2021
- Karagiannis, S., & Magkos, E.. (2021). Engaging students in basic cybersecurity concepts using digital game-based learning: computer games as virtual learning environments. In Advances in core computer science-based technologies (pp. 55–81). Springer, cham.
[Bibtex]@incollection{karagiannis2021engaging, title={Engaging Students in Basic Cybersecurity Concepts Using Digital Game-Based Learning: Computer Games as Virtual Learning Environments}, author={Karagiannis, Stylianos and Magkos, Emmanouil}, booktitle={Advances in Core Computer Science-Based Technologies}, pages={55--81}, year={2021}, publisher={Springer, Cham} }
- PIRAS, L., AL-OBEIDALLAH, M. G., PAVLIDIS, M., MOURATIDIS, H., TSOHOU, A., MAGKOS, E., & PRAITANO, A.. (2021). A data scope management service to support privacy by design and gdpr compliancea. Journal of data intelligence, 2(2), 136–165.
[Bibtex]@article{piras2021data, title={A DATA SCOPE MANAGEMENT SERVICE TO SUPPORT PRIVACY BY DESIGN AND GDPR COMPLIANCEa}, author={PIRAS, LUCA and AL-OBEIDALLAH, MOHAMMED GHAZI and PAVLIDIS, MICHALIS and MOURATIDIS, HARALAMBOS and TSOHOU, AGGELIKI and MAGKOS, EMMANOUIL and PRAITANO, ANDREA}, journal={Journal of Data Intelligence}, volume={2}, number={2}, pages={136--165}, year={2021} }
- Gournara, C., & Christopoulou, E.. (2021). Designing outdoor museum experiences for city dwellers and tourists. Paper presented at the 3rd international conference digital culture & audiovisual challenges 2021 (dcac 2021).
[Bibtex]@inproceedings{gournara2021designing, title={Designing outdoor museum experiences for city dwellers and tourists}, author={Gournara, Chrysoula and Christopoulou, Eleni}, booktitle={3rd International Conference Digital Culture & AudioVisual Challenges 2021 (DCAC 2021)}, year={2021}, institution={EasyChair} }
- Koutroumpouchos, N., Ntantogian, C., & Xenakis, C.. (2021). Building trust for smart connected devices: the challenges and pitfalls of trustzone. Sensors, 21(2), 520.
[Bibtex]@article{koutroumpouchos2021building, title={Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone}, author={Koutroumpouchos, Nikolaos and Ntantogian, Christoforos and Xenakis, Christos}, journal={Sensors}, volume={21}, number={2}, pages={520}, year={2021}, publisher={Multidisciplinary Digital Publishing Institute} }
- Ntantogian, C., Bountakas, P., Antonaropoulos, D., Patsakis, C., & Xenakis, C.. (2021). Nodexp: node. js server-side javascript injection vulnerability detection and exploitation. Journal of information security and applications, 58, 102752.
[Bibtex]@article{ntantogian2021nodexp, title={NodeXP: NOde. js server-side JavaScript injection vulnerability DEtection and eXPloitation}, author={Ntantogian, Christoforos and Bountakas, Panagiotis and Antonaropoulos, Dimitris and Patsakis, Constantinos and Xenakis, Christos}, journal={Journal of Information Security and Applications}, volume={58}, pages={102752}, year={2021}, publisher={Elsevier} }
- Lyvas, C., Ntantogian, C., & Xenakis, C.. (2021). [m] allotropism: a metamorphic engine for malicious software variation development. International journal of information security, 1–18.
[Bibtex]@article{lyvas2021m, title={[m] allotROPism: a metamorphic engine for malicious software variation development}, author={Lyvas, Christos and Ntantogian, Christoforos and Xenakis, Christos}, journal={International Journal of Information Security}, pages={1--18}, year={2021}, publisher={Springer} }
- Farao, A., Veroni, E., Ntantogian, C., & Xenakis, C.. (2021). P4g2go: a privacy-preserving scheme for roaming energy consumers of the smart grid-to-go. Sensors, 21(8), 2686.
[Bibtex]@article{farao2021p4g2go, title={P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go}, author={Farao, Aristeidis and Veroni, Eleni and Ntantogian, Christoforos and Xenakis, Christos}, journal={Sensors}, volume={21}, number={8}, pages={2686}, year={2021}, publisher={Multidisciplinary Digital Publishing Institute} }
- Soumelidou, A., & Tsohou, A.. (2021). Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics and informatics, 101592.
[Bibtex]@article{soumelidou2021towards, title={Towards the creation of a Profile of the Information Privacy Aware User through a Systematic Literature review of Information Privacy Awareness}, author={Soumelidou, Aikaterini and Tsohou, Aggeliki}, journal={Telematics and Informatics}, pages={101592}, year={2021}, publisher={Pergamon} }
- PIRAS, L., AL-OBEIDALLAH, M. G., PAVLIDIS, M., MOURATIDIS, H., TSOHOU, A., MAGKOS, E., & PRAITANO, A.. (2021). A data scope management service to support privacy by design and gdpr compliancea. Journal of data intelligence, 2(2), 136–165.
[Bibtex]@article{piras2021data, title={A DATA SCOPE MANAGEMENT SERVICE TO SUPPORT PRIVACY BY DESIGN AND GDPR COMPLIANCEa}, author={PIRAS, LUCA and AL-OBEIDALLAH, MOHAMMED GHAZI and PAVLIDIS, MICHALIS and MOURATIDIS, HARALAMBOS and TSOHOU, AGGELIKI and MAGKOS, EMMANOUIL and PRAITANO, ANDREA}, journal={Journal of Data Intelligence}, volume={2}, number={2}, pages={136--165}, year={2021} }
- Papaioannou, T., Tsohou, A., & Karyda, M.. (2021). Forming digital identities in social networks: the role of privacy concerns and self-esteem. Information & computer security.
[Bibtex]@article{papaioannou2021forming, title={Forming digital identities in social networks: the role of privacy concerns and self-esteem}, author={Papaioannou, Thanos and Tsohou, Aggeliki and Karyda, Maria}, journal={Information \& Computer Security}, year={2021}, publisher={Emerald Publishing Limited} }
- Karagiannis, S., & Magkos, E.. (2021). Engaging students in basic cybersecurity concepts using digital game-based learning: computer games as virtual learning environments. In Advances in core computer science-based technologies (pp. 55–81). Springer, cham.
[Bibtex]@incollection{karagiannis2021engaging, title={Engaging students in basic cybersecurity concepts using digital game-based learning: Computer games as virtual learning environments}, author={Karagiannis, Stylianos and Magkos, Emmanouil}, booktitle={Advances in Core Computer Science-Based Technologies}, pages={55--81}, year={2021}, publisher={Springer, Cham} }
- Marksteiner, S., Marko, N., Smulders, A., Karagiannis, S., Stahl, F., Hamazaryan, H., Schlick, R., Kraxberger, S., & Vasenev, A.. (2021). A process to facilitate automated automotive cybersecurity testing. Paper presented at the 2021 ieee 93rd vehicular technology conference (vtc2021-spring).
[Bibtex]@inproceedings{marksteiner2021process, title={A process to facilitate automated automotive cybersecurity testing}, author={Marksteiner, Stefan and Marko, Nadja and Smulders, Andre and Karagiannis, Stelios and Stahl, Florian and Hamazaryan, Hayk and Schlick, Rupert and Kraxberger, Stefan and Vasenev, Alexandr}, booktitle={2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)}, pages={1--7}, year={2021}, organization={IEEE} }
- Vielberth, M., Glas, M., Dietz, M., Karagiannis, S., Magkos, E., & Pernul, G.. (2021). A digital twin-based cyber range for soc analysts. Paper presented at the Ifip annual conference on data and applications security and privacy.
[Bibtex]@inproceedings{vielberth2021digital, title={A digital twin-based cyber range for SOC analysts}, author={Vielberth, Manfred and Glas, Magdalena and Dietz, Marietheres and Karagiannis, Stylianos and Magkos, Emmanouil and Pernul, G{\"u}nther}, booktitle={IFIP Annual Conference on Data and Applications Security and Privacy}, pages={293--311}, year={2021}, organization={Springer, Cham} }
- Karagiannis, S., Ntantogian, C., Magkos, E., Ribeiro, L. L., & Campos, L.. (2021). Pocketctf: a fully featured approach for hosting portable attack and defense cybersecurity exercises. Information, 12(8), 318.
[Bibtex]@article{karagiannis2021pocketctf, title={PocketCTF: A fully featured approach for hosting portable attack and defense cybersecurity exercises}, author={Karagiannis, Stylianos and Ntantogian, Christoforos and Magkos, Emmanouil and Ribeiro, Lu{\'\i}s L and Campos, Lu{\'\i}s}, journal={Information}, volume={12}, number={8}, pages={318}, year={2021}, publisher={MDPI} }
- Karagiannis, S., Manso, M., Magkos, E., Ribeiro, L. L., & Campos, L.. (2021). Automated and on-demand cybersecurity certification. Paper presented at the 2021 ieee international conference on cyber security and resilience (csr).
[Bibtex]@inproceedings{karagiannis2021automated, title={Automated and On-Demand Cybersecurity Certification}, author={Karagiannis, Stylianos and Manso, Marco and Magkos, Emmanouil and Ribeiro, Lu{\'\i}s L and Campos, Lu{\'\i}s}, booktitle={2021 IEEE International Conference on Cyber Security and Resilience (CSR)}, pages={174--179}, year={2021}, organization={IEEE} }
- Karagiannis, S., Tokatlis, A., Pelekis, S., Kontoulis, M., Doukas, G., Ntanos, C., & Magkos, E.. (2021). A-demo: att&ck documentation, emulation and mitigation operations: deploying and documenting realistic cyberattack scenarios-a rootkit case study. Paper presented at the 25th pan-hellenic conference on informatics.
[Bibtex]@inproceedings{karagiannis2021demo, title={A-DEMO: ATT\&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios-A Rootkit Case Study}, author={Karagiannis, Stylianos and Tokatlis, Alexandros and Pelekis, Sotiris and Kontoulis, Michael and Doukas, George and Ntanos, Christos and Magkos, Emmanouil}, booktitle={25th Pan-Hellenic Conference on Informatics}, pages={328--333}, year={2021} }
2020
- Tsohou, A., Magkos, E., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M., & Crespo, B. G.. (2020). Privacy, security, legal and technology acceptance elicited and consolidated requirements for a gdpr compliance platform. Information & computer security.
[Bibtex]@article{tsohou2020privacy, title={Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform}, author={Tsohou, Aggeliki and Magkos, Emmanouil and Mouratidis, Haralambos and Chrysoloras, George and Piras, Luca and Pavlidis, Michalis and Debussche, Julien and Rotoloni, Marco and Crespo, Beatriz Gallego-Nicasio}, journal={Information \& Computer Security}, year={2020}, publisher={Emerald Publishing Limited} }
- Karagiannis, S., & Magkos, E.. (2020). Engaging students in basic cybersecurity concepts using digital. Advances in core computer science-based technologies: papers in honor of professor nikolaos alexandris, 14, 55.
[Bibtex]@article{karagiannis2020engaging, title={Engaging Students in Basic Cybersecurity Concepts Using Digital}, author={Karagiannis, Stylianos and Magkos, Emmanouil}, journal={Advances in Core Computer Science-Based Technologies: Papers in Honor of Professor Nikolaos Alexandris}, volume={14}, pages={55}, year={2020}, publisher={Springer Nature} }
- Petrakos, N., Monachos, S., Magkos, E., & Kotzanikolaou, P.. (2020). Design and implementation of an anonymous and secure online evaluation protocol. Electronics, 9(9), 1415.
[Bibtex]@article{petrakos2020design, title={Design and Implementation of an Anonymous and Secure Online Evaluation Protocol}, author={Petrakos, Nikolaos and Monachos, Stefanos and Magkos, Emmanouil and Kotzanikolaou, Panayiotis}, journal={Electronics}, volume={9}, number={9}, pages={1415}, year={2020}, publisher={Multidisciplinary Digital Publishing Institute} }
- Magkos, E.. (2020). An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. Information security education. information security in action: 13th ifip wg, 579, 61.
[Bibtex]@article{magkos2020analysis, title={An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools}, author={Magkos, Emmanouil}, journal={INFORMATION SECURITY EDUCATION. INFORMATION SECURITY IN ACTION: 13th Ifip Wg}, volume={579}, pages={61}, year={2020}, publisher={Springer Nature} }
- Piras, L., Al-Obeidallah, M. G., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A., & Crespo, B. G.. (2020). Defend dsm: a data scope management service for model-based privacy by design gdpr compliance. Paper presented at the International conference on trust and privacy in digital business.
[Bibtex]@inproceedings{piras2020defend, title={DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance}, author={Piras, Luca and Al-Obeidallah, Mohammed Ghazi and Pavlidis, Michalis and Mouratidis, Haralambos and Tsohou, Aggeliki and Magkos, Emmanouil and Praitano, Andrea and Iodice, Annarita and Crespo, Beatriz Gallego-Nicasio}, booktitle={International Conference on Trust and Privacy in Digital Business}, pages={186--201}, year={2020}, organization={Springer, Cham} }
- Karagiannis, S., Maragkos-Belmpas, E., & Magkos, E.. (2020). An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. Paper presented at the Ifip world conference on information security education.
[Bibtex]@inproceedings{karagiannis2020analysis, title={An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools}, author={Karagiannis, Stylianos and Maragkos-Belmpas, Elpidoforos and Magkos, Emmanouil}, booktitle={IFIP World Conference on Information Security Education}, pages={61--77}, year={2020}, organization={Springer, Cham} }
- Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A., & Crespo, B. G.. (2020). Defend dsm: a data scope management service for model-based privacy by design gdpr compliance. Paper presented at the Trust, privacy and security in digital business: 17th international conference, trustbus 2020, bratislava, slovakia, september 14–17, 2020, proceedings.
[Bibtex]@inproceedings{mouratidis2020defend, title={DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance}, author={Mouratidis, Haralambos and Tsohou, Aggeliki and Magkos, Emmanouil and Praitano, Andrea and Iodice, Annarita and Crespo, Beatriz Gallego-Nicasio}, booktitle={Trust, Privacy and Security in Digital Business: 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14--17, 2020, Proceedings}, volume={12395}, pages={186}, year={2020}, organization={Springer Nature} }
- Karagiannis, S., & Magkos, E.. (2020). Adapting ctf challenges into virtual cybersecurity learning environments. Information & computer security.
[Bibtex]@article{karagiannis2020adapting, title={Adapting CTF challenges into virtual cybersecurity learning environments}, author={Karagiannis, Stylianos and Magkos, Emmanouil}, journal={Information \& Computer Security}, year={2020}, publisher={Emerald Publishing Limited} }
- Karagiannis, S., Papaioannou, T., Magkos, E., & Tsohou, A.. (2020). Game-based information security/privacy education and awareness: theory and practice. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
[Bibtex]@inproceedings{karagiannis2020game, title={Game-Based Information Security/Privacy Education and Awareness: Theory and Practice}, author={Karagiannis, Stylianos and Papaioannou, Thanos and Magkos, Emmanouil and Tsohou, Aggeliki}, booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems}, pages={509--525}, year={2020}, organization={Springer, Cham} }
- Karagiannis, S., Magkos, E., Ntantogian, C., & Ribeiro, L. L.. (2020). Sandboxing the cyberspace for cybersecurity education and learning. Paper presented at the European symposium on research in computer security.
[Bibtex]@inproceedings{karagiannis2020sandboxing, title={Sandboxing the Cyberspace for Cybersecurity Education and Learning}, author={Karagiannis, Stylianos and Magkos, Emmanouil and Ntantogian, Christoforos and Ribeiro, Lu{\'\i}s L}, booktitle={European Symposium on Research in Computer Security}, pages={181--196}, year={2020}, organization={Springer, Cham} }
- Ringas, D., & Christopoulou, E.. (2020). Effect of urban computing on the public’s perception of place, community, and infrastructure. In Megacities and rapid urbanization: breakthroughs in research and practice (pp. 251–273). Igi global.
[Bibtex]@incollection{ringas2020effect, title={Effect of Urban Computing on the Public's Perception of Place, Community, and Infrastructure}, author={Ringas, Dimitrios and Christopoulou, Eleni}, booktitle={Megacities and Rapid Urbanization: Breakthroughs in Research and Practice}, pages={251--273}, year={2020}, publisher={IGI Global} }
- Karageorgiou, Z., Mavrommati, E., Fotaris, P., & Christopoulou, E.. (2020). Escape room in education: evaluating using experience pyramid model. Paper presented at the 2020 5th south-east europe design automation, computer engineering, computer networks and social media conference (seeda-cecnsm).
