Drogkaris P., Gritzalis S., Lambrinoudakis C., “Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era”, Proceedings of the EGOVIS’10 International Conference on Electronic Government and the Information Systems Perspective, K. N. Andersedn, et al. (Eds.), pp. 142 -149, Springer LNCS 6267, Bilbao, Spain, September 2010.

Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Privacy and Identity Management, Vol. xi, No. 1, pp.32-37, also in Novatica journal, Issue 202 (www.ati.es/novatica), 2010.

Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., «Information Systems Security Management: A review and a classification of the ISO standards», Proceedings of the e-Democracy 2009 – 3rd Conference on Electronic Democracy – Next Generation Society: Technological and Legal Issues, A. Sideridis (Ed.), Springer Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics […]

Yiannakopoulos A., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., Katsikas S., “Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms”, Proceedings of the 13th European Symposium on Research in Computer Security – ESORICS 2008, Jajodia S., Lopez J. (Eds), pp. 207-222, Springer LNCS 5283, Malaga, Spain, October 2008.

Drogkaris P., Geneiatakis D., Lambrinoudakis C., Gritzalis S., “Towards an Enhanced Authentication Framework in eGovernment: The Greek case”, EGOV’08 – 7th International Conference on Electronic Government, M. Wimmer et al. (Eds.), Trauner Proceedings (Proceedings on ongoing research, projects, and general development issues), Turin, Italy, September 2008.

Drogkaris P., Geneiatakis D., Lambrinoudakis C., Gritzalis S., “Towards an Enhanced Authentication Framework in eGovernment: The Greek case”, EGOV’08 – 7th International Conference on Electronic Government, M. Wimmer et al. (Eds.), Trauner Proceedings (Proceedings on ongoing research, projects, and general development issues), Turin, Italy, September 2008.

Geneiatakis D., Lambrinoudakis C., “A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks”, Proceedings of the IMS and Mobile Multimedia Workshop, in conjunction with the 4th International Mobile Multimedia Communications Conference – MobiMedia 2008, ACM International Conference Proceedings, Oulu, Finland, 2008.

Geneiatakis D., Lambrinoudakis C., “A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks”, Proceedings of the IMS and Mobile Multimedia Workshop, in conjunction with the 4th International Mobile Multimedia Communications Conference – MobiMedia 2008, ACM International Conference Proceedings, Oulu, Finland, 2008.

Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study” Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), M. Logothetis et al. (Eds), Patras, Greece, July 2006.

Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study” Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), M. Logothetis et al. (Eds), Patras, Greece, July 2006.

Gymnopoulos L., Karyda M., Balopoulos T., Dritsas S., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Developing a Security Patterns Repository for Secure Applications Design”, Proceedings of the ECIW 2006 5th European Conference on Information Warfare and Security, D. Remenyi et al. (Eds.), pp. 51-60, published by ACL Academic Conferences Limited, Helsinki, Finland, June 2006.

Karyda M., Balopoulos T., Dritsas S., Gymnopoulos L., Kokolakis S., Lambrinoudakis C., Gritzalis S., “An Ontology for Secure e-Government Applications”, Proceedings of the DeSeGov’06 Workshop on Dependability and Security in eGovernment (in conjunction with ARES 2006 1st International Conference on Availability, Reliability, and Security), A. Tjoa, E. Schweighofer (Eds.), pp. 1033-1037, IEEE Computer Society Press, […]

Katsikas S., Yannacopoulos A., Gritzalis S., Lambrinoudakis C., Hatzopoulos P., “How much should we pay for security?”, Proceedings of the IFIP WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, P. Dowland, S. Furnell, B. Thuraisingham, X. C. Wang (Eds.), pp.59-70, Vol.193, Springer, Fairfax, USA, December […]

Katsikas S., Yannacopoulos A., Gritzalis S., Lambrinoudakis C., Hatzopoulos P., “How much should we pay for security?”, Proceedings of the IFIP WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, P. Dowland, S. Furnell, B. Thuraisingham, X. C. Wang (Eds.), pp.59-70, Vol.193, Springer, Fairfax, USA, December […]

Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Employing Ontologies for the Development of Security Critical Applications: The Secure e-Poll Paradigm”, Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernemnt, Funabashi M., Grzech A. (Eds.), pp.187-201, Springer, Poznan, Poland, October 2005.

Dritsas S., Mallios J., Gritzalis D., Lambrinoudakis C., “Applicability of Privacy Enhancing Technologies in Ubiquitous Computing Environments”, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005 – Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU’05, P. Georgiadis, S. Gritzalis, Y. Marias (Eds.), pp. 61-70, Diaylos Press, Santorini, Greece, […]

Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “SIP Message Tampering: The SQL code INJECTION attack”, Proceedings of the 13th IEEE International Conference on Software Telecommunications and Computer Networks (SoftCOM 2005), N. Rozic et al. (Eds.), pp. 176-181, IEEE Press, Split, Croatia, September 2005.

© 2022 University of Piraeus, Department of Digital Systems, Systems Security Laboratory. All Rights Reserved.
Facebook
Twitter
YouTube
LinkedIn