Pitropakis N., Darra E., Vrakas N., Lambrinoudakis C., “It’s all in the Cloud: Reviewing Cloud Security “, Proceedings of the 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), pp. 355-362, IEEE Xplore, Vietri sul Mare, Italy, December 2013.

Drogkaris P., Gritzalis S., Lambrinoudakis C., “Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era”, Proceedings of the EGOVIS’10 International Conference on Electronic Government and the Information Systems Perspective, K. N. Andersedn, et al. (Eds.), pp. 142 -149, Springer LNCS 6267, Bilbao, Spain, September 2010.

Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., «Information Systems Security Management: A review and a classification of the ISO standards», Proceedings of the e-Democracy 2009 – 3rd Conference on Electronic Democracy – Next Generation Society: Technological and Legal Issues, A. Sideridis (Ed.), Springer Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics […]

Drogkaris P., Gritzalis S., Lambrinoudakis C., «Enabling Secure Data Management in e-Government Environments: The Greek Case», Proceedings of ongoing research and projects of EGOV 09 – 8th International Conference, EGOV 2009, H. J. Scholl, M. Janssen, R. Traunmuller, M. A. Wimmer (Eds.), Trauner Verlag, Linz, Austria, September 2009.

Yiannakopoulos A., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., Katsikas S., “Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms”, Proceedings of the 13th European Symposium on Research in Computer Security – ESORICS 2008, Jajodia S., Lopez J. (Eds), pp. 207-222, Springer LNCS 5283, Malaga, Spain, October 2008.

Drogkaris P., Geneiatakis D., Lambrinoudakis C., Gritzalis S., “Towards an Enhanced Authentication Framework in eGovernment: The Greek case”, EGOV’08 – 7th International Conference on Electronic Government, M. Wimmer et al. (Eds.), Trauner Proceedings (Proceedings on ongoing research, projects, and general development issues), Turin, Italy, September 2008.

Geneiatakis D., Kambourakis G., Lambrinoudakis C., “A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony”, Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’08), pp. 59-68, Springer LNCS 5185, Turin, Italy, September 2008.

Geneiatakis D., Lambrinoudakis C., “A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks”, Proceedings of the IMS and Mobile Multimedia Workshop, in conjunction with the 4th International Mobile Multimedia Communications Conference – MobiMedia 2008, ACM International Conference Proceedings, Oulu, Finland, 2008.

Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study” Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), M. Logothetis et al. (Eds), Patras, Greece, July 2006.

Gymnopoulos L., Karyda M., Balopoulos T., Dritsas S., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Developing a Security Patterns Repository for Secure Applications Design”, Proceedings of the ECIW 2006 5th European Conference on Information Warfare and Security, D. Remenyi et al. (Eds.), pp. 51-60, published by ACL Academic Conferences Limited, Helsinki, Finland, June 2006.

G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. Katsikas, “Source code author identification based on N-gram author profiles”, in Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Athens, Greece, June 2006, I. Maglogiannis, K. Karpouzis, M. Bramer (Eds.), σελ. 508-515, 2006.

Karyda M., Balopoulos T., Dritsas S., Gymnopoulos L., Kokolakis S., Lambrinoudakis C., Gritzalis S., “An Ontology for Secure e-Government Applications”, Proceedings of the DeSeGov’06 Workshop on Dependability and Security in eGovernment (in conjunction with ARES 2006 1st International Conference on Availability, Reliability, and Security), A. Tjoa, E. Schweighofer (Eds.), pp. 1033-1037, IEEE Computer Society Press, […]

Katsikas S., Yannacopoulos A., Gritzalis S., Lambrinoudakis C., Hatzopoulos P., “How much should we pay for security?”, Proceedings of the IFIP WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, P. Dowland, S. Furnell, B. Thuraisingham, X. C. Wang (Eds.), pp.59-70, Vol.193, Springer, Fairfax, USA, December […]

Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Employing Ontologies for the Development of Security Critical Applications: The Secure e-Poll Paradigm”, Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernemnt, Funabashi M., Grzech A. (Eds.), pp.187-201, Springer, Poznan, Poland, October 2005.

Dritsas S., Mallios J., Gritzalis D., Lambrinoudakis C., “Applicability of Privacy Enhancing Technologies in Ubiquitous Computing Environments”, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005 – Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU’05, P. Georgiadis, S. Gritzalis, Y. Marias (Eds.), pp. 61-70, Diaylos Press, Santorini, Greece, […]

Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “SIP Message Tampering: The SQL code INJECTION attack”, Proceedings of the 13th IEEE International Conference on Software Telecommunications and Computer Networks (SoftCOM 2005), N. Rozic et al. (Eds.), pp. 176-181, IEEE Press, Split, Croatia, September 2005.

Platis A., Lambrinoudakis C., Leros A., “A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions”, Proceedings of the 1st European PKI Workshop (EuroPKI’2004), S. Katsikas, S. Gritzalis, J. Lopez (Eds), pp. 149-160, Springer, Lecture Notes in Computer Science LNCS 3093, Samos, Greece, June 2004.

© 2019 University of Piraeus, Department of Digital Systems, Systems Security Laboratory. All Rights Reserved.