[Bibtex]@inproceedings{karageorgiou2020escape, title={Escape room in education: Evaluating using Experience Pyramid Model}, author={Karageorgiou, Zoi and Mavrommati, Eirini and Fotaris, Panagiotis and Christopoulou, Eleni}, booktitle={2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)}, pages={1--8}, year={2020}, organization={IEEE} }
- Mantellos, G., Exarhos, T. P., & Christopoulou, E.. (2020). Human activity and transportation mode recognition using smartphone sensors. Paper presented at the 2020 5th south-east europe design automation, computer engineering, computer networks and social media conference (seeda-cecnsm).
[Bibtex]@inproceedings{mantellos2020human, title={Human activity and transportation mode recognition using smartphone sensors}, author={Mantellos, George and Exarhos, Themis P and Christopoulou, Eleni}, booktitle={2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)}, pages={1--7}, year={2020}, organization={IEEE} }
- Karagiannis, S., Magkos, E., Ntantogian, C., & Ribeiro, L. L.. (2020). Sandboxing the cyberspace for cybersecurity education and learning. Paper presented at the European symposium on research in computer security.
[Bibtex]@inproceedings{karagiannis2020sandboxing, title={Sandboxing the Cyberspace for Cybersecurity Education and Learning}, author={Karagiannis, Stylianos and Magkos, Emmanouil and Ntantogian, Christoforos and Ribeiro, Lu{\'\i}s L}, booktitle={European Symposium on Research in Computer Security}, pages={181--196}, year={2020}, organization={Springer} }
- Tsohou, A., Siponen, M., & Newman, M.. (2020). How does information technology-based service degradation influence consumers’ use of services? an information technology-based service degradation decision theory. Journal of information technology, 35(1), 2–24.
[Bibtex]@article{tsohou2020does, title={How does information technology-based service degradation influence consumers’ use of services? An information technology-based service degradation decision theory}, author={Tsohou, Aggeliki and Siponen, Mikko and Newman, Mike}, journal={Journal of Information Technology}, volume={35}, number={1}, pages={2--24}, year={2020}, publisher={SAGE Publications Sage UK: London, England} }
- Paspatis, I., Tsohou, A., & Kokolakis, S.. (2020). Appaware: a policy visualization model for mobile applications. Information & computer security.
[Bibtex]@article{paspatis2020appaware, title={AppAware: a policy visualization model for mobile applications}, author={Paspatis, Ioannis and Tsohou, Aggeliki and Kokolakis, Spyros}, journal={Information \& Computer Security}, year={2020}, publisher={Emerald Publishing Limited} }
- Tsohou, A., Magkos, E., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M., & Crespo, B. G.. (2020). Privacy, security, legal and technology acceptance elicited and consolidated requirements for a gdpr compliance platform. Information & computer security.
[Bibtex]@article{tsohou2020privacy, title={Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform}, author={Tsohou, Aggeliki and Magkos, Emmanouil and Mouratidis, Haralambos and Chrysoloras, George and Piras, Luca and Pavlidis, Michalis and Debussche, Julien and Rotoloni, Marco and Crespo, Beatriz Gallego-Nicasio}, journal={Information \& Computer Security}, year={2020}, publisher={Emerald Publishing Limited} }
- Diamantopoulou, V., Tsohou, A., & Karyda, M.. (2020). From iso/iec27001: 2013 and iso/iec27002: 2013 to gdpr compliance controls. Information & computer security.
[Bibtex]@article{diamantopoulou2020iso, title={From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls}, author={Diamantopoulou, Vasiliki and Tsohou, Aggeliki and Karyda, Maria}, journal={Information \& Computer Security}, year={2020}, publisher={Emerald Publishing Limited} }
- Jiang, H., Tsohou, A., Siponen, M., & Li, Y.. (2020). Examining the side effects of organizational internet monitoring on employees. Internet research.
[Bibtex]@article{jiang2020examining, title={Examining the side effects of organizational Internet monitoring on employees}, author={Jiang, Hemin and Tsohou, Aggeliki and Siponen, Mikko and Li, Ying}, journal={Internet Research}, year={2020}, publisher={Emerald Publishing Limited} }
- Piras, L., Al-Obeidallah, M. G., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A., & Crespo, B. G.. (2020). Defend dsm: a data scope management service for model-based privacy by design gdpr compliance. Paper presented at the International conference on trust and privacy in digital business.
[Bibtex]@inproceedings{piras2020defend, title={DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance}, author={Piras, Luca and Al-Obeidallah, Mohammed Ghazi and Pavlidis, Michalis and Mouratidis, Haralambos and Tsohou, Aggeliki and Magkos, Emmanouil and Praitano, Andrea and Iodice, Annarita and Crespo, Beatriz Gallego-Nicasio}, booktitle={International Conference on Trust and Privacy in Digital Business}, pages={186--201}, year={2020}, organization={Springer, Cham} }
- Siponen, M., & Tsohou, A.. (2020). Demystifying the influential is legends of positivism: response to lee’s commentary. Journal of the association for information systems, 21(6), 1.
[Bibtex]@article{siponen2020demystifying, title={Demystifying the Influential IS Legends of Positivism: Response to Lee’s Commentary}, author={Siponen, Mikko and Tsohou, Aggeliki}, journal={Journal of the Association for Information Systems}, volume={21}, number={6}, pages={1}, year={2020} }
- Skalkos, A., Tsohou, A., Karyda, M., & Kokolakis, S.. (2020). Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis. Computers in human behavior reports, 2, 100034.
[Bibtex]@article{skalkos2020identifying, title={Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis}, author={Skalkos, Andreas and Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros}, journal={Computers in Human Behavior Reports}, volume={2}, pages={100034}, year={2020}, publisher={Elsevier} }
- Karagiannis, S., Papaioannou, T., Magkos, E., & Tsohou, A.. (2020). Game-based information security/privacy education and awareness: theory and practice. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
[Bibtex]@inproceedings{karagiannis2020game, title={Game-Based Information Security/Privacy Education and Awareness: Theory and Practice}, author={Karagiannis, Stylianos and Papaioannou, Thanos and Magkos, Emmanouil and Tsohou, Aggeliki}, booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems}, pages={509--525}, year={2020}, organization={Springer, Cham} }
- Karagiannis, S., & Magkos, E.. (2020). Engaging students in basic cybersecurity concepts using digital. Advances in core computer science-based technologies: papers in honor of professor nikolaos alexandris, 14, 55.
[Bibtex]@article{karagiannis2020engaging, title={Engaging Students in Basic Cybersecurity Concepts Using Digital}, author={Karagiannis, Stylianos and Magkos, Emmanouil}, journal={Advances in Core Computer Science-Based Technologies: Papers in Honor of Professor Nikolaos Alexandris}, volume={14}, pages={55}, year={2020}, publisher={Springer Nature} }
- Vasenev, A., Karagiannis, S., & Mathijssen, R.. (2020). Constructing tool-based security test sequences for vehicles as high-tech data-rich systems.. Paper presented at the Vehits.
[Bibtex]@inproceedings{vasenev2020constructing, title={Constructing Tool-based Security Test Sequences for Vehicles as High-tech Data-rich Systems.}, author={Vasenev, Alexandr and Karagiannis, Stelios and Mathijssen, Roland}, booktitle={VEHITS}, pages={53--58}, year={2020} }
- Magkos, E.. (2020). An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. Information security education. information security in action: 13th ifip wg, 579, 61.
[Bibtex]@article{magkos2020analysis, title={An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools}, author={Magkos, Emmanouil}, journal={INFORMATION SECURITY EDUCATION. INFORMATION SECURITY IN ACTION: 13th Ifip Wg}, volume={579}, pages={61}, year={2020}, publisher={Springer Nature} }
- Karagiannis, S., Maragkos-Belmpas, E., & Magkos, E.. (2020). An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. Paper presented at the Ifip world conference on information security education.
[Bibtex]@inproceedings{karagiannis2020analysis, title={An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools}, author={Karagiannis, Stylianos and Maragkos-Belmpas, Elpidoforos and Magkos, Emmanouil}, booktitle={IFIP World Conference on Information Security Education}, pages={61--77}, year={2020}, organization={Springer, Cham} }
- Campos, L. M., Ribeiro, L., Karydis, I., Karagiannis, S., Pedro, D., Martins, J., Marques, C., Armada, A. G., Leal, R. P., López-Morales, M. J., & others. (2020). Reference scenarios and key performance indicators for 5g ultra-dense networks. Paper presented at the 2020 12th international symposium on communication systems, networks and digital signal processing (csndsp).
[Bibtex]@inproceedings{campos2020reference, title={Reference Scenarios and Key Performance Indicators for 5G Ultra-dense Networks}, author={Campos, Lu{\'e}s Miguel and Ribeiro, Lu{\'\i}s and Karydis, Ioannis and Karagiannis, Stelios and Pedro, D{\'a}rio and Martins, Jorge and Marques, Carlos and Armada, Ana Garcia and Leal, Raquel Perez and L{\'o}pez-Morales, Manuel Jos{\'e} and others}, booktitle={2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)}, pages={1--5}, year={2020}, organization={IEEE} }
- Karagiannis, S., & Magkos, E.. (2020). Adapting ctf challenges into virtual cybersecurity learning environments. Information & computer security.
[Bibtex]@article{karagiannis2020adapting, title={Adapting CTF challenges into virtual cybersecurity learning environments}, author={Karagiannis, Stylianos and Magkos, Emmanouil}, journal={Information \& Computer Security}, year={2020}, publisher={Emerald Publishing Limited} }
- Karagiannis, S., Papaioannou, T., Magkos, E., & Tsohou, A.. (2020). Game-based information security/privacy education and awareness: theory and practice. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
[Bibtex]@inproceedings{karagiannis2020game, title={Game-Based Information Security/Privacy Education and Awareness: Theory and Practice}, author={Karagiannis, Stylianos and Papaioannou, Thanos and Magkos, Emmanouil and Tsohou, Aggeliki}, booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems}, pages={509--525}, year={2020}, organization={Springer, Cham} }
- Karagiannis, S., Magkos, E., Ntantogian, C., & Ribeiro, L. L.. (2020). Sandboxing the cyberspace for cybersecurity education and learning. Paper presented at the European symposium on research in computer security.
[Bibtex]@inproceedings{karagiannis2020sandboxing, title={Sandboxing the cyberspace for cybersecurity education and learning}, author={Karagiannis, Stylianos and Magkos, Emmanouil and Ntantogian, Christoforos and Ribeiro, Lu{\'\i}s L}, booktitle={European Symposium on Research in Computer Security}, pages={181--196}, year={2020}, organization={Springer, Cham} }
2019
- Piras, L., Al-Obeidallah, M. G., Praitano, A., Tsohou, A., Mouratidis, H., Crespo, B. G., Bernard, J. B., Fiorani, M., Magkos, E., Sanz, A. C., & others. (2019). Defend architecture: a privacy by design platform for gdpr compliance. Paper presented at the International conference on trust and privacy in digital business.
[Bibtex]@inproceedings{piras2019defend, title={DEFeND architecture: a privacy by design platform for GDPR compliance}, author={Piras, Luca and Al-Obeidallah, Mohammed Ghazi and Praitano, Andrea and Tsohou, Aggeliki and Mouratidis, Haralambos and Crespo, Beatriz Gallego-Nicasio and Bernard, Jean Baptiste and Fiorani, Marco and Magkos, Emmanouil and Sanz, Andres Castillo and others}, booktitle={International Conference on Trust and Privacy in Digital Business}, pages={78--93}, year={2019}, organization={Springer, Cham} }
- Tsohou, A., Magkos, M., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M., & Crespo, B. G.. (2019). Privacy, security, legal and technology acceptance requirements for a gdpr compliance platform. In Computer security (pp. 204–223). Springer, cham.
[Bibtex]@incollection{tsohou2019privacy, title={Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform}, author={Tsohou, Aggeliki and Magkos, Manos and Mouratidis, Haralambos and Chrysoloras, George and Piras, Luca and Pavlidis, Michalis and Debussche, Julien and Rotoloni, Marco and Crespo, Beatriz Gallego-Nicasio}, booktitle={Computer Security}, pages={204--223}, year={2019}, publisher={Springer, Cham} }
- Skiadopoulos, K., Tsipis, A., Giannakis, K., Koufoudakis, G., Christopoulou, E., Oikonomou, K., Kormentzas, G., & Stavrakakis, I.. (2019). Synchronization of data measurements in wireless sensor networks for iot applications. Ad hoc networks, 89, 47–57.
[Bibtex]@article{skiadopoulos2019synchronization, title={Synchronization of data measurements in wireless sensor networks for IoT applications}, author={Skiadopoulos, Konstantinos and Tsipis, Athanasios and Giannakis, Konstantinos and Koufoudakis, George and Christopoulou, Eleni and Oikonomou, Konstantinos and Kormentzas, George and Stavrakakis, Ioannis}, journal={Ad Hoc Networks}, volume={89}, pages={47--57}, year={2019}, publisher={Elsevier} }
- Karageorgiou, Z., Mavrommati, E., Christopoulou, E., & Fotaris, P.. (2019). Escape room as learning environment: combining technology, theater and creative writing in education. Paper presented at the 2nd international conference digital culture & audiovisual challenges 2019 (dcac 2019).
[Bibtex]@inproceedings{karageorgiou2019escape, title={Escape Room as learning environment: combining technology, theater and creative writing in education}, author={Karageorgiou, Zoi and Mavrommati, Eirini and Christopoulou, Eleni and Fotaris, Panagiotis}, booktitle={2nd International Conference Digital Culture & AudioVisual Challenges 2019 (DCAC 2019)}, year={2019}, institution={EasyChair} }
- Magioladitis, M., Ringas, D., & Christopoulou, E.. (2019). Promoting cultural heritage via gamification and augmented reality. Paper presented at the 2nd international conference digital culture & audiovisual challenges 2019 (dcac 2019).
[Bibtex]@inproceedings{magioladitis2019promoting, title={Promoting cultural heritage via gamification and augmented reality}, author={Magioladitis, Marios and Ringas, Dimitrios and Christopoulou, Eleni}, booktitle={2nd International Conference Digital Culture & AudioVisual Challenges 2019 (DCAC 2019)}, year={2019}, institution={EasyChair} }
- Stasinopoulos, A., Ntantogian, C., & Xenakis, C.. (2019). Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications. International journal of information security, 18(1), 49–72.
[Bibtex]@article{stasinopoulos2019commix, title={Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications}, author={Stasinopoulos, Anastasios and Ntantogian, Christoforos and Xenakis, Christos}, journal={International Journal of Information Security}, volume={18}, number={1}, pages={49--72}, year={2019}, publisher={Springer Berlin Heidelberg} }
- Ntantogian, C., Malliaros, S., & Xenakis, C.. (2019). Evaluation of password hashing schemes in open source web platforms. Computers & security, 84, 206–224.
[Bibtex]@article{ntantogian2019evaluation, title={Evaluation of password hashing schemes in open source web platforms}, author={Ntantogian, Christoforos and Malliaros, Stefanos and Xenakis, Christos}, journal={Computers \& Security}, volume={84}, pages={206--224}, year={2019}, publisher={Elsevier Advanced Technology} }
- Ntantogian, C., Poulios, G., Karopoulos, G., & Xenakis, C.. (2019). Transforming malicious code to rop gadgets for antivirus evasion. Iet information security.
[Bibtex]@article{ntantogian2019transforming, title={Transforming Malicious Code to ROP Gadgets for Antivirus Evasion}, author={Ntantogian, Christoforos and Poulios, Giorgos and Karopoulos, Georgios and Xenakis, Christos}, journal={IET Information Security}, year={2019}, publisher={IET} }
- Ntantogian, C., Veroni, E., Karopoulos, G., & Xenakis, C.. (2019). A survey of voice and communication protection solutions against wiretapping. Computers & electrical engineering, 77, 163–178.
[Bibtex]@article{ntantogian2019survey, title={A survey of voice and communication protection solutions against wiretapping}, author={Ntantogian, Christoforos and Veroni, Eleni and Karopoulos, Georgios and Xenakis, Christos}, journal={Computers \& Electrical Engineering}, volume={77}, pages={163--178}, year={2019}, publisher={Elsevier} }
- Koutroumpouchos, N., Ntantogian, C., Menesidou, S., Liang, K., Gouvas, P., Xenakis, C., & Giannetsos, T.. (2019). Secure edge computing with lightweight control-flow property-based attestation. Paper presented at the 2019 ieee conference on network softwarization (netsoft).
