Journals

Journalyear
Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, “Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications”, International Journal of Information Security, Springer, Volume 18, Issue 1, pp 49–72, February 2019.2019
Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, “Evaluation of password hashing schemes in open source web platforms”, Computers & Security, Elsevier, March 2019.2019
Christoforos Ntantogian, George Poulios, George Karopoulos, Christos Xenakis, “Transforming Malicious Code to ROP Gadgets for Antivirus Evasion”, IET Information Security, March 2019. 2019
Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis, "MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem," Computers & Security, Elsevier Science, Vol. 73, Issue 1, pp:307-325, March, 2018.2018
Lyvas C., Lambrinoudakis C., Geneiatakis D., “Dypermin: Dynamic Permission Mining Framework for Android Platform”, Computers and Security Journal (indexed in ISI/SCI-E), Elsevier, 2018.2018
Kostantinos Papadamou, Savvas Zannettou, Giuseppe Bianchi, Alberto Caponi, Annamaria Recupero, Steven Gevers, George Gugulea, Sorin Teican, Bogdan Chifor, Christos Xenakis, Michael Sirivianos, “Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication, arXiv preprint arXiv:1811.083602018
Christoforos Panos, Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, "Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks," Computer Networks, Elsevier Science, Vol. 113, Issue 1, pp: 94-110, February 2017.2017
Georgiou D., Lambrinoudakis C., “Security Policy Rules and Required Procedures for Two Crucial Threats of Cloud Computing”, International Journal of Electronic Governance, Special Issue on Citizen Rights in the World of the New Computing Paradigms, Inderscience Publishers, 2017 (under review).2017
Christos Xenakis, Christoforos Ntantogian, Orestis Panos, "(U)SimMonitor: a mobile application for security evaluation of cellular networks," Computers & Security, Elsevier Science, Vol. 60, Issue 1, pp: 62-70, July 2016.2016
Furnell S., Katsikas S., Lambrinoudakis C. (Guest Eds.), “Trust, Privacy and Security in Digital Business”, Special Issue of Information (ISSN 2078-2489), Open Access Information Science Journal, MDPI, 2016.2016
Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, "Gaithashing: a two-factor authentication scheme based on gait features," Computers & Security, Elsevier Science, Vol. 52, Issue 1, pp: 17-32, July. 2015.2015
Drogkaris P., Gritzalis S., Kalloniatis C., Lambrinoudakis C., “Hierarchical Multitier Approach for Privacy Policies in e-Government Environments”, Future Internet (indexed in ESCI), Vol. 7, pp. 500-515; DOI:10.3390/fi7040500, MDPI, 2015.2015
Pitropakis N., Pikrakis A., Lambrinoudakis C., "Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments”, International Journal of Information Security (indexed in ISI/SCI-E), Volume 14, Issue 4, pp 299–305, Elsevier, 2015.2015
Christos Xenakis, Christoforos Ntantogian, "An advanced persistent threat in 3G networks: Attacking the home network from roaming networks," Computers & Security, Elsevier Science, Vol. 40, Issue 1, pp:84-94, February 2014.2014
Christoforos Panos, Christos Xenakis, Platon Kotzias, Ioannis Stavrakakis, "A specification-based intrusion detection engine for infrastructure-less networks," Computer Communications, Elsevier Science, Vol. 54, pp: 67-83, Dec. 2014. 2014
Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis, "Evaluating the privacy of Android mobile applications under forensic analysis," Computers & Security, Elsevier Science, Vol. 42, pp:66-76, May 2014. 2014
Pitropakis N., Anastasopoulou D., Pikrakis A., Lambrinoudakis C., "If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments”, Journal of Cloud Computing: Advances, Systems and Applications, Vol.3:20, DOI: 10.1186/s13677-014-0020-6, Springer, 2014.2014
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Obscuring Users' Identity in VoIP/IMS Environments”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 43, pp. 145-158, Elsevier, 2014.2014
Foivos Demertzis, Christos Xenakis, "SOMA-E: Self-Organised Mesh Authentication Extended," Mathematical and Computer Modeling, Elsevier Science, Vol. 57, Issue 7-8, pp: 1606 – 1616, April 2013.2013
