E, IF = 0.941
69M. Anagnostopoulos, G. Kambourakis, P. Kopanos, G. Louloudakis, S. Gritzalis, DNS Amplification Attack Revisited, Computers & Security, Vol. 39, pp. 475-485, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404813001405/pdfft?md5=695....
, indexed in SCI-E, IF = 1.172
70D. Damopoulos, G. Kambourakis, S. Gritzalis, From Keyloggers to Touchloggers: Take the Rough with the Smooth, Computers & Security, Vol. 32, pp. 102-114, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404812001654/pdfft?md5=4e7....
, indexed in SCI-E, IF = 1.172
71G. Karopoulos, P. Mori, F. Martinelli, Usage Control in SIP-based multimedia delivery, Computers & Security, Vol. 39, pp. 406-418, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S016740481300134X
, indexed in SCI-E, IF = 1.172
72C. Kolias, G. Kambourakis, S. Gritzalis, Attacks and Countermeasures on 802.16: Analysis and Assessment, IEEE Communications Surveys & Tutorials, Vol. 15, No. 1, pp. 487-514, 2013, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6170531&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 6.490
73P. Rizomiliotis, S. Gritzalis, On the security of AUTH, an authentication protocol based on the subspace LPN problem, International Journal of Information Security, Vol. 12, No. 2, pp. 151-154, 2013, Springer,
http://link.springer.com/article/10.1007/s10207-012-0188-z
, indexed in SCI-E, IF = 0.941
74P. Belsis, C. Skourlas, S. Gritzalis, A Wireless System for Secure Electronic Healthcare Records Management, International Journal of Advanced Pervasive and Ubiquitous Computing, Vol. 5, No. 4, pp. 16-32, 2013, IGI Global,
http://www.igi-global.com/journal/international-journal-advanced-pervasive-ubiqu....

75A. Tsohou, Lee H., K. Al-Yafi, V. Weerakkody , R. El-Haddadeh , Z. Irani, T. Medeni, L. Campos, Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries, International Journal of Electronic Government Research, Vol. 8, No. 3, pp. 63-77, 2012, IGI Global

76A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Analyzing Trajectories of Information Security Awareness, Information Technology & People, Vol. 25, No. 3, 2012, Emerald,
http://www.emeraldinsight.com/journals.htm?articleid=17047485&show=abstract
, indexed in SCI-E, IF = 0.767
77H. H. Chan, E. Konstantinou, A. Kontogeorgis, C. H. Tan, What is your “birthday elliptic curves”?, Finite Fields and Applications, Vol. 18, No. 6, 2012, Elsevier
, indexed in SCI-E
78A. Loukas, D. Damopoulos, S. A. Menesidou, Maria Eleni Skarkala, G. Kambourakis, S. Gritzalis, MILC: A Secure and Privacy-Preserving Mobile Instant Locator with Chatting, Information System Frontiers, Vol. 14, No. 3, pp. 481-497, 2012, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10796-010-9254-0.pdf
, indexed in SCI-E, IF = 0.851
79A. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, Flexible Convolutional Codes: Variable Rate and Complexity, IEEE Transactions on Communications, Vol. 3, pp. 608-613, 2012, IEEE Press,
doi:10.1109/TCOMM.2011.121211.110124
, indexed in SCI-E, IF = 1.979
80A. Tsakountakis, G. Kambourakis, S. Gritzalis, SIPA: Generic and Secure Accounting for SIP, Security and Communication Networks, Vol. 5, No. 9, pp. 1006-1027, 2012, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.387/pdf
, indexed in SCI-E, IF = 0.311
81D. Damopoulos, S. A. Menesidou, G. Kambourakis, M. Papadaki, N. Clarke, S. Gritzalis, Evaluation of Anomaly-Based IDS for Mobile Devices Using Machine Learning Classifiers, Security and Communication Networks, Vol. 5, No. 1, pp. 3-14, 2012, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.341/pdf
, indexed in SCI-E, IF = 0.311
82E. Konstantinou, Efficient Cluster-based Group Key Agreement Protocols for Wireless Ad Hoc Networks, Journal of Networks and Computer Applications, Vol. 34, No. 1, pp. 384-393, 2011, Elsevier
, indexed in SCI-E
83P. Belsis, D. Vassis, C. Skourlas, Identifying and Utilizing Secure paths in Ad-hoc Assistive Medical Environments, Security Communication Networks Journal , 2011, Wiley, (to appear),
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122
, indexed in SCI-E
84C. Kolias, G. Kambourakis, M. Maragoudakis, Swarm Intelligence in Intrusion Detection: A Survey, Computers & Security, Vol. 30, No. 8, pp. 625-642, 2011, Elsevier,
www.elsevier.com/locate/cose
, indexed in SCI-E, IF = 0.868
85V. Kolias, C. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, TELS: A Voice-Response Internet-based Learning System, Journal of Internet Technology, Vol. 12, No. 2, pp. 217-235, 2011, Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, ROC,
http://jit.ndhu.edu.tw/
, indexed in SCI-E, IF = 0.508
86I. Terzis, G. Kambourakis, G. Karopoulos, C. Lambrinoudakis, Privacy Preserving Context Transfer Schemes for 4G Networks, Wireless Communications and Mobile Computing, Vol. 11, No. 2, pp. 289–302, 2011, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/wcm.1019/abstract
, indexed in SCI-E, IF = 0.884
87E. Makri, E. Konstantinou, Constant Round Group Key Agreement Protocols: A Comparative Study, Computers and Security, Vol. 30, No. 8, pp. 643-678, 2011, Elsevier
, indexed in SCI-E
88E. Konstantinou, A. Kontogeorgis, Ramanujan Invariants for Discriminants Congruent to 5 mod 24, International Journal of Number Theory, Vol. 8, No. 1, 2011, World Scientific