[Bibtex]@inproceedings{koutroumpouchos2019secure, title={Secure edge computing with lightweight control-flow property-based attestation}, author={Koutroumpouchos, Nikos and Ntantogian, Christoforos and Menesidou, Sofia-Anna and Liang, Kaitai and Gouvas, Panagiotis and Xenakis, Christos and Giannetsos, Thanassis}, booktitle={2019 IEEE Conference on Network Softwarization (NetSoft)}, pages={84--92}, year={2019}, organization={IEEE} }
- Bolgouras, V., Ntantogian, C., Panaousis, E., & Xenakis, C.. (2019). Distributed key management in microgrids. Ieee transactions on industrial informatics.
[Bibtex]@article{bolgouras2019distributed, title={Distributed Key Management in Microgrids}, author={Bolgouras, Vaios and Ntantogian, Christoforos and Panaousis, Emmanouil and Xenakis, Christos}, journal={IEEE Transactions on Industrial Informatics}, year={2019}, publisher={IEEE} }
- Ntantogian, C., Xenakis, C., & Lopez, J.. (2019). Sealedgrid: a secure interconnection of technologies for smart grid applications. Paper presented at the Critical information infrastructures security: 14th international conference, critis 2019, linköping, sweden, september 23–25, 2019, revised selected papers.
[Bibtex]@inproceedings{ntantogian2019sealedgrid, title={SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications}, author={Ntantogian, Christoforos and Xenakis, Christos and Lopez, Javier}, booktitle={Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019, Link{\"o}ping, Sweden, September 23--25, 2019, Revised Selected Papers}, volume={11777}, pages={169}, year={2019}, organization={Springer Nature} }
- Koutroumpouchos, N., Lavdanis, G., Veroni, E., Ntantogian, C., & Xenakis, C.. (2019). Objectmap: detecting insecure object deserialization. Paper presented at the Proceedings of the 23rd pan-hellenic conference on informatics.
[Bibtex]@inproceedings{koutroumpouchos2019objectmap, title={ObjectMap: detecting insecure object deserialization}, author={Koutroumpouchos, Nikolaos and Lavdanis, Georgios and Veroni, Eleni and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={Proceedings of the 23rd Pan-Hellenic Conference on Informatics}, pages={67--72}, year={2019} }
- Bampatsikos, M., Ntantogian, C., Xenakis, C., & Thomopoulos, S. C.. (2019). Barrett blockchain regulated remote attestation. Paper presented at the Ieee/wic/acm international conference on web intelligence-companion volume.
[Bibtex]@inproceedings{bampatsikos2019barrett, title={BARRETT BlockchAin Regulated REmote aTTestation}, author={Bampatsikos, Michail and Ntantogian, Christoforos and Xenakis, Christos and Thomopoulos, Stelios CA}, booktitle={IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume}, pages={256--262}, year={2019} }
- Farao, A., Rubio, J. E., Alcaraz, C., Ntantogian, C., Xenakis, C., & Lopez, J.. (2019). Sealedgrid: a secure interconnection of technologies for smart grid applications. Paper presented at the International conference on critical information infrastructures security.
[Bibtex]@inproceedings{farao2019sealedgrid, title={SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications}, author={Farao, Aristeidis and Rubio, Juan Enrique and Alcaraz, Cristina and Ntantogian, Christoforos and Xenakis, Christos and Lopez, Javier}, booktitle={International Conference on Critical Information Infrastructures Security}, pages={169--175}, year={2019}, organization={Springer} }
- Jiang, H., Siponen, M., & Tsohou, A.. (2019). A field experiment for understanding the unintended impact of internet monitoring on employees: policy satisfaction, organizational citizenship behaviour and work motivation. Paper presented at the 27th european conference on information systems (ecis).
[Bibtex]@inproceedings{jiang2019field, title={A FIELD EXPERIMENT FOR UNDERSTANDING THE UNINTENDED IMPACT OF INTERNET MONITORING ON EMPLOYEES: POLICY SATISFACTION, ORGANIZATIONAL CITIZENSHIP BEHAVIOUR AND WORK MOTIVATION}, author={Jiang, Hemin and Siponen, Mikko and Tsohou, Aggeliki}, booktitle={27th European Conference on Information Systems (ECIS)}, year={2019} }
- Piras, L., Al-Obeidallah, M. G., Praitano, A., Tsohou, A., Mouratidis, H., Crespo, B. G., Bernard, J. B., Fiorani, M., Magkos, E., Sanz, A. C., & others. (2019). Defend architecture: a privacy by design platform for gdpr compliance. Paper presented at the International conference on trust and privacy in digital business.
[Bibtex]@inproceedings{piras2019defend, title={DEFeND architecture: a privacy by design platform for GDPR compliance}, author={Piras, Luca and Al-Obeidallah, Mohammed Ghazi and Praitano, Andrea and Tsohou, Aggeliki and Mouratidis, Haralambos and Crespo, Beatriz Gallego-Nicasio and Bernard, Jean Baptiste and Fiorani, Marco and Magkos, Emmanouil and Sanz, Andres Castillo and others}, booktitle={International Conference on Trust and Privacy in Digital Business}, pages={78--93}, year={2019}, organization={Springer, Cham} }
- Diamantopoulou, V., Tsohou, A., & Karyda, M.. (2019). General data protection regulation and iso/iec 27001: 2013: synergies of activities towards organisations’ compliance. Paper presented at the International conference on trust and privacy in digital business.
[Bibtex]@inproceedings{diamantopoulou2019general, title={General data protection regulation and ISO/IEC 27001: 2013: synergies of activities towards organisations’ compliance}, author={Diamantopoulou, Vasiliki and Tsohou, Aggeliki and Karyda, Maria}, booktitle={International Conference on Trust and Privacy in Digital Business}, pages={94--109}, year={2019}, organization={Springer, Cham} }
- Lavranou, R., & Tsohou, A.. (2019). Developing and validating a common body of knowledge for information privacy. Information & computer security.
[Bibtex]@article{lavranou2019developing, title={Developing and validating a common body of knowledge for information privacy}, author={Lavranou, Rena and Tsohou, Aggeliki}, journal={Information \& Computer Security}, year={2019}, publisher={Emerald Publishing Limited} }
- Soumelidou, A., & Tsohou, A.. (2019). Effects of privacy policy visualization on users’ information privacy awareness level. Information technology & people.
[Bibtex]@article{soumelidou2019effects, title={Effects of privacy policy visualization on users’ information privacy awareness level}, author={Soumelidou, Aikaterini and Tsohou, Aggeliki}, journal={Information Technology \& People}, year={2019}, publisher={Emerald Publishing Limited} }
- Diamantopoulou, V., Tsohou, A., & Karyda, M.. (2019). From iso/iec 27002: 2013 information security controls to personal data protection controls: guidelines for gdpr compliance. In Computer security (pp. 238–257). Springer, cham.
[Bibtex]@incollection{diamantopoulou2019iso, title={From ISO/IEC 27002: 2013 information security controls to personal data protection controls: guidelines for GDPR compliance}, author={Diamantopoulou, Vasiliki and Tsohou, Aggeliki and Karyda, Maria}, booktitle={Computer Security}, pages={238--257}, year={2019}, publisher={Springer, Cham} }
- Tsohou, A., Magkos, M., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M., & Crespo, B. G.. (2019). Privacy, security, legal and technology acceptance requirements for a gdpr compliance platform. In Computer security (pp. 204–223). Springer, cham.
[Bibtex]@incollection{tsohou2019privacy, title={Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform}, author={Tsohou, Aggeliki and Magkos, Manos and Mouratidis, Haralambos and Chrysoloras, George and Piras, Luca and Pavlidis, Michalis and Debussche, Julien and Rotoloni, Marco and Crespo, Beatriz Gallego-Nicasio}, booktitle={Computer Security}, pages={204--223}, year={2019}, publisher={Springer, Cham} }
- Gritzalis, A., Tsohou, A., & Lambrinoudakis, C.. (2019). Transparency-enabling information systems: trust relations and privacy concerns in open governance. International journal of electronic governance, 11(3-4), 310–332.
[Bibtex]@article{gritzalis2019transparency, title={Transparency-enabling information systems: trust relations and privacy concerns in open governance}, author={Gritzalis, Aristomenis and Tsohou, Aggeliki and Lambrinoudakis, Costas}, journal={International Journal of Electronic Governance}, volume={11}, number={3-4}, pages={310--332}, year={2019}, publisher={Inderscience Publishers (IEL)} }
- Papaioannou, T., Tsohou, A., & Karyda, M.. (2019). Shaping digital identities in social networks: data elements and the role of privacy concerns. In Computer security (pp. 159–180). Springer, cham.
[Bibtex]@incollection{papaioannou2019shaping, title={Shaping digital identities in social networks: Data elements and the role of privacy concerns}, author={Papaioannou, Thanos and Tsohou, Aggeliki and Karyda, Maria}, booktitle={Computer security}, pages={159--180}, year={2019}, publisher={Springer, Cham} }
2018
- Fanarioti, S., Tsipis, A., Giannakis, K., Koufoudakis, G., Christopoulou, E., Oikonomou, K., & Stavrakakis, I.. (2018). A proposed algorithm for data measurements synchronization in wireless sensor networks. Paper presented at the Second international balkan conference on communications and networking 2018 (balkancom’18).
[Bibtex]@inproceedings{fanarioti2018proposed, title={A proposed algorithm for data measurements synchronization in wireless sensor networks}, author={Fanarioti, Sofia and Tsipis, Athanasios and Giannakis, Konstantinos and Koufoudakis, George and Christopoulou, Eleni and Oikonomou, Konstantinos and Stavrakakis, Ioannis}, booktitle={Second International Balkan Conference on Communications and Networking 2018 (BalkanCom’18)}, pages={1--5}, year={2018} }
- Karopoulos, G., Ntantogian, C., & Xenakis, C.. (2018). Masker: masking for privacy-preserving aggregation in the smart grid ecosystem. Computers & security, 73, 307–325.
[Bibtex]@article{karopoulos2018masker, title={MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem}, author={Karopoulos, Georgios and Ntantogian, Christoforos and Xenakis, Christos}, journal={Computers \& Security}, volume={73}, pages={307--325}, year={2018}, publisher={Elsevier} }
- Kitsaki, T., Angelogianni, A., Ntantogian, C., & Xenakis, C.. (2018). A forensic investigation of android mobile applications. Paper presented at the Proceedings of the 22nd pan-hellenic conference on informatics.
[Bibtex]@inproceedings{kitsaki2018forensic, title={A forensic investigation of Android mobile applications}, author={Kitsaki, Theodoula-Ioanna and Angelogianni, Anna and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={Proceedings of the 22nd Pan-Hellenic Conference on Informatics}, pages={58--63}, year={2018}, organization={ACM} }
- Tsohou, A., & Holtkamp, P.. (2018). Are users competent to comply with information security policies? an analysis of professional competence models. Information technology & people.
[Bibtex]@article{tsohou2018users, title={Are users competent to comply with information security policies? An analysis of professional competence models}, author={Tsohou, Aggeliki and Holtkamp, Philipp}, journal={Information Technology \& People}, year={2018}, publisher={Emerald Publishing Limited} }
- Siponen, M., & Tsohou, A.. (2018). Demystifying the influential is legends of positivism. Journal of the association for information systems, 19(7), 600–617.
[Bibtex]@article{siponen2018demystifying, title={Demystifying the influential IS legends of positivism}, author={Siponen, Mikko and Tsohou, Aggeliki}, journal={Journal of the Association for Information Systems}, volume={19}, number={7}, pages={600--617}, year={2018}, publisher={Association for Information Systems} }
- Paspatis, I., Tsohou, A., & Kokolakis, S.. (2018). Appaware: a model for privacy policy visualization for mobile applications.. Paper presented at the Mcis.
[Bibtex]@inproceedings{paspatis2018appaware, title={AppAware: A Model for Privacy Policy Visualization for Mobile Applications.}, author={Paspatis, Ioannis and Tsohou, Aggeliki and Kokolakis, Spyros}, booktitle={MCIS}, pages={3}, year={2018} }
- Karagiannis, S., & Magkos, E.. (2018). User profiling in cybersecurity education and training. Paper presented at the Mcis2018.
[Bibtex]@inproceedings{karagiannis2018user, title={User Profiling in Cybersecurity Education and Training}, author={Karagiannis, S and Magkos, E}, booktitle={MCIS2018}, year={2018} }
2017
- Kosyfaki, C., Angelova, N. P., Tsohou, A., & Magkos, E.. (2017). The privacy paradox in the context of online health data disclosure by users. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
[Bibtex]@inproceedings{kosyfaki2017privacy, title={The Privacy Paradox in the Context of Online Health Data Disclosure by Users}, author={Kosyfaki, Chrysanthi and Angelova, Nelina P and Tsohou, Aggeliki and Magkos, Emmanouil}, booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems}, pages={421--428}, year={2017}, organization={Springer, Cham} }
- Grammenos, P., Syrengela, N., Magkos, E., & Tsohou, A.. (2017). Internet addiction of young greek adults: psychological aspects and information privacy. In Genedis 2016 (pp. 67–78). Springer, cham.
[Bibtex]@incollection{grammenos2017internet, title={Internet addiction of young Greek adults: psychological aspects and information privacy}, author={Grammenos, P and Syrengela, NA and Magkos, E and Tsohou, A}, booktitle={GeNeDis 2016}, pages={67--78}, year={2017}, publisher={Springer, Cham} }
- Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C.. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer networks, 113, 94–110.
[Bibtex]@article{panos2017analyzing, title={Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks}, author={Panos, Christoforos and Ntantogian, Chirstoforos and Malliaros, Stefanos and Xenakis, Christos}, journal={Computer Networks}, volume={113}, pages={94--110}, year={2017}, publisher={Elsevier} }
- Panou, A., Ntantogian, C., & Xenakis, C.. (2017). Riski: a framework for modeling cyber threats to estimate risk for data breach insurance. Paper presented at the Proceedings of the 21st pan-hellenic conference on informatics.
[Bibtex]@inproceedings{panou2017riski, title={RiSKi: A framework for modeling cyber threats to estimate risk for data breach insurance}, author={Panou, Angeliki and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={Proceedings of the 21st Pan-Hellenic Conference on Informatics}, pages={1--6}, year={2017} }
- Panos, C., Malliaros, S., Ntantogian, C., Panou, A., & Xenakis, C.. (2017). A security evaluation of fido’s uaf protocol in mobile and embedded devices. Paper presented at the International tyrrhenian workshop on digital communication.
[Bibtex]@inproceedings{panos2017security, title={A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices}, author={Panos, Christoforos and Malliaros, Stefanos and Ntantogian, Christoforos and Panou, Angeliki and Xenakis, Christos}, booktitle={International Tyrrhenian Workshop on Digital Communication}, pages={127--142}, year={2017}, organization={Springer} }
- Karopoulos, G., Ntantogian, C., & Xenakis, C.. (2017). Privacy-preserving aggregation in the smart grid. In Security solutions and applied cryptography in smart grid communications (pp. 80–97). Igi global.
[Bibtex]@incollection{karopoulos2017privacy, title={Privacy-Preserving Aggregation in the Smart Grid}, author={Karopoulos, Georgios and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={Security Solutions and Applied Cryptography in Smart Grid Communications}, pages={80--97}, year={2017}, publisher={IGI Global} }
- Tsohou, A., & Kosta, E.. (2017). Enabling valid informed consent for location tracking through privacy awareness of users: a process theory. Computer law & security review, 33(4), 434–457.
[Bibtex]@article{tsohou2017enabling, title={Enabling valid informed consent for location tracking through privacy awareness of users: A process theory}, author={Tsohou, Aggeliki and Kosta, Eleni}, journal={Computer Law \& Security Review}, volume={33}, number={4}, pages={434--457}, year={2017}, publisher={Elsevier Advanced Technology} }
- Diamantopoulou, V., Tsohou, A., Loukis, E. N., & Gritzalis, S.. (2017). Does the development of information systems resources lead to the development of information security resources? an empirical investigation. .
[Bibtex]@article{diamantopoulou2017does, title={Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation}, author={Diamantopoulou, Vasiliki and Tsohou, Aggeliki and Loukis, Euripidis N and Gritzalis, Stefanos}, year={2017} }
- Kosyfaki, C., Angelova, N. P., Tsohou, A., & Magkos, E.. (2017). The privacy paradox in the context of online health data disclosure by users. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
[Bibtex]@inproceedings{kosyfaki2017privacy, title={The Privacy Paradox in the Context of Online Health Data Disclosure by Users}, author={Kosyfaki, Chrysanthi and Angelova, Nelina P and Tsohou, Aggeliki and Magkos, Emmanouil}, booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems}, pages={421--428}, year={2017}, organization={Springer, Cham} }
- Grammenos, P., Syrengela, N., Magkos, E., & Tsohou, A.. (2017). Internet addiction of young greek adults: psychological aspects and information privacy. In Genedis 2016 (pp. 67–78). Springer, cham.
