G. Aggelinos and S. Katsikas, “Disaster Recovery Analysis and Management Method (DRAMM): An IT management tool,” in 2012 16th Panhellenic Conference on Informatics, Piraeus, 2012, pp. 99-104.

G. Aggelinos and S.K. Katsikas, “Disaster Recovery Analysis and Management Method (DRAMM): An IT Management tool”, in Proceedings, PCI 2012, Piraeus, Greece, 2012.

E. Darra, C. Ntantogian, C. Xenakis, S. Katsikas, “A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks”, in Proceeding, Trust, Privacy and Security in Digital Business – 8th International Conference, TrustBus 2011, Toulouse, France, σελ. 138-149, 2011.

I. Kantzavelou and S. Katsikas, “Playing games with internal attackers repeatedly”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-6, 2009. (Invited).

T. Kostis, A. Goudosis, K. Galanis and S.K. Katsikas, “Applying simulator-defined radar countermeasure systems techniques to computer network security systems”, in Proceedings, European Modelling and Simulation Conference, Athens, Greece, pp. 130-135, 2009.

G. Spathoulas and S. Katsikas, “Using a fuzzy inference system to reduce false positives in intrusion detection”, in Proceedings, 16th IEEE International Workshop on Systems, Signals and Image Processing (IWSSIP 2009), Chalkis, Greece, pp. 1-4, 2009. (Invited).

G. Aggelinos and S.K. Katsikas, “Integrating Disaster Recovery Plan Activities into the System Development Life Cycle”, in Proceedings, Mediterranean Conference of Information Systems (MCIS 2009), Athens, Greece, pp. 835-845, 2009.

Yiannakopoulos A., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., Katsikas S., “Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms”, Proceedings of the 13th European Symposium on Research in Computer Security – ESORICS 2008, Jajodia S., Lopez J. (Eds), pp. 207-222, Springer LNCS 5283, Malaga, Spain, October 2008.

I. Kantzavelou, S. Katsikas, “A generic intrusion detection game model in IT security”, in Proceedings, TrustBus 2008, Regensburg, Germany, σελ. 151-162, 2008.

E. Michailidis, S.K. Katsikas, E. Georgopoulos, “Intrusion detection using evolutionary neural networks”, in Proceedings, PCI , Samos, Greece, 2008.

T.G. Kostis, K.G. Galanis, S.K. Katsikas, “Simulator implementation of an IF-ISAR system for studies in target glint”, in Proceedings, PCI Samos, Greece, 2008.

S.S. Pappas, N. Harkiolakis, P. Karampelas, L. Economou, S.K. Katsikas, “A new algorithm for on-line multivariate ARMA identification using multimodel partitioning theory”, in Proceedings, PCI, Samos, Greece, 2008.

A.N. Yannacopoulos, C. Lambrinoudakis, S. Gritzalis, S.Z. Xanthopoulos, S.K. Katsikas, “Modeling privacy insurance contracts and their utilization in risk management for ICT firms”, in Proceedings, Malaga, Spain, ESORICS 2008.

P. Belsis, S. Gritzalis, S. Katsikas, “Optimized Multi-domain Secure Interoperation using Soft Constraints”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 78-85, 2006.

Z. Le, J. Ford, V. Karkaletsis, V. Spiliopoulos, S. Katsikas, and F. Makedon, “Secure Group Collaboration in an Open Healthcare Environment”, in Proceedings of the Fourth Annual International Conference on Information Communication Technologies in Health (ICICTH 2006), Samos, Greece, 2006.

G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Source code author identification based on N-gram author profiles”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, June 2006, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 508-515, 2006.

G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Effective Identification of Source Code Authors Using Byte-Level Information”, in Proceedings of the 28th International Conference on Software Engineering ICSE 2006 – Emerging Results Track, May 2006, Shanghai, China, ACM Press, σελ. 893-896, 2006.

P. Belsis, S. Gritzalis, S.K.Katsikas, “Partial and Fuzzy Constraint satisfaction to Support coalition formation”, in Proceedings of the STM 2006 2nd Workshop on Security and Trust Management (in conjunction with ESORICS 2006), P. Samarati, S. Etalle (Eds.), σελ. 130-141, 2006.