89E. Konstantinou, A. Kontogeorgis, Some Remarks on the Construction of Class Field Polynomials, Advances in Mathematics of Communications, Vol. 5, No. 1, pp. 109-118, 2011
, indexed in SCI-E
90E. Klaoudatou, E. Konstantinou, G. Kambourakis, S. Gritzalis, A Survey on Cluster-based Group Key Agreement Protocols for WSNs, IEEE Communications Surveys and Tutorials, Vol. 13, No. 3, pp. 429-442, 2011, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5522466&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 6.311
91G. Kambourakis, C. Kolias, S. Gritzalis, J. H. Park, DoS Attacks Exploiting Signaling in UMTS and IMS, Computer Communications, Vol. 34, No. 3, pp. 226-235, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S014036641000085X/pdfft?md5=942....
, indexed in SCI-E, IF = 1.044
92G. Karopoulos, G. Kambourakis, S. Gritzalis, PrivaSIP: Ad-hoc Identity Privacy in SIP, Computer Standards and Interfaces, Vol. 33, No. 3, pp. 301-314, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548910000942/pdfft?md5=d68....
, indexed in SCI-E, IF = 1.257
93P. Belsis, C. Skourlas, S. Gritzalis, Secure electronic healthcare records management in wireless environments, Journal of Information Technology Research, Vol. 4, No. 4, pp. 1-17, 2011, IGI Global,
http://www.igi-global.com/article/secure-electronic-healthcare-records-managemen....