[Bibtex]@incollection{grammenos2017internet, title={Internet addiction of young Greek adults: psychological aspects and information privacy}, author={Grammenos, P and Syrengela, NA and Magkos, E and Tsohou, A}, booktitle={GeNeDis 2016}, pages={67--78}, year={2017}, publisher={Springer, Cham} }
- Gritzalis, A., Tsohou, A., & Lambrinoudakis, C.. (2017). Transparency-enabling systems for open governance: their impact on citizens’ trust and the role of information privacy. Paper presented at the International conference on e-democracy.
[Bibtex]@inproceedings{gritzalis2017transparency, title={Transparency-Enabling Systems for Open Governance: Their Impact on Citizens’ Trust and the Role of Information Privacy}, author={Gritzalis, Aristomenis and Tsohou, Aggeliki and Lambrinoudakis, Costas}, booktitle={International Conference on e-Democracy}, pages={47--63}, year={2017}, organization={Springer, Cham} }
- Lee, H., Tsohou, A., & Choi, Y.. (2017). Embedding persuasive features into policy issues: implications to designing public participation processes. Government information quarterly, 34(4), 591–600.
[Bibtex]@article{lee2017embedding, title={Embedding persuasive features into policy issues: Implications to designing public participation processes}, author={Lee, Habin and Tsohou, Aggeliki and Choi, Youngseok}, journal={Government Information Quarterly}, volume={34}, number={4}, pages={591--600}, year={2017}, publisher={JAI} }
- Ioannis Paspatis, I. P., Aggeliki Tsohou, A. T., & Spyros Kokolakis, S. K.. (2017). Mobile application privacy risks: viber users’ de-anonymization using public data. Paper presented at the Mediterranean conference on information systems (mcis).
[Bibtex]@inproceedings{ioannis2017mobile, title={Mobile application privacy risks: Viber users’ de-anonymization using public data}, author={Ioannis Paspatis, Ioannis Paspatis and Aggeliki Tsohou, Aggeliki Tsohou and Spyros Kokolakis, Spyros Kokolakis}, booktitle={Mediterranean Conference on Information Systems (MCIS)}, year={2017}, organization={Association For Information Systems} }
- Karagiannis, S., & Magkos, E.. (2017). Decentralized internet privacy: towards a blockchain framework for healthcare. Paper presented at the Mcis2017.
[Bibtex]@inproceedings{karagiannis2017decentralized, title={Decentralized Internet Privacy: Towards a Blockchain Framework for Healthcare}, author={Karagiannis, S and Magkos, E}, booktitle={MCIS2017}, year={2017} }
2016
- Kotzanikolaou, P., Patsakis, C., Magkos, E., & Korakakis, M.. (2016). Lightweight private proximity testing for geospatial social networks. Computer communications, 73, 263–270.
[Bibtex]@article{kotzanikolaou2016lightweight, title={Lightweight private proximity testing for geospatial social networks}, author={Kotzanikolaou, Panayiotis and Patsakis, Constantinos and Magkos, Emmanouil and Korakakis, Michalis}, journal={Computer Communications}, volume={73}, pages={263--270}, year={2016}, publisher={Elsevier} }
- Magkos, E.. (2016). National critical infrastructure protection: an identification and assessment methodology. .
[Bibtex]@article{magkos2016national, title={National Critical Infrastructure Protection: An Identification and Assessment Methodology}, author={Magkos, E}, year={2016} }
- Karavaras, E., Magkos, E., & Tsohou, A.. (2016). Low user awareness against social malware: an empirical study and design of a security awareness application. Paper presented at the 13th european mediterranean and middle eastern conference on information systems.
[Bibtex]@inproceedings{karavaras2016low, title={Low user awareness against social malware: An empirical study and design of a security awareness application}, author={Karavaras, Eleftherios and Magkos, Emmanouil and Tsohou, Aggeliki}, booktitle={13th European Mediterranean and Middle Eastern Conference on Information Systems}, volume={13}, pages={1--10}, year={2016} }
- Gritzalis, D., Stergiopoulos, G., Kotzanikolaou, P., Magkos, E., & Lykou, G.. (2016). Critical infrastructure protection: a holistic methodology for greece. Paper presented at the International workshop on the security of industrial control systems and cyber-physical systems.
[Bibtex]@inproceedings{gritzalis2016critical, title={Critical infrastructure protection: a holistic methodology for Greece}, author={Gritzalis, Dimitris and Stergiopoulos, George and Kotzanikolaou, Panayiotis and Magkos, Emmanouil and Lykou, Georgia}, booktitle={International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems}, pages={19--34}, year={2016}, organization={Springer, Cham} }
- Xenakis, C., Ntantogian, C., & Panos, O.. (2016). (u) simmonitor: a mobile application for security evaluation of cellular networks. Computers & security, 60, 62–78.
[Bibtex]@article{xenakis2016u, title={(U) SimMonitor: A mobile application for security evaluation of cellular networks}, author={Xenakis, Christos and Ntantogian, Christoforos and Panos, Orestis}, journal={Computers \& Security}, volume={60}, pages={62--78}, year={2016}, publisher={Elsevier} }
- Malliaros, S., Ntantogian, C., & Xenakis, C.. (2016). Protecting sensitive information in the volatile memory from disclosure attacks. Paper presented at the 2016 11th international conference on availability, reliability and security (ares).
[Bibtex]@inproceedings{malliaros2016protecting, title={Protecting sensitive information in the volatile memory from disclosure attacks}, author={Malliaros, Stefanos and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={2016 11th International Conference on Availability, Reliability and Security (ARES)}, pages={687--693}, year={2016}, organization={IEEE} }
- Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G., & Xenakis, C.. (2016). Evaluation of cryptography usage in android applications. Paper presented at the Proceedings of the 9th eai international conference on bio-inspired information and communications technologies (formerly bionetics).
[Bibtex]@inproceedings{chatzikonstantinou2016evaluation, title={Evaluation of cryptography usage in android applications}, author={Chatzikonstantinou, Alexia and Ntantogian, Christoforos and Karopoulos, Georgios and Xenakis, Christos}, booktitle={Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)}, pages={83--90}, year={2016}, organization={ICST (Institute for Computer Sciences, Social-Informatics and~…} }
- Karavaras, E., Magkos, E., & Tsohou, A.. (2016). Low user awareness against social malware: an empirical study and design of a security awareness application. Paper presented at the European, mediterranean and middle eastern conference on information systems.
[Bibtex]@inproceedings{karavaras2016low, title={LOW USER AWARENESS AGAINST SOCIAL MALWARE: AN EMPIRICAL STUDY AND DESIGN OF A SECURITY AWARENESS APPLICATION}, author={Karavaras, Eleftherios and Magkos, Emmanouil and Tsohou, Aggeliki}, booktitle={European, Mediterranean and Middle Eastern Conference on Information Systems}, year={2016} }
2015
- Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2015). Field experience and user evaluation from a real-world internet application in an urban-scale environment. International journal of intelligent engineering informatics, 3(2-3), 144–165.
[Bibtex]@article{ringas2015field, title={Field experience and user evaluation from a real-world internet application in an urban-scale environment}, author={Ringas, Dimitrios and Christopoulou, Eleni and Stefanidakis, Michail}, journal={International Journal of Intelligent Engineering Informatics}, volume={3}, number={2-3}, pages={144--165}, year={2015}, publisher={Inderscience Publishers (IEL)} }
- Christopoulou, E., & Ringas, D.. (2015). Wild recommendations: presenting citizens relevant content based on use patterns and context. Paper presented at the 2015 6th international conference on information, intelligence, systems and applications (iisa).
[Bibtex]@inproceedings{christopoulou2015wild, title={Wild recommendations: Presenting citizens relevant content based on use patterns and context}, author={Christopoulou, Eleni and Ringas, Dimitrios}, booktitle={2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)}, pages={1--6}, year={2015}, organization={IEEE} }
- Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2015). Content seeking strategies in urban computing applications. Paper presented at the 2015 6th international conference on information, intelligence, systems and applications (iisa).
[Bibtex]@inproceedings{ringas2015content, title={Content seeking strategies in urban computing applications}, author={Ringas, Dimitrios and Christopoulou, Eleni and Stefanidakis, Michail}, booktitle={2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)}, pages={1--6}, year={2015}, organization={IEEE} }
- Ntantogian, C., Valtas, G., Kapetanakis, N., Lalagiannis, F., Karopoulos, G., & Xenakis, C.. (2015). Attacking gsm networks as a script kiddie using commodity hardware and software. Paper presented at the International conference on trust and privacy in digital business.
[Bibtex]@inproceedings{ntantogian2015attacking, title={Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software}, author={Ntantogian, Christoforos and Valtas, Grigoris and Kapetanakis, Nikos and Lalagiannis, Faidon and Karopoulos, Georgios and Xenakis, Christos}, booktitle={International Conference on Trust and Privacy in Digital Business}, pages={73--86}, year={2015}, organization={Springer} }
- Poulios, G., Ntantogian, C., & Xenakis, C.. (2015). Ropinjector: using return oriented programming for polymorphism and antivirus evasion. Blackhat usa.
[Bibtex]@article{poulios2015ropinjector, title={Ropinjector: Using return oriented programming for polymorphism and antivirus evasion}, author={Poulios, Giorgos and Ntantogian, Christoforos and Xenakis, Christos}, journal={Blackhat USA}, year={2015} }
- Xenakis, C., & Ntantogian, C.. (2015). Attacking the baseband modem of mobile phones to breach the users’ privacy and network security. Paper presented at the 2015 7th international conference on cyber conflict: architectures in cyberspace.
[Bibtex]@inproceedings{xenakis2015attacking, title={Attacking the baseband modem of mobile phones to breach the users' privacy and network security}, author={Xenakis, Christos and Ntantogian, Christoforos}, booktitle={2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace}, pages={231--244}, year={2015}, organization={IEEE} }
- Stasinopoulos, A., Ntantogian, C., & Xenakis, C.. (2015). Commix: detecting and exploiting command injection flaws.. Department of digital systems, university of piraeus, blackhat europe, nov, 10–13.
[Bibtex]@article{stasinopoulos2015commix, title={Commix: Detecting and exploiting command injection flaws.}, author={Stasinopoulos, Anastasios and Ntantogian, Christoforos and Xenakis, Christos}, journal={Department of Digital Systems, University of Piraeus, BlackHat Europe, Nov}, pages={10--13}, year={2015} }
- Ntantogian, C., Malliaros, S., & Xenakis, C.. (2015). Gaithashing: a two-factor authentication scheme based on gait features. Computers & security, 52, 17–32.
[Bibtex]@article{ntantogian2015gaithashing, title={Gaithashing: a two-factor authentication scheme based on gait features}, author={Ntantogian, Christoforos and Malliaros, Stefanos and Xenakis, Christos}, journal={Computers \& Security}, volume={52}, pages={17--32}, year={2015}, publisher={Elsevier} }
- Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.. (2015). Managing the introduction of information security awareness programmes in organisations. European journal of information systems, 24(1), 38–58.
[Bibtex]@article{tsohou2015managing, title={Managing the introduction of information security awareness programmes in organisations}, author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos}, journal={European Journal of Information Systems}, volume={24}, number={1}, pages={38--58}, year={2015}, publisher={Taylor \& Francis} }
- Tsohou, A., Karyda, M., & Kokolakis, S.. (2015). Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs. Computers & security, 52, 128–141.
[Bibtex]@article{tsohou2015analyzing, title={Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs}, author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros}, journal={Computers \& security}, volume={52}, pages={128--141}, year={2015}, publisher={Elsevier Advanced Technology} }
- Jiang, H., & Tsohou, A.. (2015). The same antecedents do not fit all activities: an activity-specific model of personal internet use in workplace. .
[Bibtex]@article{jiang2015same, title={The Same Antecedents Do Not Fit All Activities: An Activity-specific Model of Personal Internet Use in Workplace}, author={Jiang, Hemin and Tsohou, Aggeliki}, year={2015} }
- Moon, J. O., Lee, H., Kim, J. W., Aktas, E., Tsohou, A., & Choi, Y.. (2015). Customer satisfaction from open source software services in the presence of commercially licensed software. Asia pacific journal of information systems, 25(3), 473–499.
[Bibtex]@article{moon2015customer, title={Customer satisfaction from open source software services in the presence of commercially licensed software}, author={Moon, Jung Oh and Lee, Habin and Kim, Jong Woo and Aktas, Emel and Tsohou, Aggeliki and Choi, Youngseok}, journal={Asia pacific journal of information systems}, volume={25}, number={3}, pages={473--499}, year={2015}, publisher={The Korea Society of Management Information Systems} }
2014
- Magkos, E., Kotzanikolaou, P., Magioladitis, M., Sioutas, S., & Verykios, V. S.. (2014). Towards secure and practical location privacy through private equality testing. Paper presented at the International conference on privacy in statistical databases.
[Bibtex]@inproceedings{magkos2014towards, title={Towards secure and practical location privacy through private equality testing}, author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Magioladitis, Marios and Sioutas, Spyros and Verykios, Vassilios S}, booktitle={International Conference on Privacy in Statistical Databases}, pages={312--325}, year={2014}, organization={Springer, Cham} }
- Fronimos, D., Magkos, E., & Chrissikopoulos, V.. (2014). Evaluating low interaction honeypots and on their use against advanced persistent threats. Paper presented at the Proceedings of the 18th panhellenic conference on informatics.
[Bibtex]@inproceedings{fronimos2014evaluating, title={Evaluating low interaction honeypots and on their use against advanced persistent threats}, author={Fronimos, D and Magkos, Emmanouil and Chrissikopoulos, Vassilios}, booktitle={Proceedings of the 18th Panhellenic Conference on Informatics}, pages={1--2}, year={2014} }
- Magkos, E., Kleisiari, E., Chanias, P., & Giannakouris-Salalidis, V.. (2014). Parental control and children’s internet safety: the good, the bad and the ugly. Paper presented at the 6th international conference on information law and ethics (icil 2014).
[Bibtex]@inproceedings{magkos2014parental, title={Parental Control and Children’s Internet Safety: The Good, the Bad and the Ugly}, author={Magkos, Emmanouil and Kleisiari, Eleni and Chanias, Panagiotis and Giannakouris-Salalidis, Viktor}, booktitle={6th International Conference on Information Law and Ethics (ICIL 2014)}, year={2014} }
- Korakakis, M., Magkos, E., & Mylonas, P.. (2014). Automated captcha solving: an empirical comparison of selected techniques. Paper presented at the 2014 9th international workshop on semantic and social media adaptation and personalization.
[Bibtex]@inproceedings{korakakis2014automated, title={Automated CAPTCHA solving: An empirical comparison of selected techniques}, author={Korakakis, Michalis and Magkos, Emmanouil and Mylonas, Phivos}, booktitle={2014 9th International Workshop on Semantic and Social Media Adaptation and Personalization}, pages={44--47}, year={2014}, organization={IEEE} }
- Christopoulou, E., Ringas, D., & Garofalakis, J.. (2014). The vision of the sociable smart city. Paper presented at the International conference on distributed, ambient, and pervasive interactions.
[Bibtex]@inproceedings{christopoulou2014vision, title={The vision of the sociable smart city}, author={Christopoulou, Eleni and Ringas, Dimitrios and Garofalakis, John}, booktitle={International Conference on Distributed, Ambient, and Pervasive Interactions}, pages={545--554}, year={2014}, organization={Springer, Cham} }
- Ntantogian, C., Apostolopoulos, D., Marinakis, G., & Xenakis, C.. (2014). Evaluating the privacy of android mobile applications under forensic analysis. Computers & security, 42, 66–76.
[Bibtex]@article{ntantogian2014evaluating, title={Evaluating the privacy of Android mobile applications under forensic analysis}, author={Ntantogian, Christoforos and Apostolopoulos, Dimitris and Marinakis, Giannis and Xenakis, Christos}, journal={Computers \& Security}, volume={42}, pages={66--76}, year={2014}, publisher={Elsevier} }
- Stasinopoulos, A., Ntantogian, C., & Xenakis, C.. (2014). Bypassing xss auditor: taking advantage of badly written php code. Paper presented at the 2014 ieee international symposium on signal processing and information technology (isspit).
[Bibtex]@inproceedings{stasinopoulos2014bypassing, title={Bypassing XSS Auditor: Taking advantage of badly written PHP code}, author={Stasinopoulos, Anastasios and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)}, pages={000290--000295}, year={2014}, organization={IEEE} }
- Xenakis, C., & Ntantogian, C.. (2014). An advanced persistent threat in 3g networks: attacking the home network from roaming networks. Computers & security, 40, 84–94.