Shon T., Park J.H., Lambrinoudakis C., Seigneur J. (Guest Eds.), "Advanced Information Security", Special Issue of the Computers & Mathematics with Applications Journal, Vol.65, Iss.9, pp.1233, Elsevier, May 2013.2013
Camenisch J., Lambrinoudakis C. (Guest Eds.), “Public Key Services and Infrastructures”, Special Issue of the Mathematical and Computer Modelling journal, Vol.57, No. 7-8, Elsevier, 2013.2013
Vrakas N., Lambrinoudakis C., “An Intrusion Detection and Prevention System for IMS and VoIP Services”, International Journal of Information Security (indexed in ISI/SCI-E), Vol. 12, No.3, pp. 201-217, Springer, 2013. 2013
Drogkaris P., Gritzalis S., Lambrinoudakis C., “Employing privacy policies and preferences in modern e-government environments”, International Journal of Electronic Governance, Vol. 6, No. 2, pp. 101-116, Inderscience Publishers, 2013.2013
Vrakas N., Geneiatakis D., Lambrinoudakis C., “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments”, IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), Vol. 15, No.2, pp. 803-819, IEEE Press, 2013.2013
Lambrinoudakis C., “Evaluating and Enriching Information and Communication Technologies Compliance Frameworks with Regard to Privacy”, Information Management & Computer Security, Vol.21, No.3, pp. 177-190, Emerald, 2013.2013
Christoforos Ntantogian, Christos Xenakis, "Questioning the Feasibility of UMTS-GSM Interworking Attacks," Wireless Personal Communications, Springer, Vol. 65, No. 1, pp:157-163, July 2012.2012
Jaatun M.G., Lambrinoudakis C., Rong C. (Guest Eds.), “Security in Cloud Computing”, Special Issue of the Journal of Cloud Computing: Advances, Systems and Applications, Vol.1, Issue 1, Springer, 2012.2012
Shon T., Lambrinoudakis C., Zhou X. (Guest Eds.), “Next Generation Communication and Network Security”, Special Issue of the Security and Communication Networks Journal, Vol.5, No. 10, Wiley, 2012.2012
Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis " A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks ," Computers & Security, Elsevier Science, Vol. 30, Issue 1, pp: 63-80, Jan. 2011.2011
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis " Reducing False Synchronizations in 3G-WLAN Interworking Networks ," IEEE Transactions on Wireless Communications, Vol. 10, No. 11, pp: 3765–3773, Nov. 2011.2011
Vrakas N., Lambrinoudakis C., “A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services”, International Journal of Information Technologies and the Systems Approach, Special Issue on Privacy and Security Issues in IT, Vol.4, Issue 2, pp. 32-47, IGI Global, 2011.2011
Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing (indexed in ISI/SCI-E), Special Issue on Network Security and Digital Forensics in Next Generation Communications, Vol.11, Issue 2, pp. 289-302, Wiley, 2011.2011
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis "A Generic Mechanism for Efficient Authentication in B3G Networks ," Computers & Security, Elsevier Science, Vol. 29, Issue 4, pp: 460-475, June 2010.2010
Tsohou Α., Kokolakis S., Lambrinoudakis C., Gritzalis S., “A Security Standards' framework to facilitate best practices’ Awareness and Conformity”, Information Management & Computer Security, Vol. 18, No.5, pp. 350-365, Emerald, 2010.2010
Lambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiuklas A., Ehlert S., Fiedler J., "High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation", International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010.2010
Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Privacy and Identity Management, Vol. xi, No. 1, pp.32-37, also in Novatica journal, Issue 202 (www.ati.es/novatica), 2010.2010
Christoforos Ntantogian, Christos Xenakis, "One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks ," Wireless Personal Communications, Springer, Vol. 48, Issue 4, pp: 569-584, March 2009.2009
Rizomiliotis P., Tsohou A., Lambrinoudakis C., Gritzalis S., "Security and Privacy Issues in Bipolar Disorder Research", The Journal on Information Technology in Healthcare, Vo. 7, No. 4, pp. 244-250 (republication of the C.28. article), HL7, 2009. 2009
Geneiatakis D., Vrakas N., Lambrinoudakis C., “Utilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 28, Issue 7, pp. 578-591, Elsevier, 2009.2009