94C. Kalloniatis, P. Belsis, S. Gritzalis, A Soft Computing approach for Privacy Requirements Engineering, Journal of Applied Soft Computing, Vol. 11, No. 7, pp. 4341-4348, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S156849461000270X/pdfft?md5=de7....
, indexed in SCI-E, IF = 2.612
95G. Frantzeskou, S. MacDonell, E. Stamatatos, S. Georgiou, S. Gritzalis, The significance of user-defined identifiers in Java source code authorship identification, International Journal of Computer Systems Science and Engineering, Vol. 26, No. 2, pp. 139-148, 2011,
http://aut.researchgateway.ac.nz/bitstream/handle/10292/3469/Frantzeskou%20et%20....
, indexed in SCI-E, IF = 0.371
96F. Pereniguez, R. Marin-Lopez, G. Kambourakis, S. Gritzalis, A. F. Gomez, PrivaKERB: A User Privacy Framework for Kerberos, Computers & Security, Vol. 30, No. 6-7, pp. 446-463, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404811000617/pdfft?md5=774....
, indexed in SCI-E, IF = 0.868
97P. Rizomiliotis, On the Security of the Feng-Liao-Yang family of Boolean functions with optimal algebraic immunity against fast algebraic attacks, Designs, Codes and Cryptography, Vol. 57, No. 3, pp. 283-292, 2010, Springer,
http://www.springerlink.com/content/yj27532v5481857v/
, indexed in SCI-E, IF = 0.958
98P. Rizomiliotis, On the Resistance of Boolean Functions against Algebraic Attacks using Univariate Polynomial Representation, IEEE Transactions on Information Theory, Vol. 56, pp. 4014-4024, 2010, IEEE Press,
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5508623
, indexed in SCI-E, IF = 2.650
99A. Mitseva, E. Aivaloglou, A. Marchitti, N. R. Prasad, C. Skianis, S. Gritzalis, A. Waller, T. Bauge, S. Pennington, Towards Adaptive Security for Convergent Wireless Sensor Networks in Beyond 3G Environments, Wireless Communications and Mobile Computing, Vol. 10, No. 9, pp. 1193-1207, 2010, Wiley Inderscience,
http://onlinelibrary.wiley.com/doi/10.1002/wcm.678/pdf
, indexed in SCI-E, IF = 0.810
100A. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, New Constructions of High-Performance Low-Complexity Convolutional Codes, IEEE Transactions on Communications, Vol. 58, No. 7, pp. 1950 - 1961, 2010, IEEE Press,
doi:10.1109/TCOMM.2010.07.090149
, indexed in SCI-E, IF = 1.979
101P. Rizomiliotis, A. Bogris, D. Syvridis, Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication, IEEE Journal of Quantum Electronics, Vol. 46, No. 3, pp. 377-383, 2010, IEEE Press,
doi: 10.1109/JQE.2009.2034028
, indexed in SCI-E, IF = 2.113
102E. Konstantinou, A. Kontogeorgis, Y. Stamatiou, C. Zaroliagis, On the Efficient Generation of Prime Order Elliptic Curves, Journal of Cryptology, Vol. 23, pp. 477-503, 2010, Springer
, indexed in SCI-E
103E. Konstantinou, A. Kontogeorgis, Ramanujan’s Class Invariants and Their Use in Elliptic Curve Cryptography, Computers and Mathematics with Applications, Vol. 59, No. 8, pp. 2901-2917, 2010, Elsevier
, indexed in SCI-E
104D. Vassis, P. Belsis, C. Skourlas, G. Pantziou, Providing advanced remote medical treatment services through pervasive environments, Personal and Ubiquitous Computing , Vol. 14, No. 4, pp. 563-573, 2010, Springer,
http://www.springerlink.com/content/b50x6444t50116t8/
, indexed in SCI-E
105G. Kambourakis, E. Konstantinou, A. Douma, M. Anagnostopoulos, G. Fotiadis, Efficient Certification Path Discovery for MANET, EURASIP Journal on Wireless Communications and Networking, Vol. 2010, pp. 1-16, 2010, Hindawi Publishing Corporation,
http://jwcn.eurasipjournals.com/
, indexed in SCI-E, IF = 0.815
106A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Aligning Security Awareness with Information Systems Security Management, Journal of Information Systems Security, Vol. 6, No. 1, pp. 36-64, 2010,
http://www.jissec.org/Contents/V6/N1/V6N1-Tsohou.html

107G. Kambourakis, S. Gritzalis, J. H. Park, Device Authentication in Wireless and Pervasive Environments, Intelligent Automation and Soft Computing (AutoSoft), Vol. 16, No. 3, pp. 399-418, 2010, TSI Press,
http://wacong.org/autosoft/auto/163Abstracts/KAMBOURAKIS-GRITZALIS-PARK.pdf
, indexed in SCI-E, IF = 0.187
108G. Karopoulos, G. Kambourakis, S. Gritzalis, E. Konstantinou, A Framework for Identity Privacy in SIP, Journal of Network and Computer Applications, Vol. 33, No. 1, pp. 16-28, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1084804509001052/pdfft?md5=575....
, indexed in SCI-E, IF = 0.660
109P. Rizomiliotis, Improving the high order nonlinearity lower bound for Boolean functions with given Algebraic Immunity, Discrete Applied Mathematics, Vol. 158, No. 18, pp. 2049-2055, 2010, Elsevier,
doi:10.1016/j.dam.2010.08.023
, indexed in SCI-E, IF = 0.862
110E. Kosta, C. Kalloniatis, L. Mitrou, S. Gritzalis, Data protection issues pertaining to social networking under EU law, Transforming Government: People, Process, and Policy journal, Vol. 4, No. 2, pp. 193-201, 2010, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=1750-6166&volume=4&issue=2&artic....

111G. Kambourakis, D. Geneiatakis, S. Gritzalis, T. Dagiuklas, C. Lambrinoudakis, S. Ehlert, J. Fiedler, High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation, International Journal of Disaster Recovery and Business Continuity, Vol. 1, No. 1, pp. 11-30, 2010, SERSC,
http://www.sersc.org/journals/IJDRBC/vol1_no1_2010/2.pdf

112A. Tsohou, C. Lambrinoudakis, S. Kokolakis, S. Gritzalis, The Importance of Context-Dependent Privacy Requirements and Perceptions to the Design of Privacy-Aware Systems, UPGRADE, Vol. 11, No. 1, pp. 32-37, 2010, CEPIS,
http://www.cepis.org/files/cepisupgrade/issue-1-2010-tsohouetc.pdf