[Bibtex]@article{xenakis2014advanced, title={An advanced persistent threat in 3G networks: Attacking the home network from roaming networks}, author={Xenakis, Christos and Ntantogian, Christoforos}, journal={Computers \& Security}, volume={40}, pages={84--94}, year={2014}, publisher={Elsevier} }
- Tsohou, A., Lee, H., & Irani, Z.. (2014). Innovative public governance through cloud computing. Transforming government: people, process and policy.
[Bibtex]@article{tsohou2014innovative, title={Innovative public governance through cloud computing}, author={Tsohou, Aggeliki and Lee, Habin and Irani, Zahir}, journal={Transforming Government: People, Process and Policy}, year={2014}, publisher={Emerald Group Publishing Limited} }
- Jiang, H., & Tsohou, A.. (2014). Expressive or instrumental: the dual perspective model of personal web usage at workplace. .
[Bibtex]@article{jiang2014expressive, title={EXPRESSIVE OR INSTRUMENTAL: THE DUAL PERSPECTIVE MODEL OF PERSONAL WEB USAGE AT WORKPLACE}, author={Jiang, Hemin and Tsohou, Aggeliki}, year={2014} }
- Jiang, H., & Tsohou, A.. (2014). The dual nature of personal web usage at workplace: impacts, antecedents and regulating policies. .
[Bibtex]@article{jiang2014dual, title={The dual nature of personal web usage at workplace: impacts, antecedents and regulating policies}, author={Jiang, Hemin and Tsohou, Aggeliki}, year={2014} }
- Koufi, V., Malamateniou, F., Tsohou, A., & Vassilacopoulos, G.. (2014). A framework for privacy-preserving access to next-generation ehrs. In E-health–for continuity of care (pp. 740–744). Ios press.
[Bibtex]@incollection{koufi2014framework, title={A framework for privacy-preserving access to next-generation EHRs}, author={Koufi, Vassiliki and Malamateniou, Flora and Tsohou, Aggeliki and Vassilacopoulos, George}, booktitle={e-Health--For Continuity of Care}, pages={740--744}, year={2014}, publisher={IOS Press} }
2013
- Magkos, E., Avlonitis, M., Kotzanikolaou, P., & Stefanidakis, M.. (2013). Towards early warning against internet worms based on critical-sized networks. Security and communication networks, 6(1), 78–88.
[Bibtex]@article{magkos2013towards, title={Towards Early Warning Against Internet Worms Based on Critical-Sized Networks}, author={Magkos, Emmanouil and Avlonitis, Markos and Kotzanikolaou, Panayiotis and Stefanidakis, Michalis}, journal={Security and Communication Networks}, volume={6}, number={1}, pages={78--88}, year={2013}, publisher={Wiley Interscience} }
- Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2013). T-abac: an attribute-based access control model for real-time availability in highly dynamic systems. Paper presented at the Ieee symposium on computers and communications – iscc 2013.
[Bibtex]@inproceedings{burmester2013t, title={T-ABAC: An Attribute-Based Access Control Model for Real-Time Availability in Highly Dynamic Systems}, author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilis}, booktitle={IEEE Symposium on Computers and Communications - ISCC 2013}, year={2013}, organization={IEEE} }
- Ringas, D., & Christopoulou, E.. (2013). Collective city memory: field experience on the effect of urban computing on community. Paper presented at the Proceedings of the 6th international conference on communities and technologies.
[Bibtex]@inproceedings{ringas2013collective, title={Collective city memory: field experience on the effect of urban computing on community}, author={Ringas, Dimitrios and Christopoulou, Eleni}, booktitle={Proceedings of the 6th International Conference on Communities and Technologies}, pages={157--165}, year={2013} }
- Christopoulou, E., & Ringas, D.. (2013). Learning activities in a sociable smart city.. Ixd&a, 17, 29–42.
[Bibtex]@article{christopoulou2013learning, title={Learning Activities in a Sociable Smart City.}, author={Christopoulou, Eleni and Ringas, Dimitris}, journal={IxD\&A}, volume={17}, pages={29--42}, year={2013} }
- Christopoulou, E., Ringas, D., & Garofalakis, J. D.. (2013). Introduction to the proceedings of the sociable smart city 2013 workshop.. Paper presented at the Intelligent environments (workshops).
[Bibtex]@inproceedings{christopoulou2013introduction, title={Introduction to the Proceedings of the Sociable Smart City 2013 Workshop.}, author={Christopoulou, Eleni and Ringas, Dimitris and Garofalakis, John D}, booktitle={Intelligent Environments (Workshops)}, pages={615--616}, year={2013} }
- Christopoulou, E., & Ringas, D.. (2013). Towards the sociable smart city. Paper presented at the Workshop proceedings of the 9th international conference on intelligent environments.
[Bibtex]@inproceedings{christopoulou2013towards, title={Towards the Sociable Smart City}, author={Christopoulou, Eleni and Ringas, Dimitrios}, booktitle={Workshop Proceedings of the 9th International Conference on Intelligent Environments}, pages={673--677}, year={2013}, organization={IOS Press} }
- Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2013). Infusing collective memory into the city landscape. Paper presented at the Proceedings of the hybrid city conference 2013: subtle revolutions.
[Bibtex]@inproceedings{ringas2013infusing, title={Infusing Collective Memory into the City Landscape}, author={Ringas, Dimitrios and Christopoulou, E and Stefanidakis, M}, booktitle={Proceedings of the Hybrid City Conference 2013: Subtle rEvolutions}, pages={23--25}, year={2013} }
- Apostolopoulos, D., Marinakis, G., Ntantogian, C., & Xenakis, C.. (2013). Discovering authentication credentials in volatile memory of android mobile devices. Paper presented at the Conference on e-business, e-services and e-society.
[Bibtex]@inproceedings{apostolopoulos2013discovering, title={Discovering authentication credentials in volatile memory of android mobile devices}, author={Apostolopoulos, Dimitris and Marinakis, Giannis and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={Conference on e-Business, e-Services and e-Society}, pages={178--185}, year={2013}, organization={Springer} }
- Stasinopoulos, A., Ntantogian, C., & Xenakis, C.. (2013). The weakest link on the network: exploiting adsl routers to perform cyber-attacks. Paper presented at the 2013 ieee international symposium on signal processing and information technology (isspit).
[Bibtex]@inproceedings{stasinopoulos2013weakest, title={The weakest link on the network: exploiting ADSL routers to perform cyber-attacks}, author={Stasinopoulos, Anastasios and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={2013 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)}, pages={000135--000139}, year={2013}, organization={IEEE} }
- Xenakis, C., & Ntantogian, C.. (2013). Acquisition and analysis of android memory (cync 2013-cybercrime network conference-8th-10th december 2013 at the o’brien centre for science ucd dublin ireland). Department of digital systems, university of piraeus, greece.
[Bibtex]@article{xenakis2013acquisition, title={Acquisition and Analysis of Android Memory (CyNC 2013-Cybercrime Network Conference-8th-10th December 2013 at the O'Brien Centre for Science UCD Dublin Ireland)}, author={Xenakis, Christos and Ntantogian, Christoforos}, journal={Department of Digital Systems, University of Piraeus, Greece}, year={2013} }
- Petrou, C., Ntantogian, C., & Xenakis, C.. (2013). A better time approximation scheme for e-passports. Paper presented at the International conference on trust, privacy and security in digital business.
[Bibtex]@inproceedings{petrou2013better, title={A better time approximation scheme for e-passports}, author={Petrou, Charalampos and Ntantogian, Christoforos and Xenakis, Christos}, booktitle={International Conference on Trust, Privacy and Security in Digital Business}, pages={13--23}, year={2013}, organization={Springer} }
- Tsohou, A., Lee, H., Irani, Z., Weerakkody, V., Osman, I. H., Anouze, A. L., & Medeni, T.. (2013). Proposing a reference process model for the citizen-centric evaluation of e-government services. Transforming government: people, process and policy.
[Bibtex]@article{tsohou2013proposing, title={Proposing a reference process model for the citizen-centric evaluation of e-government services}, author={Tsohou, Aggeliki and Lee, Habin and Irani, Zahir and Weerakkody, Vishanth and Osman, Ibrahim H and Anouze, Abdel L and Medeni, Tunc}, journal={Transforming Government: People, Process and Policy}, year={2013}, publisher={Emerald Group Publishing Limited} }
- Oh, J., Lee, H., & Tsohou, A.. (2013). Governance of it service procurement: relationship vs network based approach. Governance, 6, 18–2013.
[Bibtex]@article{oh2013governance, title={Governance of IT Service Procurement: Relationship vs Network based Approach}, author={Oh, Jaeyoun and Lee, Habin and Tsohou, Aggeliki}, journal={Governance}, volume={6}, pages={18--2013}, year={2013} }
2012
- Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2012). Secure and privacy-preserving, timed vehicular communications. International journal of ad hoc and ubiquitous computing, 10(4), 219–229.
[Bibtex]@article{burmester2012secure, title={Secure and Privacy-Preserving, Timed Vehicular Communications}, author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilis}, journal={International Journal of Ad Hoc and Ubiquitous Computing}, volume={10}, number={4}, pages={219--229}, year={2012}, publisher={Inderscience Publishers} }
- Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2012). Modeling security in cyber-physical systems. International journal of critical infrastructure protection, 5(3-4), 118–126.
[Bibtex]@article{burmester2012modeling, title={Modeling Security in Cyber-Physical Systems}, author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilis}, journal={International Journal of Critical Infrastructure Protection}, volume={5}, number={3-4}, pages={118--126}, year={2012}, publisher={Elsevier} }
- Magkos, E.. (2012). Cryptographic approaches for privacy preservation in location-based services: a survey. Systems approach applications for developments in information technology, 273–297.
[Bibtex]@article{magkos2012cryptographic, title={Cryptographic approaches for privacy preservation in location-based services: a survey}, author={Magkos, Emmanouil}, journal={Systems approach applications for developments in information technology}, pages={273--297}, year={2012}, publisher={IGI Global} }
- Kotzanikolaou, P., Magkos, E., Petrakos, N., Douligeris, C., & Chrissikopoulos, V.. (2012). Fair anonymous authentication for location based services. Paper presented at the Dpm 2012 – 7th international workshop on data privacy management.
[Bibtex]@inproceedings{kotzanikolaou2012fair, title={Fair Anonymous Authentication for Location Based Services}, author={Kotzanikolaou, Panayiotis and Magkos, Emmanouil and Petrakos, Nikolaos and Douligeris, Christos and Chrissikopoulos, Vassilis}, booktitle={DPM 2012 - 7th International Workshop on Data Privacy Management}, pages={13--14}, year={2012}, organization={Springer LNCS} }
- Vlachopoulos, K., Magkos, E., & Chrissikopoulos, V.. (2012). A model for hybrid evidence investigation. International journal of digital crime and forensics (ijdcf), 4(4), 47–62.
[Bibtex]@article{vlachopoulos2012model, title={A model for hybrid evidence investigation}, author={Vlachopoulos, Konstantinos and Magkos, Emmanouil and Chrissikopoulos, Vassileios}, journal={International Journal of Digital Crime and Forensics (IJDCF)}, volume={4}, number={4}, pages={47--62}, year={2012}, publisher={IGI Global} }
- Christopoulou, E., Ringas, D., & Stefanidakis, M.. (2012). Experiences from the urban computing impact on urban culture. Paper presented at the 2012 16th panhellenic conference on informatics.
[Bibtex]@inproceedings{christopoulou2012experiences, title={Experiences from the urban computing impact on urban culture}, author={Christopoulou, Eleni and Ringas, Dimitrios and Stefanidakis, Michail}, booktitle={2012 16th Panhellenic Conference on Informatics}, pages={56--61}, year={2012}, organization={IEEE} }
- Ntantogian, C., & Xenakis, C.. (2012). Questioning the feasibility of umts-gsm interworking attacks. Wireless personal communications, 65(1), 157–163.
[Bibtex]@article{ntantogian2012questioning, title={Questioning the feasibility of UMTS-GSM interworking attacks}, author={Ntantogian, Christoforos and Xenakis, Christos}, journal={Wireless Personal Communications}, volume={65}, number={1}, pages={157--163}, year={2012}, publisher={Springer} }
- Ntantogian, C., Xenakis, C., & Stavrakakis, I.. (2012). Analysis and modeling of false synchronizations in 3g-wlan integrated networks. Paper presented at the Ifip international information security conference.
[Bibtex]@inproceedings{ntantogian2012analysis, title={Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks}, author={Ntantogian, Christoforos and Xenakis, Christos and Stavrakakis, Ioannis}, booktitle={IFIP International Information Security Conference}, pages={475--488}, year={2012}, organization={Springer} }
- Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.. (2012). Analyzing trajectories of information security awareness. Information technology & people.
[Bibtex]@article{tsohou2012analyzing, title={Analyzing trajectories of information security awareness}, author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos}, journal={Information Technology \& People}, year={2012}, publisher={Emerald Group Publishing Limited} }
- El-Haddadeh, R., Tsohou, A., & Karyda, M.. (2012). Implementation challenges for information security awareness initiatives in e-government. .
[Bibtex]@article{el2012implementation, title={Implementation challenges for information security awareness initiatives in e-government}, author={El-Haddadeh, Ramzi and Tsohou, Aggeliki and Karyda, Maria}, year={2012} }
- Tsohou, A., Al-Yafi, K., & Lee, H.. (2012). Evaluating m-government applications: an elaboration likelihood model framework. .
[Bibtex]@article{tsohou2012evaluating, title={Evaluating m-government applications: an elaboration likelihood model framework}, author={Tsohou, Aggeliki and Al-Yafi, Karim and Lee, Habin}, year={2012} }
- Tsohou, A., Lee, H., Irani, Z., Weerakkody, V., Osman, I., Latif, A. A., & Medeni, T.. (2012). Evaluating e-government services from a citizens’ prespective: a reference process model. .
[Bibtex]@article{tsohou2012evaluating, title={Evaluating e-Government services from a citizens' prespective: A reference process model}, author={Tsohou, Aggeliki and Lee, Habin and Irani, Zahir and Weerakkody, Vishanth and Osman, Ibrahim and Latif, Abdel Anuz and Medeni, Tunc}, year={2012}, publisher={Brunel University} }
- Tsohou, A., Lee, H., Al-Yafi, K., Weerakkody, V., El-Haddadeh, R., Irani, Z., Ko, A., Medeni, T. D., & Campos, L. M.. (2012). Supporting public policy making processes with workflow technology: lessons learned from cases in four european countries. International journal of electronic government research (ijegr), 8(3), 63–77.
[Bibtex]@article{tsohou2012supporting, title={Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries}, author={Tsohou, Aggeliki and Lee, Habin and Al-Yafi, Karim and Weerakkody, Vishanth and El-Haddadeh, Ramzi and Irani, Zahir and Ko, Andrea and Medeni, Tunc D and Campos, Luis Miguel}, journal={International Journal of Electronic Government Research (IJEGR)}, volume={8}, number={3}, pages={63--77}, year={2012}, publisher={IGI Global} }
- Tsohou, A., Lee, H., Rebahi, Y., Khalil, M., & Hohberg, S.. (2012). Ubiquitous participation platform for policy making (ubipol): security and identity management considerations. Paper presented at the International conference on trust, privacy and security in digital business.
[Bibtex]@inproceedings{tsohou2012ubiquitous, title={Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations}, author={Tsohou, Aggeliki and Lee, Habin and Rebahi, Yacine and Khalil, Mateusz and Hohberg, Simon}, booktitle={International Conference on Trust, Privacy and Security in Digital Business}, pages={236--237}, year={2012}, organization={Springer, Berlin, Heidelberg} }
2011
- Magkos, E., & Kotzanikolaou, P.. (2011). Achieving privacy and access control in pervasive computing environments. Security and communication networks.
[Bibtex]@article{magkos2011achieving, title={Achieving privacy and access control in pervasive computing environments}, author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis}, journal={Security and Communication Networks}, year={2011}, publisher={John Wiley \& Sons, Ltd.} }
- Sioutas, S., Magkos, E., Karydis, I., & Verykios, V. S.. (2011). Uncertainty for privacy and 2-dimensional range query distortion. Journal of computing science and engineering, 5(3), 210–222.
[Bibtex]@article{sioutas2011uncertainty, title={Uncertainty for Privacy and 2-Dimensional Range Query Distortion}, author={Sioutas, Spyros and Magkos, Emmanouil and Karydis, Ioannis and Verykios, Vassilios S}, journal={Journal of Computing Science and Engineering}, volume={5}, number={3}, pages={210--222}, year={2011}, publisher={KIISE} }
- Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2011). Clio: blending the collective memory with the urban landscape. Paper presented at the Proceedings of the 10th international conference on mobile and ubiquitous multimedia.
