This is the list of refereed journals of the NMSLab team.

2016

  1. P. Kotzanikolaou, C. Patsakis, E. Magkos, M. Korakakis. Lightweight private proximity testing for geospatial social networks. In Computer Communications, Vol. 73, Part B, 1 January 2016, pp. 263–270.

2015

  1. Eleni Kavvadia, Spyros Sagiadinos, Konstantinos Oikonomou, Giorgos Tsioutsiouliklis, and Sonia Aïssa, “Elastic Virtual Machine Placement in Cloud Computing Network Environments,” Computer Networks, Elsevier, Vol. 93, No. P3 (December 2015), pp: 435-447, 2015.
  2. Tsoumanis, Georgios, Eleni Kavvadia, and Konstantinos Oikonomou. “A v (irtual)-City implementation for promoting cultural heritage.” International Journal of Computational Intelligence Studies 4.2 (2015): 173-191
  3. Vasileios Komianos, Eleni Kavvadia, and Konstantinos Oikonomou, “Cultural heritage recommendations and user navigation in large scale virtual environments,” accepted for publication in the International Journal of Computational Intelligence Studies.
  4. George Koufoudakis, Nikolaos Skiadopoulos, Emmanouel Magkos, and Konstantinos Oikonomou, “Synchronization Issues in an Innovative Wireless Sensor Network Architecture Monitoring Ambient Vibrations in Historical Buildings,” in Key Engineering Materials, Vol. 628, pp. 225-230, January 2015.
  5. Konstantinos Oikonomou, George Koufoudakis, Eleni Kavvadia, and Vassilis Chrissikopoulos, “A Wireless Sensor Network Innovative Architecture for Ambient Vibrations Structural Monitoring,” in Key Engineering Materials, Vol. 628, pp. 218-224, January 2015.
  6. Tsohou A., Karyda M., Kokolakis S., (2015) Analyzing the role of Cognitive and Cultural Biases in the Internalization of Information Security Policies: Recommendations for Information Security Awareness Programs, Computers & Security, Vol. 52, pp. 128–141.
  7. Moon J.O., Lee H., Kim J.W., Aktas E., Tsohou A., Choi Y. (2015), Customer Satisfaction from Open Source Software Services in the Presence of Commercially Licensed Software, Asia Pacific Journal of Information Systems, Vol. 25, No. 3, pp. 473-499

2014

  1. George Smaragdakis, Nikolaos Laoutaris, Konstantinos Oikonomou, Ioannis Stavrakakis, and Azer Bestavros, “Distributed Server Migration for Scalable Internet Service Deployment,” IEEE/ACM Transactions on Networking (ToN), Vol. 22, No. 3, pp. 917–930, June 2014.
  2. Tsohou A., Karyda M., Kokolakis S., Kiountouzis E., (2014) Managing the Introduction of Information Security Awareness Programs in Organisations, European Journal of Information Systems, 24, pp. 38-58, ISI impact factor for 2014: 2.213.
  3. Tsohou A., Lee H., Irani A., (2014), Innovative Public Governance Through Cloud Computing: Information Privacy, Business Models And Performance Measurement Challenges, Transforming Government: People, Process and Policy, Vol. 8, No. 2, pp.251 – 282, Emerald.

2013

  1. Tsohou A., Lee H., Irani Z., Weerakkody V., Osman I., and Anouze A., (2013), Proposing a Reference Process Model for the Citizen-Centric Evaluation of E-Government Services, Transforming Government: People, Process and Policy, Vol. 7, No. 2, pp. 240-255, Emerald.

  2. E. Magkos, M. Avlonitis, P. Kotzanikolaou, M. Stefanidakis. “Towards Early Warning Against Internet Worms Based on Critical-Sized Networks”. In: Security and Communication Networks, Vol 6(1), pp. 78-88, Wiley Interscience, 2013.

2012

  1. Tsohou A., Karyda M., Kokolakis S., Kiountouzis E., (2012), Analyzing Trajectories of Information Security Awareness, Information Technology & People, Vol. 25, Issue 3, 2012, Emerald

  2. M. Burmester, E. Magkos, V. Chrissikopoulos. “Modeling Security in Cyber-Physical Systems”. In: International Journal of Critical Infrastructure Protection, Elsevier, In Press, Available online 17 August 2012.