113F. Pereniguez, G. Kambourakis, R. Marin-Lopez, S. Gritzalis, A. F. Gomez, Privacy-Enhanced Fast Re-authentication for EAP-based Next Generation Network, Computer Communications, Vol. 33, No. 14, pp. 1682-1694, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366410000964/pdfft?md5=d07....
, indexed in SCI-E, IF = 0.815
114G. Kambourakis, E. Konstantinou, S. Gritzalis, Revisiting WiMAX MBS Security, Computers and Mathematics with Applications, Vol. 60, No. 2, pp. 217-223, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0898122110000052/pdfft?md5=53d....
, indexed in SCI-E, IF = 1.472
115A. Tsohou, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, A Security Standards’ Framework to facilitate Best Practices’ Awareness and Conformity, Information Management & Computer Security, Vol. 18, No. 5, pp. 350-365, 2010, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=18&issue=5&arti....

116C. Kolias, V. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, Design and implementation of a VoiceXML-driven Wiki Application for Assistive Environments on the Web, Personal and Ubiquitous Computing, Vol. 14, No. 6, pp. 527-539, 2010, Springer,
http://www.springer.com/computer/hci/journal/779
, indexed in SCI-E, IF = 1.137
117L. Boukas, G. Kambourakis, S. Gritzalis, Pandora: An SMS-oriented m-informational system for educational realms, Journal of Network and Computer Applications, Vol. 32, No. 3, pp. 684-702, 2009, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1084804508000672/pdfft?md5=a9d....
, indexed in SCI-E, IF = 1.111
118P. Rizomiliotis, E. Rekleitis, S. Gritzalis, Security Analysis of the Song-Mitchell Authentication Protocol for Low-Cost RFID tags, IEEE Communications Letters, Vol. 13, No. 4, pp. 274-276, 2009, IEEE Press,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4815081
, indexed in SCI-E, IF = 1.463
119E. Konstantinou, A. Kontogeorgis, Computing Polynomials of the Ramanujan t_n class invariants, Canadian Mathematical Bulletin, Vol. 52, No. 4, pp. 583-597, 2009
, indexed in SCI-E
120E. Aivaloglou, S. Gritzalis, Hybrid Trust and Reputation Management for Sensor Networks, Wireless Networks, Vol. 16, No. 5, pp. 1493-1510, 2009, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs11276-009-0216-8.pdf
, indexed in SCI-E, IF = 1.088
121A. Tsakountakis, G. Kambourakis, S. Gritzalis, A Generic Accounting Scheme for Next Generation Networks, Computer Networks, Vol. 53, No. 14, pp. 2408-2426, 2009, Elsevier,
http://www.sciencedirect.com/science/article/pii/S138912860900156X/pdfft?md5=da3....
, indexed in SCI-E, IF = 1.201
122M. Karyda, S. Gritzalis, J. H. Park, S. Kokolakis, Privacy and Fair Information Practices in Ubiquitous Environments: Research Challenges and Future Directions, Internet Research, Vol. 19, No. 2, pp. 194-208, 2009, Emerald ,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=19&issue=2&arti....
, indexed in SCI-E, IF = 0.844
123P. Rizomiliotis, A. Tsohou, C. Lambrinoudakis, S. Gritzalis, Security and Privacy Issues in Bipolar Disorder Research, The Journal on Information Technology in Healthcare, Vol. 7, No. 4, pp. 244-250, 2009, HL7 Ramius Corp

124D. Geneiatakis, C. Lambrinoudakis, G. Kambourakis, An Ontology-based Policy for Deploying Secure SIP-based VoIP Services, Computers & Security (COSE), Vol. 27, No. 7-8, pp. 285-297, 2008, Elsevier,
http://dx.doi.org/10.1016/j.cose.2008.07.002
, indexed in SCI-E, IF = 1.028
125S. Ehlert, G. Zhang , D. Geneiatakis, G. Kambourakis, T. Dagiuklas, J. Mark , D. Sisalem, Two Layer Denial of Service Prevention on SIP VoIP Infrastructures, Computer Communications (COMCOM), Vol. 31, No. 10, pp. 2443-2456, 2008, Elsevier,
http://dx.doi.org/10.1016/j.comcom.2008.03.016
, indexed in SCI-E, IF = 0.619
126T. Balopoulos, S. Gritzalis, S. K. Katsikas, Specifying and Implementing Privacy-preserving protocols, International Journal of Information Security, Vol. 7, No. 6, pp. 395-420, 2008, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10207-008-0057-y.pdf
, indexed in SCI-E, IF = 1.094
127D. Geneiatakis, C. Lambrinoudakis, A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment, Telecommunication Systems, 2008, Springer,
http://dx.doi.org/10.1007/s11235-008-9065-5