[Bibtex]@inproceedings{ringas2011clio, title={CLIO: blending the collective memory with the urban landscape}, author={Ringas, Dimitrios and Christopoulou, Eleni and Stefanidakis, Michail}, booktitle={Proceedings of the 10th international conference on mobile and ubiquitous multimedia}, pages={185--194}, year={2011} }
- Christopoulou, E., & Ringas, D.. (2011). Clio: context supporting collective city memory. Paper presented at the 2011 fifth ftra international conference on multimedia and ubiquitous engineering.
[Bibtex]@inproceedings{christopoulou2011clio, title={CLIO: context supporting collective city memory}, author={Christopoulou, Eleni and Ringas, Dimitrios}, booktitle={2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering}, pages={6--11}, year={2011}, organization={IEEE} }
- Christopoulou, E., & Garofalakis, J.. (2011). Context-aware cultural heritage environments. In Handbook of research on technologies and cultural heritage: applications and environments (pp. 241–258). Igi global.
[Bibtex]@incollection{christopoulou2011context, title={Context-Aware Cultural Heritage Environments}, author={Christopoulou, Eleni and Garofalakis, John}, booktitle={Handbook of Research on Technologies and Cultural Heritage: Applications and Environments}, pages={241--258}, year={2011}, publisher={IGI Global} }
- Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2011). Urban memory in space and time. In Handbook of research on technologies and cultural heritage: applications and environments (pp. 325–340). Igi global.
[Bibtex]@incollection{ringas2011urban, title={Urban memory in space and time}, author={Ringas, Dimitrios and Christopoulou, Eleni and Stefanidakis, Michalis}, booktitle={Handbook of research on technologies and cultural heritage: applications and environments}, pages={325--340}, year={2011}, publisher={IGI Global} }
- Darra, E., Ntantogian, C., Xenakis, C., & Katsikas, S.. (2011). A mobility and energy-aware hierarchical intrusion detection system for mobile ad hoc networks. Paper presented at the International conference on trust, privacy and security in digital business.
[Bibtex]@inproceedings{darra2011mobility, title={A mobility and energy-aware hierarchical intrusion detection system for mobile ad hoc networks}, author={Darra, Eleni and Ntantogian, Christoforos and Xenakis, Christos and Katsikas, Sokratis}, booktitle={International Conference on Trust, Privacy and Security in Digital Business}, pages={138--149}, year={2011}, organization={Springer} }
- Ntantogian, C., Xenakis, C., & Stavrakakis, I.. (2011). Reducing false synchronizations in 3g-wlan integrated networks. Ieee transactions on wireless communications, 10(11), 3765–3773.
[Bibtex]@article{ntantogian2011reducing, title={Reducing false synchronizations in 3G-WLAN integrated networks}, author={Ntantogian, Christoforos and Xenakis, Christos and Stavrakakis, Ioannis}, journal={IEEE Transactions on Wireless Communications}, volume={10}, number={11}, pages={3765--3773}, year={2011}, publisher={IEEE} }
- Tsohou, A., Kokolakis, S., Lambrinoudakis, C., & Gritzalis, S.. (2011). Unifying iso security standards practices into a single security framework. Paper presented at the Proceedings of the south african information security multi-conference: port elizabeth, south africa, 17-18 may 2010.
[Bibtex]@inproceedings{tsohou2011unifying, title={Unifying ISO Security Standards Practices into a Single Security Framework}, author={Tsohou, A and Kokolakis, S and Lambrinoudakis, C and Gritzalis, S}, booktitle={Proceedings of the South African Information Security Multi-Conference: Port Elizabeth, South Africa, 17-18 May 2010}, pages={188}, year={2011}, organization={Lulu. com} }
2010
- Magkos, E., Kotzanikolaou, P., Sioutas, S., & Oikonomou, K.. (2010). A distributed privacy-preserving scheme for location-based queries. Paper presented at the Aoc 2010 – ieee wowmom workshop on autonomic and opportunistic communications, 2010.
[Bibtex]@inproceedings{magkos2010distributed, title={A distributed privacy-preserving scheme for location-based queries}, author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Sioutas, Spyros and Oikonomou, Konstantinos}, booktitle={AOC 2010 - IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications, 2010}, pages={1--6}, year={2010}, organization={IEEE} }
- Magkos, E., & Kotzanikolaou, P.. (2010). Enhancing privacy-preserving access control for pervasive computing environments. Paper presented at the The second international icst conference on security and privacy in mobile information and communication systems – mobisec 2010.
[Bibtex]@inproceedings{magkos2010enhancing, title={Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments}, author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis}, booktitle={The Second International ICST Conference on Security and Privacy in Mobile Information and Communication Systems - MOBISEC 2010}, pages={53--64}, year={2010}, organization={LNICST, Springer} }
- Sioutas, S., Magkos, E., Karydis, I., & Verykios, V.. (2010). Uncertainty for anonymity and 2-dimensional range query distortion. Paper presented at the Privacy in statistical databases 2010 (psd 2010).
[Bibtex]@inproceedings{sioutas2010uncertainty, title={Uncertainty for anonymity and 2-dimensional range query distortion}, author={Sioutas, Spyros and Magkos, Emmanouil and Karydis, Ioannis and Verykios, Vassilios}, booktitle={Privacy in Statistical Databases 2010 (PSD 2010)}, pages={85--96}, year={2010}, organization={Springer Berlin/Heidelberg LNCS 6344} }
- Christopoulou, E., & Garofalakis, J.. (2010). Enabling the user to setup ubiquitous computing applications based on intelligent context. Paper presented at the 2010 international conference on complex, intelligent and software intensive systems.
[Bibtex]@inproceedings{christopoulou2010enabling, title={Enabling the user to setup ubiquitous computing applications based on intelligent context}, author={Christopoulou, Eleni and Garofalakis, John}, booktitle={2010 International Conference on Complex, Intelligent and Software Intensive Systems}, pages={87--92}, year={2010}, organization={IEEE} }
- Ntantogian, C., Xenakis, C., & Stavrakakis, I.. (2010). A generic mechanism for efficient authentication in b3g networks. Computers & security, 29(4), 460–475.
[Bibtex]@article{ntantogian2010generic, title={A generic mechanism for efficient authentication in B3G networks}, author={Ntantogian, Christoforos and Xenakis, Christos and Stavrakakis, Ioannis}, journal={computers \& security}, volume={29}, number={4}, pages={460--475}, year={2010}, publisher={Elsevier} }
- Chatzikonstantinou, A., Ntantogian, C., Xenakis, C., & Karopoulos, G.. (2010). An empirical evaluation of cryptography usage in android applications. .
[Bibtex]@article{chatzikonstantinou2010empirical, title={An Empirical Evaluation of Cryptography Usage in Android Applications}, author={Chatzikonstantinou, Alexia and Ntantogian, Christoforos and Xenakis, Christos and Karopoulos, Georgios}, year={2010} }
- Evans, R., Tsohou, A., Tryfonas, T., & Morgan, T.. (2010). Engineering secure systems with iso 26702 and 27001. Paper presented at the 2010 5th international conference on system of systems engineering.
[Bibtex]@inproceedings{evans2010engineering, title={Engineering secure systems with ISO 26702 and 27001}, author={Evans, Rhys and Tsohou, Aggeliki and Tryfonas, Theo and Morgan, Thea}, booktitle={2010 5th International Conference on System of Systems Engineering}, pages={1--6}, year={2010}, organization={IEEE} }
- Vrakas, N., Kalloniatis, C., Tsohou, A., & Lambrinoudakis, C.. (2010). Privacy requirements engineering for trustworthy e-government services. Paper presented at the International conference on trust and trustworthy computing.
[Bibtex]@inproceedings{vrakas2010privacy, title={Privacy requirements engineering for trustworthy e-government services}, author={Vrakas, Nikos and Kalloniatis, Christos and Tsohou, Aggeliki and Lambrinoudakis, Costas}, booktitle={International Conference on Trust and Trustworthy Computing}, pages={298--307}, year={2010}, organization={Springer, Berlin, Heidelberg} }
- Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.. (2010). Analyzing information security awareness through networks of association. Paper presented at the International conference on trust, privacy and security in digital business.
[Bibtex]@inproceedings{tsohou2010analyzing, title={Analyzing information security awareness through networks of association}, author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos}, booktitle={International Conference on Trust, Privacy and Security in Digital Business}, pages={227--237}, year={2010}, organization={Springer, Berlin, Heidelberg} }
- Tsohou, A., Kokolakis, S., Lambrinoudakis, C., & Gritzalis, S.. (2010). A security standards’ framework to facilitate best practices’ awareness and conformity. Information management & computer security.
[Bibtex]@article{tsohou2010security, title={A security standards' framework to facilitate best practices' awareness and conformity}, author={Tsohou, Aggeliki and Kokolakis, Spyros and Lambrinoudakis, Costas and Gritzalis, Stefanos}, journal={Information Management \& Computer Security}, year={2010}, publisher={Emerald Group Publishing Limited} }
- Tsohou, A., Lambrinoudakis, C., Kokolakis, S., & Gritzalis, S.. (2010). The importance of context-dependent privacy requirements and perceptions to the design of privacy-aware systems. Upgrade: the european journal for the informatics professional, 11, 32–37.
[Bibtex]@article{tsohou2010importance, title={The importance of context-dependent privacy requirements and perceptions to the design of privacy-aware systems}, author={Tsohou, Aggeliki and Lambrinoudakis, Costas and Kokolakis, Spyros and Gritzalis, Stefanos}, journal={UPGRADE: The European Journal for the Informatics Professional}, volume={11}, pages={32--37}, year={2010} }
- Tsohou, A., Lambrinoudakis, C., Kokolakis, S., & Gritzalis, S.. (2010). La importancia de los requerimientos de la privacidad dependiente del contexto y percepciones para el diseño de sistemas sensibles a la privacidad. Novática: revista de la asociación de técnicos de informática(205), 58–62.
[Bibtex]@article{tsohou2010importancia, title={La importancia de los requerimientos de la privacidad dependiente del contexto y percepciones para el dise{\~n}o de sistemas sensibles a la privacidad}, author={Tsohou, Aggeliki and Lambrinoudakis, Costas and Kokolakis, Spyros and Gritzalis, Stefanos}, journal={Nov{\'a}tica: Revista de la Asociaci{\'o}n de T{\'e}cnicos de Inform{\'a}tica}, number={205}, pages={58--62}, year={2010}, publisher={Asociaci{\'o}n de T{\'e}cnicos de Inform{\'a}tica, ATI} }
2009
- Magkos, E., Maragoudakis, M., Chrissikopoulos, V., & Gritzalis, S.. (2009). Accurate and large-scale privacy-preserving data mining using the election paradigm. Data & knowledge engineering, 68(11), 1224–1236.
[Bibtex]@article{magkos2009accurate, title={Accurate and large-scale privacy-preserving data mining using the election paradigm}, author={Magkos, Emmanouil and Maragoudakis, Manolis and Chrissikopoulos, Vassilis and Gritzalis, Stefanos}, journal={Data \& Knowledge Engineering}, volume={68}, number={11}, pages={1224--1236}, year={2009}, publisher={North-Holland} }
- Kotzanikolaou, P., Magkos, E., Vergados, D., & Stefanidakis, M.. (2009). Secure and practical key establishment for distributed sensor networks. Security and communication networks, 2(6), 595–610.
[Bibtex]@article{kotzanikolaou2009secure, title={Secure and practical key establishment for distributed sensor networks}, author={Kotzanikolaou, Panayiotis and Magkos, Emmanouil and Vergados, Dimitrios and Stefanidakis, Michalis}, journal={Security and Communication Networks}, volume={2}, number={6}, pages={595--610}, year={2009}, publisher={John Wiley \& Sons, Ltd. Chichester, UK} }
- Kermanidis, K., & Magkos, E.. (2009). Empirical paraphrasing of modern greek text in two phases: an application to steganography. Paper presented at the 10th international conference on intelligent text processing and computational linguistics (cicling 2009).
[Bibtex]@inproceedings{kermanidis2009empirical, title={Empirical paraphrasing of modern Greek text in two phases: an application to steganography}, author={Kermanidis, Katia and Magkos, Emmanouil}, booktitle={10th International Conference on Intelligent Text Processing and Computational Linguistics (CICLing 2009)}, pages={535--546}, year={2009}, organization={Springer Berlin/Heidelberg LNCS 5449} }
- Avlonitis, M., Magkos, E., Stefanidakis, M., & Chrissikopoulos, V.. (2009). A novel stochastic approach for modeling random scanning worms. Paper presented at the 13th panhellenic conference on informatics (pci’09), 2009.
[Bibtex]@inproceedings{avlonitis2009novel, title={A novel stochastic approach for modeling random scanning worms}, author={Avlonitis, Markos and Magkos, Emmanouil and Stefanidakis, Michalis and Chrissikopoulos, Vassilis}, booktitle={13th Panhellenic Conference on Informatics (PCI'09), 2009}, pages={176--179}, year={2009}, organization={IEEE} }
- Avlonitis, M., Magkos, E., Stefanidakis, M., & Chrissikopoulos, V.. (2009). Treating scalability and modelling human countermeasures against local preference worms via gradient models. Journal in computer virology, 5(4), 357–364.
[Bibtex]@article{avlonitis2009treating, title={Treating scalability and modelling human countermeasures against local preference worms via gradient models}, author={Avlonitis, Markos and Magkos, Emmanouil and Stefanidakis, Michalis and Chrissikopoulos, Vassilis}, journal={Journal in computer virology}, volume={5}, number={4}, pages={357--364}, year={2009}, publisher={Springer-Verlag} }
- Christopoulou, E.. (2009). Context as a necessity in mobile applications. In Mobile computing: concepts, methodologies, tools, and applications (pp. 65–83). Igi global.
[Bibtex]@incollection{christopoulou2009context, title={Context as a necessity in mobile applications}, author={Christopoulou, Eleni}, booktitle={Mobile computing: concepts, methodologies, tools, and applications}, pages={65--83}, year={2009}, publisher={IGI Global} }
- Ntantogian, C., & Xenakis, C.. (2009). One-pass eap-aka authentication in 3g-wlan integrated networks. Wireless personal communications, 48(4), 569–584.
[Bibtex]@article{ntantogian2009one, title={One-pass EAP-AKA authentication in 3G-WLAN integrated networks}, author={Ntantogian, Christoforos and Xenakis, Christos}, journal={Wireless personal communications}, volume={48}, number={4}, pages={569--584}, year={2009}, publisher={Springer} }
- Ntantogian, C., & Xenakis, C.. (2009). Security architectures for b3g mobile networks. In Mobile computing: concepts, methodologies, tools, and applications (pp. 2674–2695). Igi global.
[Bibtex]@incollection{ntantogian2009security, title={Security Architectures for B3G Mobile Networks}, author={Ntantogian, Christoforos and Xenakis, Christos}, booktitle={Mobile Computing: Concepts, Methodologies, Tools, and Applications}, pages={2674--2695}, year={2009}, publisher={IGI Global} }
- Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. A.. (2009). Aligning security awareness with information systems security management.. Paper presented at the Mcis.
[Bibtex]@inproceedings{tsohou2009aligning, title={Aligning Security Awareness With Information Systems Security Management.}, author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos A}, booktitle={MCIS}, pages={73}, year={2009} }
- Tsohou, A., Kokolakis, S., Lambrinoudakis, C., & Gritzalis, S.. (2009). Information systems security management: a review and a classification of the iso standards. Paper presented at the International conference on e-democracy.
[Bibtex]@inproceedings{tsohou2009information, title={Information systems security management: a review and a classification of the ISO standards}, author={Tsohou, Aggeliki and Kokolakis, Spyros and Lambrinoudakis, Costas and Gritzalis, Stefanos}, booktitle={International Conference on e-Democracy}, pages={220--235}, year={2009}, organization={Springer, Berlin, Heidelberg} }
- Rizomiliotis, P., Tsohou, A., Lambrinoudakis, C., & Gritzalis, S.. (2009). Security and privacy issues in bipolar disorder research. .
[Bibtex]@article{rizomiliotis2009security, title={Security and Privacy Issues in Bipolar Disorder Research}, author={Rizomiliotis, Panagiotis and Tsohou, Aggeliki and Lambrinoudakis, Costas and Gritzalis, Stefanos}, year={2009} }
2008
- Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2008). Strengthening privacy protection in vanets. Paper presented at the Wimob ’08 – ieee international conference on wireless and mobile computing, networking and communications, 2008..