  3. K. Vlachopoulos, E. Magkos and V. Chrissikopoulos. “A Model for Hybrid Evidence Investigation”. In: International Journal of Digital Crime and Forensics (IJDCF), IGI Global, To be published, 2012.

  4. M. Burmester, E. Magkos, V. Chrissikopoulos. “Secure and Privacy-Preserving, Timed Vehicular Communications”. International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 10 (4), pp. 219-229, Inderscience Publishers, 2012.

2011

  1. S., Sioutas, E., Magkos, I., Karydis, V., Verykios: “Uncertainty for Privacy and 2-Dimensional Range Query Distortion”, Journal of Computing Science and Engineering, vol. 5 (3), pp. 210-222, 2011

  2. E. Magkos. “Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey”. International Journal of Information Technologies and the Systems Approach (IJITSA), Vol. 4 (2), pp. 48-69, IGI Global, 2011.

2010

  1. Konstantinos Oikonomou, Dimitrios Kogias, and Ioannis Stavrakakis, “Probabilistic Flooding for Efficient Information Dissemination in Random Graph Topologies,” Computer Networks, Elsevier, Vol. 54, No. 10 (July 2010), pp: 1615-162, 2010.
  2. Leonidas Tzevelekas, Konstantinos Oikonomou, and Ioannis Stavrakakis, “Random Walk with Jumps in Large-scale Random Geometric Graphs,” Computer Communications, Elsevier, Volume 33, Issue 13 (August 2010), pp: 1505-151, 2010.
  3. Konstantinos Oikonomou, and Ioannis Stavrakakis, “Scalable Service Migration in Autonomic Network Environments,” IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Recent Advances in Autonomic Communications, Vol. 28, No. 1, January 2010, pp. 84-94.
  4. Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., (2010), A security standards’ framework to facilitate best practices’ awareness and conformity, Information Management & Computer Security, Vol. 18, No. 5, pp. 350-365, Emerald
  5. Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems, The European Journal of the Informatics Professional (UPGrade), Vol. XI, Issue 1, pp. 32-37.
  6. Tsohou A., Karyda M., Kokolakis S., Kiountouzis E., (2010), Aligning Security Awareness with Information Systems Security Management, Journal of Information System Security, Vol. 6, No. 1, pp. 36-54.
  7. E. Magkos, P. Kotzanikolaou. “Achieving Privacy and Access Control in Pervasive Computing Environments”. International Journal of Security and Communication Networks (SCN), Special Issue on “Physical Layer Security in Mobile Devices and Networks”, Wiley (accepted for publication– October 2010)

2009

  1. Tsohou A., Rizomiliotis P., Lambrinoudakis C., Gritzalis S., (2009), Security and Privacy Issues in Bipolar Disorder Research, The Journal on Information Technology in Healthcare, Vo. 7, No. 4, pp. 244-250

  2. E. Magkos, M. Maragoudakis, V. Chrissikopoulos, S. Gritzalis. “Accurate and Large-Scale Privacy-Preserving Data Mining using the Election Paradigm”. In: Data & Knowledge Engineering 68(2009), pp. 1124-1236, Elsevier, 2009.

  3. P. Kotzanikolaou, D. Vergados, G. Stergiou and E. Magkos. “Multi-Layer Key Establishment for Large Scale Sensor Networks”. In: International Journal of Security and Networks (IJSN), Vol. 3(1), pp. 1-9, Inderscience Publishers, 2009.

  4. M. Avlonitis, E. Magkos, M. Stefanidakis, and V. Chrissikopoulos. “Treating Scalability and Modeling Human Countermeasures Against Local Preference Worms via Gradient models”. In: Journal in Computer Virology, Springer Paris, Vol. 5 (4), pp. 357-371, 2009.

  5. P. Kotzanikolaou, E. Magkos, D. Vergados and M. Stefanidakis. “Secure and Practical Key Establishment for Distributed Sensor Networks”. In: Security and Communication Networks, Wiley, Volume 2, Issue 6, pp 595 – 610, 2009.