128A. Tsohou, S. Kokolakis, M. Karyda, E. Kiountouzis, Investigating information security awareness: research and practice gaps, Information Security Journal: A Global Perspective, Vol. 17, No. 5&6, pp. 207–227, 2008, Taylor & Francis,
http://www.tandfonline.com/doi/pdf/10.1080/19393550802492487

129A. Tsohou, S. Kokolakis, M. Karyda, E. Kiountouzis, Process-Variance Models in Information Security Awareness Research, Information Management and Computer Security, Vol. 16, No. 3, pp. 271 – 287, 2008, Emerald ,
http://www.emeraldinsight.com/journals.htm?articleid=1736849&show=abstract

130A. Bogris, P. Rizomiliotis, K. Chlouverakis, A. Argyris, D. Syvridis, Feedback phase in optically generated chaos: A secret key for cryptography applications, IEEE Journal of Quantum Electronics, Vol. 44, pp. 119-124, 2008, IEEE Press ,
doi: 10.1109/JQE.2007.911687
, indexed in SCI-E, IF = 2.113
131G. Frantzeskou, S. MacDonell, E. Stamatatos, S. Gritzalis, Examining the Significance of high-level programming features in Source-code Author Classification, Journal of Systems and Software, Vol. 81, No. 3, pp. 447-460, 2008, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0164121207000829/pdfft?md5=900....
, indexed in SCI-E, IF = 1.241
132P. Belsis, K. Fragos, S. Gritzalis, C. Skourlas, Applying effective feature selection techniques with Hierarchical Mixtures of Experts for spam classification, Journal of Computer Security, Vol. 16, No. 6, pp. 761-790, 2008, IOS Press,
http://iospress.metapress.com/content/l715124h57m12450/fulltext.pdf

133E. Aivaloglou, S. Gritzalis, C. Skianis, Trust Establishment in Sensor Networks: Behavior-based, Certificate-based, and a Combinational Approach, International Journal of System of Systems Engineering, Vol. 1, No. 1-2, pp. 128-148, 2008, Inderscience Publisher,
http://inderscience.metapress.com/content/t64155m1860p5gn1/fulltext.pdf

134D. Vouyioukas, G. Kambourakis, I. Maglogiannis, A. Rouskas, C. Kolias, S. Gritzalis, Enabling the Provision of Secure Web based M-Health Services utilizing XML based Security Models, Security and Communication Networks, Vol. 1, No. 5, pp. 375-388, 2008, Wiley InterScience,
http://doi.org/10.1002/sec.46
, indexed in SCI-E, IF = 0.904
135G. Frantzeskou, E. Stamatatos, S. Gritzalis, C. Chaski, B. Howald, Identifying Authorship by Byte Level n-grams: The Source Code Author Profile (SCAP) Method, International Journal of Digital Evidence, Vol. 6, No. 1, pp. 1-15, 2007, Economic Crime Institute,
http://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C82....

136S. Gritzalis, P. Belsis, S. K. Katsikas, Interconnecting Autonomous MedicalDomains: Security, Interoperability and Semantic-Driven Perspectives, IEEE Engineering in Medicine and Biology, Vol. 26, No. 5, pp. 23-28, 2007, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4312664&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 1.066
137D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, A. Dagiouklas, S. Gritzalis, A framework for protecting SIP-based infrastructure against Malformed Message Attacks, Computer Networks, Vol. 51, No. 10, pp. 2580-2593, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1389128606003458/pdfft?md5=69c....
, indexed in SCI-E, IF = 0.830
138I. Chatzigiannakis, E. Konstantinou, V. Liagkou, P. Spirakis, Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, Electronic Notes in Theoretical Computer Science, Vol. 171, No. 1, pp. 17-31, 2007, Elsevier

139G. Kambourakis, D. P. Kontoni, A. Rouskas, S. Gritzalis, A PKI Approach for Deploying Modern Secure Distributed e-learning and m-learning Environments, Computers and Education, Vol. 48, No. 1, pp. 1-16, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0360131504001745/pdfft?md5=435....
, indexed in SCI-E, IF = 1.602
140D. Geneiatakis, C. Lambrinoudakis, An Ontology Description for SIP Security Flaws, Computer Communication, Computer Communication, Vol. 30, No. 6, pp. 1367-1374, 2007, Elsevier,
http://dx.doi.org/10.1016/j.comcom.2006.12.023