T. Balopoulos, L. Gymnopoulos, M. Karyda, S. Kokolakis, S. Gritzalis, S.K. Katsikas, “A Framework for exploiting security expertise in application development”, in Proceedings of TRUSTBUS 2006, Copenhagen, Denmark, σελ. 62-70, 2006.

S.S. Pappas, A.K. Leros, S.K. Katsikas, “Multivariate AR model order estimation with unknown process order”, in Proceedings, 10th Panhellenic Conference on Informatics, Volos, Greece, σελ. 787-797, 2005.

V.C. Moussas, S.D. Likothanassis, S.K. Katsikas, and A.K. Leros, “Adaptive On-Line Multiple Source Detection”, in Proceedings, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’05), Philadelphia, PA, USA, σελ. IV1029 – IV1032, 2005.

Katsikas S., Yannacopoulos A., Gritzalis S., Lambrinoudakis C., Hatzopoulos P., “How much should we pay for security?”, Proceedings of the IFIP WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, P. Dowland, S. Furnell, B. Thuraisingham, X. C. Wang (Eds.), pp.59-70, Vol.193, Springer, Fairfax, USA, December 2005.

T. Balopoulos, S. Gritzalis and S. Katsikas, “Specifying electronic Voting Protocols in Typed MSR”, in Proceedings of the ACM CCS 2005 Computer and Communications Security Conference – Workshop on Privacy in the Electronic Society (WPES), Alexandria, VA, USA, σελ. 35-39, 2005.

P. Belsis, S. Gritzalis and S.K. Katsikas, “A scalable security architecture enabling coalition formation between autonomous domains”, in Proceedings, 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT ’05), Athens, Greece, σελ. 560-565, 2005.

S.K. Katsikas, J. Lopez and G. Pernul, “Trust, privacy and security in e-business: Requirements and solutions”, in Proceedings, 10th Panhellenic Conference on Informatics, Volos, Greece, σελ. 548-558, 2005.

F. Trochoutsos, S. Gritzalis, S. Katsikas, G. Haramis, “Information Systems Security Effective Guidelines for Participants”, in Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, September 2005, Athens, Greece.

S.K. Katsikas, “Assuring Critical Information Infrastructure”, in Proceedings, NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, σελ. 43-55, 2005.

S.K. Katsikas, “Educating health stakeholders in Health Information Systems security”, in Proceedings, EFMI STC 2005 on “Health and Medical Informatics Applications: Educational Aspects”, Athens, Greece, σελ. 29-31, 2005.

S.K. Katsikas, A.N. Yannacopoulos, S. Gritzalis, C. Lambrinoudakis and P. Hatzopoulos, “How much should we pay for security?”, in Proceedings, IFIP 11.1/11.5 Joint Working Conference on Security Management, Integrity and Internal Control in Information Systems, Fairfax, Virginia, σελ. 59-70, Fairfax, VA, USA, 2005.

V.C. Moussas and S.K. Katsikas, “A multi-model approach to fatigue crack growth monitoring and prediction”, in Proceedings, 12th IEEE IWSSIP 2005, Chalkis, Greece, σελ. 57-61, 2005.

S.S. Pappas, A.K. Leros and S.K. Katsikas, “MV AR model order identification using partitioning theory”, in Proceedings, 12th IEEE IWSSIP 2005, Chalkis, Greece, σελ. 51-55, 2005.

S.K. Katsikas, “Doctoral Programme on Information and Communication Systems Security at the University of the Aegean”, in Proceedings, SEC2004, Toulouse, France, 2004.

T. Balopoulos, S. Gritzalis, S.K. Katsikas, “An Extension of Typed MSR for specifying Esoteric Protocols and their Dolev-Yao Intruder”, in Proceedings of the CMS’2004 IFIP TC6/TC11 International Conference on Communications and Multimedia Security, Salford, UK, σελ. 209-221, 2004.

V.C. Moussas, S.K. Katsikas, D.G. Lainiotis, “Application of partitioning algorithms to fatigue crack growth identification and improved lifetime prediction”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.

V.C. Moussas, S.K. Katsikas, D.G. Lainiotis, “Component reliability improvement using extended Kalman filters and non-linear FCG models”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.

S.K. Katsikas, S.D. Likothanassis, A.K. Leros, V.C. Moussas, “An adaptive algorithm for multiple source detection”, in Proceedings of the 1st Inernational Conference on “From Scientific Computing to Computational Engineering” (IC-SCCE), Athens, Greece, 2004.