Christos Xenakis, Christoforos Ntantogian, Ioannis Stavrakakis, "A network-assisted mobile VPN for securing users data in UMTS ," Computer Communications, Elsevier Science, vol. 31, No. 14, pp. 3315-3327 September 2008.2008
Christos Xenakis, "Security Measures and Weaknesses of the GPRS Security Architecture ," International Journal of Network Security, Vol.6, No.2, pp:158-169, Mar. 2008.2008
Geneiatakis D., Lambrinoudakis C., Kambourakis, G., “An Ontology Based-Policy for Deploying Secure SIP- based VoIP Services”, Computers and Security Journal (indexed in ISI/SCI-E), Vol. 27, Issues 7-8, pp. 285-297, Elsevier, 2008.2008
Christos Xenakis, Christoforos Ntantogian, "Security Architectures for B3G Mobile Networks, " Telecommunication Systems, Springer, Vol.35, pp: 123-139, Aug. 2007.2007
Fischer-Hübner S., Furnell S., Lambrinoudakis C. (Guest Eds.), “Trust, Privacy and Security in Digital Business -2006”, Special Issue of the International Journal of Computer Systems, Science and Engineering, Vol.22, No. 5, CRL Publishing, 2007.2007
Geneiatakis D., Lambrinoudakis C., “A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment”, Telecommunication Systems (indexed in ISI/SCI-E), Vol.36, No.4, pp. 153-159, Springer, 2007.2007
Geneiatakis D., Lambrinoudakis C., “An Ontology Description for SIP Security Flaws”, Computer Communications (indexed in ISI/SCI-E), Vol. 30, Issue 6, pp. 1367-1374, Elsevier, 2007.2007
Gritzalis S., Yannacopoulos A., Lambrinoudakis C., Hatzopoulos P., Katsikas S., "A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments", International Journal of Information Security (indexed in ISI/SCI-E), Vol.6, No.4, pp. 197-211, Springer, 2007.2007
Geneiatakis D., Kambourakis G., Lambrinoudakis C., Dagiuklas A., Gritzalis S., “A Framework for Protecting a SIP-based Infrastructure against Malformed Message Attacks”, Computer Networks Journal (indexed in ISI/SCI-E), Vol. 51, Issue 10, pp. 2580-2593, Elsevier, 2007.2007
Christos Xenakis, Nikos Laoutaris, Lazaros Merakos, Ioannis Stavrakakis, "A Generic Characterization of the Overheads Imposed by IPsec and Associated Cryptographic Algorithms ," Computer Networks, Elsevier Science, Vol. 50, No. 17, Dec 2006, pp. 3225-3241.2006
Christos Xenakis, Lazaros Merakos, "Alternative Schemes for Dynamic Secure VPN Deployment over UMTS," Wireless Personal Communications, Springer, Vol. 36, No. 2, Jan 2006, pp. 163-194.2006
Christos Xenakis, "Malicious actions against the GPRS technology," Computer Virology, Springer, Vol. 2, No. 2, Nov. 2006, pp. 121-133.2006
Geneiatakis D., Dagiuklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., «Survey of Security Vulnerabilities in Session Initiation Protocol», IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), Vol.8, No.3, pp. 68-81, IEEE Press, 3rd Quarter 2006.2006
Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Katsikas S., “A knowledge-based approach to security requirements for e-health applications”, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, October 2006.2006
Lekkas D., Lambrinoudakis C., “Outsourcing Digital Signatures: A solution to key management burden”, Information Management and Computer Security Journal, Special issue on Security Issues of IT Outsourcing, Vol. 14, No. 5, pp. 436-449, Emerald, 2006.2006
Maglogiannis I., Zafiropoulos E., Platis A., Lambrinoudakis C., “Risk analysis of a patient monitoring system using Bayesian Network modeling”, Journal of Biomedical Informatics (indexed in ISI/SCI-E), Vol. 39, No. 6, pp. 637-647, Elsevier, 2006.2006
Dritsas S., Gritzalis D., Lambrinoudakis C., “Protecting privacy and anonymity in pervasive computing: trends and perspectives”, Telematics and Informatics Journal, Special Issue on Privacy and Anonymity in the Global Village, Vol. 23, No. 3, pp. 196-210, Elsevier, 2006.2006
Kokolakis S., Lambrinoudakis C., “ICT Security Standards for Healthcare Applications”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Standardization for ICT Security, Vol. 6, No. 4, pp. 47-54, also in Novatica journal, Issue 176 (www.ati.es/novatica), 2005.2005
Lambrinoudakis C., Gritzalis S., Hatzopoulos P., Yannacopoulos A., Katsikas S., “A formal model for pricing information systems insurance contracts”, Computer Standards and Interfaces (indexed in ISI/SCI-E), Vol. 7, No. 5, pp. 521-532, Elsevier, 2005.2005