141E. Konstantinou, Y. Stamatiou, C. Zaroliagis, Efficient Generation of Secure Elliptic Curves, International Journal of Information Security, Vol. 6, No. 1, pp. 47-63, 2007, Springer
, indexed in SCI-E
142G. Karopoulos, G. Kambourakis, S. Gritzalis, Survey of Secure Hand-off Optimization Schemes for Multimedia Services over all-IP Wireless Heterogeneous Networks, IEEE Communications Surveys and Tutorials, Vol. 9, No. 3, pp. 18-28, 2007, IEEE Press,
https://heim.ifi.uio.no/paalee/referencing_publications/ref-sec-karopoulos-comms....
, indexed in SCI-E, IF = 6.348
143P. Belsis, S. Gritzalis, S. K. Katsikas, Partial and fuzzy constraint satisfaction to support coalition formation, ENTCS Electronic Notes on Theoretical Computer Science, Vol. 179, No. 1, pp. 75-86, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1571066107003040/pdf?md5=2e70a....

144E. Aivaloglou, S. Gritzalis, C. Skianis, Towards a flexible trust establishment framework for sensor networks, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 35, No. 3-4, pp. 207-213, 2007, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9049-x.pdf
, indexed in SCI-E, IF = 0.423
145D. Geneiatakis, A. Dagiouklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem, Survey of Security Vulnerabilities in Session Initiation Protocol, IEEE Communications Surveys and Tutorials, Vol. 8, No. 3, pp. 68-81, 2006, IEEE Press,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4020603

146S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis, S. K. Katsikas, A knowledge-based approach to security requirements for e-health applications, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, 2006,
http://www.ejeta.org/specialOct06-issue/ejeta-special-06oct-4.pdf

147G. Kambourakis, A. Rouskas, S. Gritzalis, D. Geneiatakis, Support of Subscribers Certificates in a Hybrid WLAN-3G Environment, Computer Networks, Vol. 50, No. 11, pp. 1843-1859, 2006, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1389128605002653/pdfft?md5=732....
, indexed in SCI-E, IF = 0.631
148L. Mitrou, Videosurveillance in the Decisions of Courts and Data Protection Authority, To Syntagma , Vol. 1, No. 1, 2006, Ekdoseis Sakkoula, (to appear)

149M. Karyda, L. Mitrou, G. Quirchmayr, A framework for outsourcing IS/IT security services, Information Management and Computer Security, Vol. 14, No. 5, pp. 402-415, 2006, Emerald ,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=5&arti....

150L. Mitrou, M. Karyda, Employees Privacy vs. Employers, Telematics and Informatics Journal, Vol. 14, No. 5, pp. 198-217, 2006, Elsevier ,
http://ac.els-cdn.com/S073658530500047X/1-s2.0-S073658530500047X-main.pdf?_tid=2....

151A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Formulating Information Systems Risk Management Strategies through Cultural Theory, Information Management and Computer Security, Vol. 14, No. 3, pp. 198-217, 2006, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=3&arti....

152P. Rizomiliotis, Constructing Periodic Binary Sequences of Maximum Nonlinear Span, IEEE Transactions on Information Theory, Vol. 52, No. 9, pp. 4257-4261, 2006, IEEE Press ,
doi: 10.1109/TIT.2006.880054
, indexed in SCI-E, IF = 2.650
153G. Gousios, E. Aivaloglou, S. Gritzalis, Distributed Component Architectures Security Issues, Computer Standards and Interfaces, Vol. 27, No. 3, pp. 269-284, 2005, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548904000984/pdfft?md5=6bc....
, indexed in SCI-E, IF = 0.620
154G. Kambourakis, I. Maglogiannis, A. Rouskas, PKI-based Secure Mobile Access to Electronic Health Services and Data, Technology and Health Care (T&HC), Vol. 13, pp. 511-526, 2005, IOS Press,
http://iospress.metapress.com/content/5ten0ny42h74vmbl/

155E. Tsekmezoglou, J. Iliadis, A Critical View on Internet Voting Technology, The Electronic Journal for E-Commerce Tools & Applications (eJETA.org), Vol. 1, No. 4, 2005,
http://www.ejeta.org/fourth-issue/ejeta-2005.12.25.00.08.19.pdf

156M. Karyda, E. Kiountouzis, S. Kokolakis, Information Systems Security: A Contextual Perspective, Computers and Security Journal, Vol. 24, No. 3, pp. 246-260, 2005, Elsevier ,
http://www.sciencedirect.com/science/article/pii/S0167404804002378
, indexed in SCI-E, IF = 1.430 (5-year)
157M. Theoharidou, S. Kokolakis, M. Karyda, E. Kiountouzis, The insider threat to Information Systems and the effectiveness of ISO 17799, Computers and Security Journal, Vol. 24, No. 6, pp. 472-484, 2005, Elsevier ,
http://www.sciencedirect.com/science/article/pii/S0167404805000684
, indexed in SCI-E, IF = 1.430 (5-year)
158P. Belsis, E. Kiountouzis, S. Kokolakis, Information systems security from a knowledge management perspective, Information Management and Computer Security, Vol. 13, No. 3, pp. 189-202, 2005, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=13&issue=3&arti....