[Bibtex]@inproceedings{burmester2008strengthening, title={Strengthening privacy protection in VANETs}, author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilis}, booktitle={WIMOB '08 - IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008.}, pages={508--513}, year={2008}, organization={IEEE} }
- Kotzanikolaou, P., Vergados, D. D., Stergiou, G., & Magkos, E.. (2008). Multilayer key establishment for large-scale sensor networks. International journal of security and networks, 3(1), 1–9.
[Bibtex]@article{kotzanikolaou2008multilayer, title={Multilayer key establishment for large-scale sensor networks}, author={Kotzanikolaou, Panayiotis and Vergados, Dimitris D and Stergiou, Giannis and Magkos, Emmanouil}, journal={International Journal of Security and Networks}, volume={3}, number={1}, pages={1--9}, year={2008}, publisher={Inderscience Publishers} }
- Stathopoulos, V., Kotzanikolaou, P., & Magkos, E.. (2008). Secure log management for privacy assurance in electronic communications. Computers & security, 27(7-8), 298–308.
[Bibtex]@article{stathopoulos2008secure, title={Secure Log Management for Privacy Assurance in Electronic Communications}, author={Stathopoulos, Vassilios and Kotzanikolaou, Panayiotis and Magkos, Emmanouil}, journal={Computers \& Security}, volume={27}, number={7-8}, pages={298--308}, year={2008}, publisher={Elsevier} }
- Magkos, E., Maragoudakis, M., Chrissikopoulos, V., & Gridzalis, S.. (2008). Accuracy in privacy-preserving data mining using the paradigm of cryptographic elections. Paper presented at the Privacy in statistical databases (psd 2008).
[Bibtex]@inproceedings{magkos2008accuracy, title={Accuracy in privacy-preserving data mining using the paradigm of cryptographic elections}, author={Magkos, Emmanouil and Maragoudakis, Manolis and Chrissikopoulos, Vassilis and Gridzalis, Stefanos}, booktitle={Privacy in Statistical Databases (PSD 2008)}, pages={284--297}, year={2008}, organization={Springer Berlin/Heidelberg LNCS 5262} }
- Pateli, A., Floros, A., Oikonomou, K., & Magkos, E.. (2008). Corfunet: a mesh network providing wireless services at metropolitan level. Paper presented at the Iadis international conference on wireless applications and computing 2008.
[Bibtex]@inproceedings{pateli2008corfunet, title={Corfunet: A mesh network providing wireless services AT metropolitan level}, author={Pateli, Adamantia and Floros, Andreas and Oikonomou, Konstantinos and Magkos, Emmanouil}, booktitle={IADIS International Conference on Wireless Applications and Computing 2008}, pages={22--24}, year={2008} }
- Avlonitis, M., Magkos, E., Stefanidakis, M., & Chrissikopoulos, V.. (2008). Exploring scalability and fast spreading of local preference worms via gradient models. Paper presented at the 17th eicar annual conference, 3-6 may 2008, laval, france, 2008.
[Bibtex]@inproceedings{avlonitis2008exploring, title={Exploring Scalability and Fast Spreading of Local Preference Worms via Gradient Models}, author={Avlonitis, Markos and Magkos, Emmanouil and Stefanidakis, Michalis and Chrissikopoulos, Vassilis}, booktitle={17th EICAR Annual Conference, 3-6 May 2008, Laval, France, 2008}, year={2008} }
- Magkos, E., & Chrissikopoulos, V.. (2008). Towards efficient cryptography for privacy preserving data mining in distributed systems.. Paper presented at the Webist (1).
[Bibtex]@inproceedings{magkos2008towards, title={Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems.}, author={Magkos, Emmanouil and Chrissikopoulos, Vassilios}, booktitle={WEBIST (1)}, pages={301--304}, year={2008} }
- Lambrinoudakis, C., Magkos, E., & Chrissikopoulos, V.. (2008). Electronic voting systems. Chapter): j. lopez, s. furnell, a. patel, s. katsikas,(ed.),” securing information and communication systems: principles, technologies and applications”. artech house publishers, computer security series, 307–323.
[Bibtex]@article{lambrinoudakis2008electronic, title={Electronic voting systems}, author={Lambrinoudakis, C and Magkos, E and Chrissikopoulos, V}, journal={Chapter): J. Lopez, S. Furnell, A. Patel, S. Katsikas,(Ed.),” Securing Information and Communication Systems: Principles, Technologies and Applications”. Artech House Publishers, Computer Security Series}, pages={307--323}, year={2008} }
- Xenakis, C., Ntantogian, C., & Stavrakakis, I.. (2008). A network-assisted mobile vpn for securing users data in umts. Computer communications, 31(14), 3315–3327.
[Bibtex]@article{xenakis2008network, title={A network-assisted mobile VPN for securing users data in UMTS}, author={Xenakis, Christos and Ntantogian, Christoforos and Stavrakakis, Ioannis}, journal={Computer Communications}, volume={31}, number={14}, pages={3315--3327}, year={2008}, publisher={Elsevier} }
- Ntantogian, C., Stavrakakis, I., & Xenakis, C.. (2008). Reducing the user authentication cost in next generation networks. Paper presented at the 2008 fifth annual conference on wireless on demand network systems and services.
[Bibtex]@inproceedings{ntantogian2008reducing, title={Reducing the user authentication cost in next generation networks}, author={Ntantogian, Christoforos and Stavrakakis, Ioannis and Xenakis, Christos}, booktitle={2008 Fifth Annual Conference on Wireless on Demand Network Systems and Services}, pages={65--72}, year={2008}, organization={IEEE} }
- Tsohou, A., Kokolakis, S., Karyda, M., & Kiountouzis, E.. (2008). Investigating information security awareness: research and practice gaps. Information security journal: a global perspective, 17(5-6), 207–227.
[Bibtex]@article{tsohou2008investigating, title={Investigating information security awareness: research and practice gaps}, author={Tsohou, Aggeliki and Kokolakis, Spyros and Karyda, Maria and Kiountouzis, Evangelos}, journal={Information Security Journal: A Global Perspective}, volume={17}, number={5-6}, pages={207--227}, year={2008}, publisher={Taylor \& Francis} }
- Tsohou, A., Kokolakis, S., Karyda, M., & Kiountouzis, E.. (2008). Process-variance models in information security awareness research. Information management & computer security.
[Bibtex]@article{tsohou2008process, title={Process-variance models in information security awareness research}, author={Tsohou, Aggeliki and Kokolakis, Spyros and Karyda, Maria and Kiountouzis, Evangelos}, journal={Information Management \& Computer Security}, year={2008}, publisher={Emerald Group Publishing Limited} }
2007
- Magkos, E., Kotzanikolaou, P., & Douligeris, C.. (2007). Towards secure online elections: models, primitives and open issues. Electronic government, an international journal, 4(3), 249–268.
[Bibtex]@article{magkos2007towards, title={Towards secure online elections: models, primitives and open issues}, author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Douligeris, Christos}, journal={Electronic Government, an International Journal}, volume={4}, number={3}, pages={249--268}, year={2007}, publisher={Inderscience Publishers} }
- Avlonitis, M., Magkos, E., Stefanidakis, M., & Chrissikopoulos, V.. (2007). A spatial stochastic model for worm propagation: scale effects. Journal in computer virology, 3(2), 87–92.
[Bibtex]@article{avlonitis2007spatial, title={A spatial stochastic model for worm propagation: scale effects}, author={Avlonitis, Markos and Magkos, Emmanouil and Stefanidakis, Michalis and Chrissikopoulos, Vassilis}, journal={Journal in Computer Virology}, volume={3}, number={2}, pages={87--92}, year={2007}, publisher={Springer-Verlag} }
- Ntantogian, C., & Xenakis, C.. (2007). Reducing authentication traffic in 3g-wlan integrated networks. Paper presented at the 2007 ieee 18th international symposium on personal, indoor and mobile radio communications.
[Bibtex]@inproceedings{ntantogian2007reducing, title={Reducing authentication traffic in 3G-WLAN integrated networks}, author={Ntantogian, Christoforos and Xenakis, Christos}, booktitle={2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications}, pages={1--5}, year={2007}, organization={IEEE} }
- Xenakis, C., & Ntantogian, C.. (2007). Security architectures for b3g mobile networks. Telecommunication systems, 35(3), 123–139.
[Bibtex]@article{xenakis2007security, title={Security architectures for B3G mobile networks}, author={Xenakis, Christos and Ntantogian, Christoforos}, journal={Telecommunication Systems}, volume={35}, number={3}, pages={123--139}, year={2007}, publisher={Springer US} }
- Ntantogian, C., Xenakis, C., & Stavrakakis, I.. (2007). Efficient authentication for users autonomy in next generation all-ip networks. Paper presented at the 2007 2nd bio-inspired models of network, information and computing systems.
[Bibtex]@inproceedings{ntantogian2007efficient, title={Efficient authentication for users autonomy in next generation all-ip networks}, author={Ntantogian, Christoforos and Xenakis, Christos and Stavrakakis, Ioannis}, booktitle={2007 2nd Bio-Inspired Models of Network, Information and Computing Systems}, pages={295--300}, year={2007}, organization={IEEE} }
- Ntantogian, C., & Xenakis, C.. (2007). A security binding for efficient authentication in 3g-wlan heterogeneous networks. Paper presented at the Phd poster presented in the 6th annual mediterranean ad hoc networking workshop (med-hoc-net 2007), corfu, greece.
[Bibtex]@inproceedings{ntantogian2007security, title={A Security Binding for Efficient Authentication in 3G-WLAN Heterogeneous Networks}, author={Ntantogian, Christoforos and Xenakis, Christos}, booktitle={PhD poster presented in the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece}, year={2007} }
- Ntantogian, C., & Xenakis, C.. (2007). A security protocol for mutual authentication and mobile vpn deployment in b3g networks. Paper presented at the 2007 ieee 18th international symposium on personal, indoor and mobile radio communications.
[Bibtex]@inproceedings{ntantogian2007security, title={A security protocol for mutual authentication and mobile VPN deployment in B3G networks}, author={Ntantogian, Christoforos and Xenakis, Christos}, booktitle={2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications}, pages={1--5}, year={2007}, organization={IEEE} }
- Tsohou, A., Theoharidou, M., Kokolakis, S., & Gritzalis, D.. (2007). Addressing cultural dissimilarity in the information security management outsourcing relationship. Paper presented at the International conference on trust, privacy and security in digital business.
[Bibtex]@inproceedings{tsohou2007addressing, title={Addressing cultural dissimilarity in the information security management outsourcing relationship}, author={Tsohou, Aggeliki and Theoharidou, Marianthi and Kokolakis, Spyros and Gritzalis, Dimitris}, booktitle={International Conference on Trust, Privacy and Security in Digital Business}, pages={24--33}, year={2007}, organization={Springer, Berlin, Heidelberg} }
- Tsohou, A., Theoharidou, M., Kokolakis, S., & Gritzalis, D.. (2007). Session 1-secure and trusted virtual organisations-addressing cultural dissimilarity in the information security management outsourcing relationship. Lecture notes in computer science, 4657, 24–33.
[Bibtex]@article{tsohou2007session, title={Session 1-Secure and Trusted Virtual Organisations-Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship}, author={Tsohou, Aggeliki and Theoharidou, Marianthi and Kokolakis, Spyros and Gritzalis, Dimitris}, journal={Lecture Notes in Computer Science}, volume={4657}, pages={24--33}, year={2007}, publisher={Berlin: Springer-Verlag, 1973-} }
2006
- Stathopoulos, V., Kotzanikolaou, P., & Magkos, E.. (2006). A framework for secure and verifiable logging in public communication networks. Paper presented at the Critis’06 – 1st international workshop on critical information infrastructures security.
[Bibtex]@inproceedings{stathopoulos2006framework, title={A framework for secure and verifiable logging in public communication networks}, author={Stathopoulos, Vassilios and Kotzanikolaou, Panayiotis and Magkos, Emmanouil}, booktitle={CRITIS'06 - 1st International Workshop on Critical Information Infrastructures Security}, pages={273--284}, year={2006}, organization={Springer LNCS 434} }
- Magkos, E., Kotzanikolaou, P., Vergados, D. D., & Stefanidakis, M.. (2006). An asymmetric key establishment protocol for multiphase self-organized sensor networks. Paper presented at the 12th european wireless conference – enabling technologies for wireless multimedia communications (ew 2006).
[Bibtex]@inproceedings{magkos2006asymmetric, title={An asymmetric key establishment protocol for multiphase self-organized sensor networks}, author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Vergados, Dimitris D and Stefanidakis, Michalis}, booktitle={12th European Wireless Conference - Enabling Technologies for Wireless Multimedia Communications (EW 2006)}, pages={1--6}, year={2006}, organization={IEEE} }
- Ntantogian, C., Xenakis, C., & Merakos, L.. (2006). An enhanced eap-sim authentication scheme for securing wlan. 15th ist mobile & wireless communications, mykonos, greece.
[Bibtex]@article{ntantogian2006enhanced, title={An enhanced EAP-SIM authentication scheme for securing WLAN}, author={Ntantogian, Christoforos and Xenakis, Christos and Merakos, Lazaros}, journal={15th IST Mobile \& Wireless Communications, Mykonos, Greece}, year={2006} }
- Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.. (2006). Formulating information systems risk management strategies through cultural theory. Information management & computer security.
[Bibtex]@article{tsohou2006formulating, title={Formulating information systems risk management strategies through cultural theory}, author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos}, journal={Information Management \& Computer Security}, year={2006}, publisher={Emerald Group Publishing Limited} }
2005
- Kotzanikolaou, P., & Magkos, E.. (2005). Hybrid key establishment for multiphase self-organized sensor networks. Paper presented at the Sixth ieee international symposium on a world of wireless mobile and multimedia networks (wowmom 2005), 2005.
[Bibtex]@inproceedings{kotzanikolaou2005hybrid, title={Hybrid key establishment for multiphase self-organized sensor networks}, author={Kotzanikolaou, Panayiotis and Magkos, Emmanouil}, booktitle={Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), 2005}, pages={581--587}, year={2005}, organization={IEEE} }
- Christopoulou, E., & Kameas, A.. (2005). Gas ontology: an ontology for collaboration among ubiquitous computing devices. International journal of human-computer studies, 62(5), 664–685.
[Bibtex]@article{christopoulou2005gas, title={GAS Ontology: an ontology for collaboration among ubiquitous computing devices}, author={Christopoulou, Eleni and Kameas, Achilles}, journal={International Journal of Human-Computer Studies}, volume={62}, number={5}, pages={664--685}, year={2005}, publisher={Academic Press} }
- Christopoulou, E., Goumopoulos, C., & Kameas, A.. (2005). An ontology-based context management and reasoning process for ubicomp applications. Paper presented at the Proceedings of the 2005 joint conference on smart objects and ambient intelligence: innovative context-aware services: usages and technologies.
[Bibtex]@inproceedings{christopoulou2005ontology, title={An ontology-based context management and reasoning process for UbiComp applications}, author={Christopoulou, Eleni and Goumopoulos, Christos and Kameas, Achilles}, booktitle={Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies}, pages={265--270}, year={2005} }
- Drosos, N., Christopoulou, E., & Kameas, A.. (2005). Middleware for building ubiquitous computing applications using distributed objects. Paper presented at the Panhellenic conference on informatics.
[Bibtex]@inproceedings{drosos2005middleware, title={Middleware for building ubiquitous computing applications using distributed objects}, author={Drosos, Nicolas and Christopoulou, Eleni and Kameas, Achilles}, booktitle={Panhellenic Conference on Informatics}, pages={256--266}, year={2005}, organization={Springer, Berlin, Heidelberg} }
2004
- Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2004). Uncoercible e-bidding games. Electronic commerce research, 4(1), 113–125.
[Bibtex]@article{burmester2004uncoercible, title={Uncoercible e-bidding games}, author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilios}, journal={Electronic Commerce Research}, volume={4}, number={1}, pages={113--125}, year={2004}, publisher={Kluwer Academic Publishers} }
- Christopoulou, E., Goumopoulos, C., Zaharakis, I., & Kameas, A.. (2004). An ontology-based conceptual model for composing context-aware applications. Research academic computer technology institute.
[Bibtex]@article{christopoulou2004ontology, title={An ontology-based conceptual model for composing context-aware applications}, author={Christopoulou, Eleni and Goumopoulos, Christos and Zaharakis, Ioannis and Kameas, Achilles}, journal={Research Academic Computer Technology Institute}, year={2004}, publisher={Citeseer} }
- Goumopoulos, C., Christopoulou, E., Drossos, N., & Kameas, A.. (2004). The plants system: enabling mixed societies of communicating plants and artefacts. Paper presented at the European symposium on ambient intelligence.