2008

  1. Tsohou A., Kokolakis S., Karyda M., Kiountouzis E., (2008), Investigating information security awareness: research and practice gaps, Information Security Journal: A Global Perspective, Vol.17, No. 5-6, pp. 207-227, Taylor and Francis

  2. Tsohou A., Kokolakis S., Karyda M., Kiountouzis E., (2008), Process-Variance Models in Information Security Awareness Research, Information Management and Computer Security, Vol.16, No. 3, pp. 271 – 287, 2008, Emerald (Chosen as a Highly Commended Award Winner for Outstanding Paper at the Emerald Literati Network Awards for Excellence 2009).

  3. V. Stathopoulos, P. Kotzanikolaou, and E. Magkos, “Secure Log Management for Privacy Assurance in Electronic Communications”, In: Computers & Security, Elsevier, Volume 27 (7-8), pp. 298-308, 2008.

2007

  1. Konstantinos Oikonomou and Ioannis Stavrakakis, “An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2007, Article ID 64238, 8 pages, 2007.
  2. E. Magkos, P. Kotzanikolaou, C. Douligeris. “Towards Secure Online Elections: Models, Primitives and Open Issues”, In: Electronic Government, an International Journal, Inderscience Publishers, Volume 4 – Issue 3, pp. 249-268, 2007.
  3. M. Avlonitis, E. Magkos, M. Stefanidakis, and V. Chrissikopoulos. A Spatial Stochastic Model for Worm Propagation: Scale Effects. In: Journal of Computer Virology, Vol. 3(2), Springer Paris, pp. 87-92, 2007.

2006

  1. Athanasios Vaios, Konstantinos Oikonomou and Ioannis Stavrakakis, “Analysis of a Topology Control Paradigm in WLAN/WPAN Environments,” Computer Communications Journal, vol. 29, 11, July 2006, pp. 2096-210.
  2. Konstantinos Oikonomou and Ioannis Stavrakakis, “Energy Considerations for Topology-Unaware TDMA MAC Protocols,” Ad-Hoc Networks Journal, Elsevier Science., Vol. 4, Issue 3, pp. 359-379, May 2006.
  3. Tsohou A., Karyda M., Kokolakis S., Kiountouzis E., (2006), Formulating Information Systems Risk Management Strategies through Cultural Theory, Information Management and Computer Security, Vol. 14, No. 3, pp. 198-217, Emerald

2005

  1. Konstantinos Oikonomou, Nikos Pronios and Ioannis Stavrakakis, “Performance Analysis of Topology-Unaware TDMA MAC Schemes for Ad-Hoc Networks with Topology Control,” Computer Communications, Elsevier Science, Volume 28, Issue 3, February 2005, pp 313-324.
  2. Athanasios Vaios, Konstantinos Oikonomou, Nikolaos Zinelis, Ioannis Stavrakakis, “Increasing Capacity in Dual-band WLANs through Ad-hoc Networking,” International Journal of Wireless and Mobile Computing (IJWMC), Special Issue on Wireless Ad Hoc Networking, 2005.
  3. Konstantinos Oikonomou and Ioannis Stavrakakis, “Analysis of Topology-Unaware TDMA MAC Policies for Ad-Hoc Networks Under Diverse Traffic Loads,” ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), October 2005, Vol. 9, pp. 25-38.

2004

  1. Konstantinos Oikonomou and Ioannis Stavrakakis, “Analysis of a Probabilistic Topology-Unaware TDMA MAC Policy for Ad-Hoc Networks,” IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Quality-of-Service Delivery in Variable Topology Networks, Vol. 22, No. 7, September 2004, pp. 1286-1300.

2003

  1. M. Burmester, E. Magkos, V. Chrissikopoulos: “Uncoercible e-bidding Games”. In Electronic Commerce Research Journal, Vol. 4, Special Issue on Security Aspects in E-Commerce, Kluwer Academic Publishers, pp. 113-125, 2003.

  2. Ε. Μάγκος. Ένα Υβριδικό Μοντέλο Ανάκτησης Κλειδιού. In Cyprus Computer Society Journal, Issue 3. pp. 35-40, 2003.

2002

  1. E. Magkos, and V. Chrissikopoulos. Equitably Fair Internet Voting. In Journal of Internet Technology, Vol. 3(3), Special Issue on Network Security, pp. 187-193, 2002.