159S. Kokolakis, C. Lambrinoudakis, ICT security standards for healthcare applications, UPGRADE, Special Issue: Standardization for ICT Security, Vol. 6, No. 4, 2005, CEPIS ,
http://www.cepis.org/upgrade/index.jsp?p=0&n=2168&a=3078

160P. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 5, pp. 1840-1848, 2005, IEEE Press,
doi: 10.1109/TIT.2005.846428
, indexed in SCI-E, IF = 2.650
161P. Rizomiliotis, N. Kalouptsidis, Results on the nonlinear span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 4, pp. 1555-1563, 2005, IEEE Press ,
doi: 10.1109/TIT.2005.844090
, indexed in SCI-E, IF = 2.650
162A. Malatras, G. Pavlou, P. Belsis, S. Gritzalis, C. Skourlas, I. Chalaris, Deploying Pervasive Secure Knowledge Management Infrastructures, International Journal of Pervasive Computing and Communications, Vol. 1, No. 4, pp. 265-276, 2005, Troubador Publishing,
http://www.emeraldinsight.com/journals.htm?issn=1742-7371&volume=1&issue=4&artic....

163L. Gymnopoulos, V. Tsoumas, I. Soupionis, S. Gritzalis, A generic Grid security policy reconciliation framework, Internet Research, Vol. 15, No. 5, pp. 508-517, 2005, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=15&issue=5&arti....
, indexed in SCI-E, IF = 0.688
164D. Lekkas, S. Gritzalis, L. Mitrou, Withdrawing a Declaration of Will: Towards a Framework for Digital Signature Revocation, Internet Research, Vol. 15, No. 4, pp. 400-420, 2005, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.688
165T. Balopoulos, S. Gritzalis, S. K. Katsikas, Specifying Privacy Preserving Protocols in Typed MSR, Computer Standards and Interfaces, Vol. 27, No. 5, pp. 501-512, 2005, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548905000097/pdfft?md5=97a....
, indexed in SCI-E, IF = 0.620
166P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, I. Chalaris, Flexible Secure heterogeneous File Management in Distributed Environments , IADAT Journal of Advanced Technology, Vol. 1, No. 2, pp. 66-69, 2005, IADAT,
http://www.iadat.org/publication/default.htm

167E. Aivaloglou, G. Vouros, Shoplet and the Personal Market Place model for e-commerce, The electronic journal of e-commerce tools and applications, 2004,
http://www.ejeta.org

168L. Mitrou, The new Electronic Privacy Directive, Law of Information and Communication Media, Vol. 2, No. 3, pp. 371-375, 2004, Nomiki Vivliothiki,
http://www.nb.org

169K. Moulinos, J. Iliadis, V. Tsoumas, Towards Secure Sealing of Privacy Policies, Information Management and Computer Security, Vol. 12, No. 4, pp. 350-361, 2004, MCB University Press,
http://dx.doi.org/10.1108/09685220410553569

170E. Loukis, S. Kokolakis, An architecture for a flexible public sector collaborative environment, eJETA, Vol. 1, No. 3, 2004

171G. Kambourakis, A. Rouskas, S. Gritzalis, Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems, EURASIP Journal on Wireless Communications and Networking, Vol. 1, No. 1, pp. 184-197, 2004, Hindawi Publishing Corporation,
http://downloads.hindawi.com/journals/wcn/2004/314541.pdf
, indexed in SCI-E, IF = 0.974
172G. Kambourakis, A. Rouskas, G. Kormentzas, S. Gritzalis, Advanced SSL/TLS based Authentication for Secure WLAN-3G Interworking, IEE Proceedings Communications, Vol. 151, No. 5, pp. 501-506, 2004, IEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1344495&url=http%3A%2F%2F....
, indexed in SCI-E, IF = 0.195
173G. Kambourakis, A. Rouskas, S. Gritzalis, Experimental Analysis of an SSL-based AKA mechanism in 3G-and-beyond Wireless Networks, Wireless Personal Communications, Vol. 29, No. 3-4, pp. 303-321, 2004, Kluwer Academic Publishers / Springer,
http://link.springer.com/content/pdf/10.1023%2FB%3AWIRE.0000047068.20203.57.pdf
, indexed in SCI-E, IF = 0.243
174J. Iliadis, S. Gritzalis, D. Gritzalis, ADoCSI: Towards an Alternative Mechanism for Disseminating Certificate Status Information, Computer Communications, Vol. 26, No. 16, pp. 1851-1862, 2003, Elsevier,
http://www.sciencedirect.com/science/article/pii/S014036640300080X/pdfft?md5=c50....
, indexed in SCI-E, IF = 0.556
175J. Iliadis, S. Gritzalis, D. Spinellis, D. De Cock, B. Preneel, D. Gritzalis, Towards a Framework for Evaluating Certificate Status Information Mechanisms, Computer Communications, Vol. 26, No. 16, pp. 1839-1850, 2003, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366403000793/pdfft?md5=42b....
, indexed in SCI-E, IF = 0.556
176D. Spinellis, K. Moulinos, J. Iliadis, D. Gritzalis, S. Gritzalis, S. K. Katsikas, Deploying a Secure Cyberbazaar by adding Trust on Commercial Transactions, The Electronic Journal for E-Commerce Tools & Applications, Vol. 1, No. 2, 2002, eJETA.org,
http://www.ejeta.org/second-issue/ejeta-2002.05.10.15.43.34.pdf