[Bibtex]@inproceedings{goumopoulos2004plants, title={The PLANTS system: enabling mixed societies of communicating plants and artefacts}, author={Goumopoulos, Christos and Christopoulou, Eleni and Drossos, Nikos and Kameas, Achilles}, booktitle={European Symposium on Ambient Intelligence}, pages={184--195}, year={2004}, organization={Springer, Berlin, Heidelberg} }
- Christopoulou, E., & Kameas, A.. (2004). Using ontologies to address key issues in ubiquitous computing systems. Paper presented at the European symposium on ambient intelligence.
[Bibtex]@inproceedings{christopoulou2004using, title={Using ontologies to address key issues in ubiquitous computing systems}, author={Christopoulou, Eleni and Kameas, Achilles}, booktitle={European Symposium on Ambient Intelligence}, pages={13--24}, year={2004}, organization={Springer, Berlin, Heidelberg} }
- Christopoulou, E., & Kameas, A.. (2004). Ontology-driven composition of service-oriented ubiquitous computing applications. Paper presented at the Third international conference on adaptive hypermedia and adaptive web-based systems (ah2004), eindhoven, the netherlands.
[Bibtex]@inproceedings{christopoulou2004ontology, title={Ontology-driven composition of service-oriented ubiquitous computing applications}, author={Christopoulou, Eleni and Kameas, Achilles}, booktitle={Third International Conference on Adaptive Hypermedia and Adaptive Web-Based Systems (AH2004), Eindhoven, the Netherlands}, pages={23--26}, year={2004} }
- Christopoulou, E., & Kameas, A.. (2004). Ubiquitous computing: software architectures, communication, and distribution-using ontologies to address key issues in ubiquitous computing systems. Lecture notes in computer science, 3295, 13–24.
[Bibtex]@article{christopoulou2004ubiquitous, title={Ubiquitous Computing: Software Architectures, Communication, and Distribution-Using Ontologies to Address Key Issues in Ubiquitous Computing Systems}, author={Christopoulou, Eleni and Kameas, Achilles}, journal={Lecture Notes in Computer Science}, volume={3295}, pages={13--24}, year={2004}, publisher={Berlin: Springer-Verlag, 1973-} }
2003
- Burmester, M., & Magkos, E.. (2003). Towards secure and practical e-elections in the new era. In Advances in information security – secure electronic voting (pp. 63–76). Kluwer academic publishers (springer).
[Bibtex]@incollection{burmester2003towards, title={Towards secure and practical e-elections in the new era}, author={Burmester, Mike and Magkos, Emmanouil}, booktitle={Advances in Information Security - Secure Electronic Voting}, pages={63--76}, year={2003}, publisher={Kluwer Academic Publishers (Springer)} }
- Poulos, M., Magkos, E., Chrissikopoulos, V., & Alexandris, N.. (2003). Secure fingerprint verification based on image processing segmentation using computational geometry algorithms. Paper presented at the Sppra ‘2003 – iasted international conference on signal processing, pattern recognition, and applications.
[Bibtex]@inproceedings{poulos2003secure, title={Secure fingerprint verification based on image processing segmentation using computational geometry algorithms}, author={Poulos, M and Magkos, E and Chrissikopoulos, V and Alexandris, N}, booktitle={SPPRA '2003 - IASTED International Conference on Signal Processing, Pattern Recognition, and Applications}, year={2003} }
- Poulos, M., Papavlasopoulos, S., Chrissicopoulos, V., & Magkos, E.. (2003). Fingerprint verification based on image processing segmentation using an onion algorithm of computational geometry. Paper presented at the Sixth international workshop on mathematical methods in scattering theory and biomedical engineering.
[Bibtex]@inproceedings{poulos2003fingerprint, title={Fingerprint verification based on image processing segmentation using an onion algorithm of computational geometry}, author={Poulos, M and Papavlasopoulos, S and Chrissicopoulos, V and Magkos, E}, booktitle={Sixth International Workshop on Mathematical Methods in Scattering Theory and Biomedical Engineering}, pages={550--559}, year={2003}, organization={World Scientific publications} }
- Poulos, M., Alexandris, N., Belessioti, V., & Magkos, E.. (2003). Comparison between computational geometry and coherence methods applied to the eeg for medical diagnostic purposes. Proceedings of the 7th international multicoference on circuits, systems, communications and computers, 247–252.
[Bibtex]@article{poulos2003comparison, title={Comparison between computational geometry and coherence methods applied to the EEG for medical diagnostic purposes}, author={Poulos, M and Alexandris, N and Belessioti, V and Magkos, E}, journal={Proceedings of the 7th International Multicoference on Circuits, Systems, Communications and Computers}, pages={247--252}, year={2003} }
- Magkos, E., Chrissikopoulos, V., Alexandris, N., & Poulos, M.. (2003). Secure key recovery for archived and communicated data in the corporate intranet. Paper presented at the 7th international conference on circuits, systems, communications and computers.
[Bibtex]@inproceedings{magkos2003secure, title={Secure Key Recovery for Archived and Communicated Data in the Corporate Intranet}, author={Magkos, Emmanouil and Chrissikopoulos, Vassilios and Alexandris, Nikos and Poulos, Marios}, booktitle={7th International Conference on Circuits, Systems, Communications and Computers}, pages={7--10}, year={2003} }
- Christopoulou, E., Garofalakis, J. D., Makris, C., Panagis, Y., Psaras-Chatzigeorgiou, A., Sakkopoulos, E., & Tsakalidis, A. K.. (2003). Techniques and metrics for improving website structure. J. web eng., 2(1-2), 90–114.
[Bibtex]@article{christopoulou2003techniques, title={Techniques and metrics for improving website structure}, author={Christopoulou, Eleni and Garofalakis, John D and Makris, Christos and Panagis, Yannis and Psaras-Chatzigeorgiou, Athanasios and Sakkopoulos, Evangelos and Tsakalidis, Athanasios K.}, journal={J. Web Eng.}, volume={2}, number={1-2}, pages={90--114}, year={2003} }
2002
- Magkos, E., Burmester, M., & Chrissikopoulos, V.. (2002). Receipt-freeness in large-scale elections without untappable channels. Paper presented at the 1st ifip conference on e-commerce / e-business/ e-government.
[Bibtex]@inproceedings{magkos2002receipt, title={Receipt-freeness in large-scale elections without untappable channels}, author={Magkos, Emmanouil and Burmester, Mike and Chrissikopoulos, Vassilis}, booktitle={1st IFIP Conference on E-Commerce / E-Business/ E-Government}, pages={683--693}, year={2002}, organization={Kluwer Academic Publishers (Springer)} }
- Burmester, M., Chrissikopoulos, V., Kotzanikolaou, P., & Magkos, E.. (2002). Strong forward security. Paper presented at the Ifip-sec ’01 conference.
[Bibtex]@inproceedings{burmester2002strong, title={Strong forward security}, author={Burmester, Mike and Chrissikopoulos, Vassilios and Kotzanikolaou, Panayiotis and Magkos, Emmanouil}, booktitle={IFIP-SEC '01 Conference}, pages={109--119}, year={2002}, organization={Kluwer Academic Publishers (Springer)} }
- Magkos, E., & Chrissikopoulos, V.. (2002). Equitably fair internet voting. Journal of internet technology, 3(3), 187–193.
[Bibtex]@article{magkos2002equitably, title={Equitably Fair Internet Voting}, author={Magkos, Emmanouil and Chrissikopoulos, Vassilios}, journal={Journal of Internet Technology}, volume={3}, number={3}, pages={187--193}, year={2002}, publisher={Taiwan Academic Network} }
- Magkos, E., Alexandris, N., & Chrissikopoulos, V.. (2002). A common security model for conducting e-auctions and e-elections. Paper presented at the 6th international conference on communications.
[Bibtex]@inproceedings{magkos2002common, title={A Common Security Model for Conducting e-Auctions and e-Elections}, author={Magkos, Emmanouil and Alexandris, Nikos and Chrissikopoulos, Vassilis}, booktitle={6th International Conference on Communications}, pages={463--467}, year={2002} }
- Christopoulou, E., Garofalakis, J., Makris, C., Panagis, Y., Sakkopoulos, E., & Tsakalidis, A.. (2002). Automating restructuring of web applications. Paper presented at the Acm hypertext.
[Bibtex]@inproceedings{christopoulou2002automating, title={Automating restructuring of Web applications}, author={Christopoulou, Eleni and Garofalakis, John and Makris, Christos and Panagis, Yannis and Sakkopoulos, Evangelos and Tsakalidis, Athanasios}, booktitle={ACM Hypertext}, pages={11--15}, year={2002} }
- Christopoulou, E., Markellou, P., Markellos, K., Sirmakessis, S., Rigou, M., & Tsakalidis, A.. (2002). Learncom–a system for setting up an electronic learning community. Paper presented at the The 3rd international conference on information communication technologies in education.
[Bibtex]@inproceedings{christopoulou2002learncom, title={Learncom--A System for Setting Up an Electronic Learning Community}, author={Christopoulou, Eleni and Markellou, Penelope and Markellos, Konstantinos and Sirmakessis, Spiros and Rigou, Maria and Tsakalidis, Athanasios}, booktitle={The 3rd International Conference on Information Communication Technologies in Education}, pages={191--199}, year={2002} }
2001
- Magkos, E., Kotzanikolaou, P., & Chrissikopoulos, V.. (2001). An asymmetric traceability scheme for copyright protection without trust assumptions. Paper presented at the Ec-web 2001 – 2nd international conference on electronic commerce and web technologies, 2001.
[Bibtex]@inproceedings{magkos2001asymmetric, title={An asymmetric traceability scheme for copyright protection without trust assumptions}, author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Chrissikopoulos, Vassilios}, booktitle={EC-WEB 2001 - 2nd International Conference on Electronic Commerce and Web technologies, 2001}, pages={186--195}, year={2001}, organization={Springer-Verlag LNCS 2115} }
- Magkos, E., Chrissikopoulos, V., & Alexandris, N.. (2001). Software-based receipt-freeness in on-line elections. Paper presented at the Ifip tc11 wg11.4 1st annual working conference on network security.
[Bibtex]@inproceedings{magkos2001software, title={Software-based Receipt-freeness in On-line Elections}, author={Magkos, Emmanouil and Chrissikopoulos, Vassilios and Alexandris, Nikos}, booktitle={IFIP TC11 WG11.4 1st Annual Working Conference on Network Security}, pages={33--43}, year={2001}, organization={Kluwer Academic Publishers} }
- Alexandris, N., Magkos, E., & Chrissikopoulos, V.. (2001). Software-based receipt-freeness in on-line elections. Paper presented at the Proceedings of the ifip tc11 wg11. 4 first annual working conference on network security: advances in network and distributed systems security.
[Bibtex]@inproceedings{alexandris2001software, title={Software-Based Receipt-Freeness in On-Line Elections}, author={Alexandris, Nikos and Magkos, Emmanouil and Chrissikopoulos, Vassilios}, booktitle={Proceedings of the IFIP TC11 WG11. 4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security}, pages={33--44}, year={2001} }
- Magkos, E., Kotzanikolaou, P., & Chrissikopoulos, V.. (2001). An asymmetric traceability scheme for copyright protection without trust. Paper presented at the Electronic commerce and web technologies:… international conference, ec-web…, proceedings.
[Bibtex]@inproceedings{magkos2001asymmetric, title={An Asymmetric Traceability Scheme for Copyright Protection without Trust}, author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Chrissikopoulos, Vassilios}, booktitle={Electronic Commerce and Web Technologies:... International Conference, EC-Web..., Proceedings}, pages={186}, year={2001}, organization={Springer} }
2000
- Magkos, E., Burmester, M., & Chrissikopoulos, V.. (2000). An equitably fair on-line auction scheme. Paper presented at the 1st international conference on electronic commerce and web technologies (ec-web 2000).
[Bibtex]@inproceedings{magkos2000equitably, title={An equitably fair on-line auction scheme}, author={Magkos, Emmanouil and Burmester, Mike and Chrissikopoulos, Vassilios}, booktitle={1st International Conference on Electronic Commerce and Web technologies (EC-WEB 2000)}, pages={72--84}, year={2000}, organization={Springer-Verlag, Berlin LNCS 1875} }
- Burmester, M., & Magkos, E.. Uncoercible e-bidding gameз. .
[Bibtex]@article{burmesteruncoercible, title={Uncoercible e-Bidding Gameз}, author={Burmester, M and Magkos, E} }
- Reggios, A., & Magkos, E.. Sociopolitical, ethical and technological factors in e-elections. .
[Bibtex]@article{reggiossociopolitical, title={Sociopolitical, Ethical and Technological Factors in e-Elections}, author={Reggios, A and Magkos, E} }
- Ntantogian, C., & Xenakis, C.. Book chapter for handbook of research on wireless security security architectures for b3g mobile networks. .
[Bibtex]@article{ntantogianbook, title={Book Chapter for Handbook of Research on Wireless Security Security Architectures for B3G Mobile Networks}, author={Ntantogian, Christoforos and Xenakis, Christos} }
- Ntantogian, C., Gkikakis, D., & Xenakis, C.. Pripay: a privacy preserving architecture for secure micropayments. .
[Bibtex]@article{ntantogianpripay, title={PRIPAY: A Privacy Preserving Architecture for Secure Micropayments}, author={Ntantogian, Christoforos and Gkikakis, Dimitris and Xenakis, Christos} }
- Ntantogian, C.. Performance analysis and analytical modeling for the optimization of the users’ authentication procedure in 4g mobile networks. .
[Bibtex]@article{ntantogianperformance, title={Performance Analysis and Analytical Modeling for the Optimization of the Users’ Authentication Procedure in 4G Mobile Networks}, author={Ntantogian, Christoforos} }
- Farao, A., Ntantogian, C., Istrate, C., Suciu, G., & Xenakis, C.. Sealedgrid: scalable, trusted, and interoperable platform for secured smart grid. .
[Bibtex]@article{faraosealedgrid, title={SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID}, author={Farao, Aristeidis and Ntantogian, Christoforos and Istrate, Cristiana and Suciu, George and Xenakis, Christos} }
- Ntantogian, C., & Ribeiro, L. L.. Sandboxing the cyberspace for cybersecurity education and learning. .
[Bibtex]@article{ntantogiansandboxing, title={Sandboxing the Cyberspace for Cybersecurity Education and Learning}, author={Ntantogian, Christoforos and Ribeiro, Lu{\'\i}s L} }
- Medeni, T. D., Balc{i}lar, E., Yenice, S., Kökdemir, {. E., Torun, Y., Dalbay, Ö., Osman, I. H., Anouze, A. L., Tsohou, A., Irani, Z., & others. Improving e-government services in turkey: exploitation of cees project results. Қазэу хабаршысы\guillemotright–\guillemotleftвестник казэу, 41.
[Bibtex]@article{medeniimproving, title={IMPROVING E-GOVERNMENT SERVICES IN TURKEY: EXPLOITATION OF CEES PROJECT RESULTS}, author={Medeni, Tun{\c{c}} D and Balc{\i}lar, Emrah and Yenice, Sami and K{\"o}kdemir, {\.I}brahim Edib and Torun, Yavuz and Dalbay, {\"O}zkan and Osman, Ibrahim H and Anouze, Abdel Latef and Tsohou, Aggeliki and Irani, Zahir and others}, journal={ҚазЭУ хабаршысы{\guillemotright}--{\guillemotleft}Вестник КазЭУ}, pages={41} }
- Tsohou, A., Lee, H., Bataller, A., Forioso, I., Nedev, S., Unsal, H. O., Thuillier, B., & Massimino, M.. Deliverable d3.. .
[Bibtex]@article{tsohoudeliverable, title={Deliverable D3.}, author={Tsohou, Aggeliki and Lee, Habin and Bataller, Alfons and Forioso, Iskender and Nedev, Stoycho and Unsal, Huseyin Ozgur and Thuillier, Bruno and Massimino, Massimo} }
- Lee, H., Aktas, E., Tsohou, A., & Kim, J. W.. Customer satisfaction from open source software services in the presence of commercially licensed software. .
[Bibtex]@article{leecustomer, title={Customer Satisfaction from Open Source Software Services in the Presence of Commercially Licensed Software}, author={Lee, Habin and Aktas, Emel and Tsohou, Aggeliki and Kim, Jong Woo} }
- Karagiannis, S., Magkos, E., Chalavazis, G., & Nikiforos, M. N.. Analysis and evaluation of capture the flag challenges in secure mobile application development. .
[Bibtex]@article{karagiannisanalysis, title={ANALYSIS AND EVALUATION OF CAPTURE THE FLAG CHALLENGES IN SECURE MOBILE APPLICATION DEVELOPMENT}, author={Karagiannis, Stylianos and Magkos, Emmanouil and Chalavazis, George and Nikiforos, Maria Nefeli} }