Gritzalis S., Lambrinoudakis C., Lekkas D., Deftereos S., “Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments”, IEEE Transactions on Information Technology in BioMedicine (indexed in ISI/SCI-E), Vol. 9, No. 3, pp. 413-423, IEEE Press, 2005.2005
Christos Xenakis, Lazaros Merakos, "Security in third Generation Mobile Networks," Computer Communications, Elsevier Science, Vol. 27, No. 7, pp. 638-650, May 2004. (Most requested article of the Journal)2004
Christos Xenakis, Lazaros Merakos, "IPsec-based End-to-end VPN Deployment over UMTS," Computer Communications, Elsevier Science, vol. 27, No. 17, pp. 1693-1708, November 2004. (8th in the list of most requested articles of the Journal)2004
Aggelis G., Gritzalis S., Lambrinoudakis C., "Mechanisms for Controlling Access in the Global Grid Environment", Internet Research (indexed in ISI/SCI-E), Vol. 14, No. 5, pp. 347-352, Emerald, 2004.2004
Gritzalis D., Lambrinoudakis C., “A Security Architecture for Interconnecting Health Information Systems”, International Journal of Medical Informatics (indexed in ISI/SCI-E), Vol. 73, Issue 3, pp. 305-309, Elsevier, 2004.2004
Deftereos S., Lambrinoudakis C., Gritzalis S., Andriopoulos P., Georgonikou D., Aessopos A., “A macro-directive mechanism to automate updating and processing of the contents of CEN-compatible Electronic Healthcare Records”, Medical Informatics and the Internet in Medicine International Journal (indexed in ISI/SCI-E), Vol.28, No. 1, pp. 21-41, Taylor and Francis Publications, 2003.2003
Lambrinoudakis C., Gritzalis S., Dridi F., Pernul G., “Security Requirements for e-Government Services: A methodological approach for developing a common PKI based security policy”, Computer Communications (indexed in ISI/SCI-E), Vol. 26, Issue 16, pp. 1873-1883, Elsevier, 2003.2003
J.33. Lambrinoudakis C., Maistros G., Bofilios D., Darzentas J., “An Architecture for an Intelligent Support System for Design Validation and Manufacturing of Aerospace Components”, International Transactions in Operational Research (indexed in ISI/SCI-E), Vol. 10(4), pp. 351-363, Blackwell Publishers, 2003.2003
Christos Xenakis, Lazaros Merakos, "On Demand Network-wide VPN Deployment in GPRS," IEEE Network, Vol. 16, No. 6, pp. 28-37, November/December 2002.2002
Deftereos S., Lambrinoudakis C., Andriopoulos P., Farmakis D., Aessopos A., “A Java-based Electronic Healthcare Record software for beta-Thalassaemia”, Journal of Medical Internet Research (indexed in ISI/SCI-E), Vol.3(4):e33, 2001.2001
Konstantopoulos, M., Spyrou, T., Koutsabasis, P., Darzentas, J.S., Lambrinoudakis, C., Darzentas, J., “The Role of Directory Services in Online Education Delivery: The GESTALT Example”, International Journal of Continuing Engineering Education and Life-Long Learning, Vol.11, Nos 1/2, pp. 5-24, Inderscience Enterprises Ltd, 2001.2001
Lambrinoudakis C., Gritzalis S., “Managing Medical and Insurance Information through a Smart Card Based Information System”, Journal of Medical Systems (indexed in ISI/SCI-E), Vol. 24, No. 4, pp. 213-234, Kluwer Academic Publisher, 2000.2000
Lambrinoudakis C., “Smart Card Technology for Deploying a Secure Information Management Framework”, Information Management and Computer Security Journal, Vol. 8, Issue 4, pp. 173-183, MCB University Press, 2000. 2000
Gritzalis, D., Lambrinoudakis C., “A Data Protection Scheme for a Remote Vital Signs Monitoring Healthcare Service”, Medical Informatics and the Internet in Medicine International Journal (indexed in ISI/SCI-E), Vol.25, No.3, pp. 207-224, Taylor and Francis Publications, 2000.2000
Beal D. and Lambrinoudakis C., “Design of a Reconfigurable High Performance Massively Parallel SIMD System”, International Journal of High Speed Computing (indexed in ISI/SCI-E), Vol.7, No.3, pp. 365-390, World Scientific Publishing Company, 1995. 1998
Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis, "A survey of voice and communication protection solutions against wiretapping," Computers & Electrical Engineering, Vol. 77, pp:163-178, July, 2019.2019
© 2019 University of Piraeus, Department of Digital Systems, Systems Security Laboratory. All Rights Reserved.
Facebook
Twitter
YouTube
LinkedIn