177N. Kolokotronis, P. Rizomiliotis, N. Kalouptsidis, Minimum linear span approximation of binary sequences, IEEE Transactions on Information Theory, Vol. 48, No. 10, pp. 2758-2764, 2002, IEEE Press ,
doi: 10.1109/TIT.2002.802621
, indexed in SCI-E, IF = 2.650
178S. Gritzalis, D. Gritzalis, K. Moulinos, J. Iliadis, An integrated Architecture for deploying a Virtual Private Medical Network over the Web, Medical Informatics and the Internet in Medicine journal, Vol. 26, No. 1, pp. 49-72, 2001, Taylor & Francis Publications,
http://informahealthcare.com/doi/pdf/10.1080/14639230117731
, indexed in SCI-E, IF = 0.419
179S. Gritzalis, J. Iliadis, S. Oikonomopoulos, Distributed Component Software Security Issues on Deploying a Secure Electronic Marketplace, Information Management and Computer Security, Vol. 8, No. 1, pp. 5-13, 2000, MCB University Press,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=1&artic....

180S. Kokolakis, A. Demopoulos, E. Kiountouzis, The use of business process modelling in information systems security analysis and design, Information Management and Computer Security, Vol. 8, No. 3, pp. 107-116, 2000, MCB,
www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=3&articleid=86....

181S. Kokolakis, E. Kiountouzis, Achieving interoperability in a multiple-security-policies environment, Computers and Security Journal, Vol. 19, No. 3, pp. 267-281, 2000, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404800886150
, indexed in SCI-E, IF = 1.158
182D. Spinellis, S. Kokolakis, S. Gritzalis, Security requirements, risks, and recommendations for small enterprise and home-office environments, Information Management and Computer Security, Vol. 7, No. 3, pp. 121-128, 1999, MCB University Press ,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....

183S. Gritzalis, J. Iliadis, D. Gritzalis, D. Spinellis, S. K. Katsikas, Developing Secure Web based Medical Applications, Medical Informatics and the Internet in Medicine Journal, Vol. 24, No. 1, pp. 75-90, 1999, Taylor & Francis Publications,
http://informahealthcare.com/doi/pdf/10.1080/146392399298537
, indexed in SCI-E, IF = 0.419
184D. Spinellis, S. Gritzalis, J. Iliadis, D. Gritzalis, S. K. Katsikas, Trusted third Party services for deploying secure telemedical applications over the Web, Computers & Security, Vol. 18, No. 7, pp. 627-639, 1999, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404899820410/pdf?md5=25d4c....
, indexed in SCI-E, IF = 0.743
185L. Mitrou, Das Griechische Datenschutzgesetz als Beispiel eine problemlosen Umsetzung der EU Datenschutzrichtlinie, Recht der Datenverarbeitung, Vol. 15, No. 2, pp. 56-63, 1998, Datacontext Fachverlag,
http://www.datakontext.com

186S. K. Katsikas, D. Spinellis, J. Iliadis, B. Blobel, Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach, International Journal of Medical Informatics, Vol. 49, No. 1, pp. 59-68, 1998, Elsevier Science

187S. Kokolakis, D. Gritzalis, S. K. Katsikas, Generic security policies for healthcare information systems, Health Informatics Journal, Vol. 4, No. 3, pp. 184-195, 1998, SAGE ,
http://jhi.sagepub.com/content/4/3-4/184.full.pdf+html

188A. Douma, Mavroudakis Konstantinos, S. K. Katsikas, D. Gritzalis, Design of a neural network for recognition and classification of computer viruses, Computers & Security, Vol. 14, No. 5, pp. 435-448, 1995



University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2019