Publications

2021

  • Karagiannis, S., & Magkos, E.. (2021). Engaging students in basic cybersecurity concepts using digital game-based learning: computer games as virtual learning environments. In Advances in core computer science-based technologies (pp. 55–81). Springer, cham.
    [Bibtex]
    @incollection{karagiannis2021engaging,
    title={Engaging Students in Basic Cybersecurity Concepts Using Digital Game-Based Learning: Computer Games as Virtual Learning Environments},
    author={Karagiannis, Stylianos and Magkos, Emmanouil},
    booktitle={Advances in Core Computer Science-Based Technologies},
    pages={55--81},
    year={2021},
    publisher={Springer, Cham}
    }
  • PIRAS, L., AL-OBEIDALLAH, M. G., PAVLIDIS, M., MOURATIDIS, H., TSOHOU, A., MAGKOS, E., & PRAITANO, A.. (2021). A data scope management service to support privacy by design and gdpr compliancea. Journal of data intelligence, 2(2), 136–165.
    [Bibtex]
    @article{piras2021data,
    title={A DATA SCOPE MANAGEMENT SERVICE TO SUPPORT PRIVACY BY DESIGN AND GDPR COMPLIANCEa},
    author={PIRAS, LUCA and AL-OBEIDALLAH, MOHAMMED GHAZI and PAVLIDIS, MICHALIS and MOURATIDIS, HARALAMBOS and TSOHOU, AGGELIKI and MAGKOS, EMMANOUIL and PRAITANO, ANDREA},
    journal={Journal of Data Intelligence},
    volume={2},
    number={2},
    pages={136--165},
    year={2021}
    }
  • Gournara, C., & Christopoulou, E.. (2021). Designing outdoor museum experiences for city dwellers and tourists. Paper presented at the 3rd international conference digital culture & audiovisual challenges 2021 (dcac 2021).
    [Bibtex]
    @inproceedings{gournara2021designing,
    title={Designing outdoor museum experiences for city dwellers and tourists},
    author={Gournara, Chrysoula and Christopoulou, Eleni},
    booktitle={3rd International Conference Digital Culture & AudioVisual Challenges
    2021 (DCAC 2021)},
    year={2021},
    institution={EasyChair}
    }
  • Koutroumpouchos, N., Ntantogian, C., & Xenakis, C.. (2021). Building trust for smart connected devices: the challenges and pitfalls of trustzone. Sensors, 21(2), 520.
    [Bibtex]
    @article{koutroumpouchos2021building,
    title={Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone},
    author={Koutroumpouchos, Nikolaos and Ntantogian, Christoforos and Xenakis, Christos},
    journal={Sensors},
    volume={21},
    number={2},
    pages={520},
    year={2021},
    publisher={Multidisciplinary Digital Publishing Institute}
    }
  • Ntantogian, C., Bountakas, P., Antonaropoulos, D., Patsakis, C., & Xenakis, C.. (2021). Nodexp: node. js server-side javascript injection vulnerability detection and exploitation. Journal of information security and applications, 58, 102752.
    [Bibtex]
    @article{ntantogian2021nodexp,
    title={NodeXP: NOde. js server-side JavaScript injection vulnerability DEtection and eXPloitation},
    author={Ntantogian, Christoforos and Bountakas, Panagiotis and Antonaropoulos, Dimitris and Patsakis, Constantinos and Xenakis, Christos},
    journal={Journal of Information Security and Applications},
    volume={58},
    pages={102752},
    year={2021},
    publisher={Elsevier}
    }
  • Lyvas, C., Ntantogian, C., & Xenakis, C.. (2021). [m] allotropism: a metamorphic engine for malicious software variation development. International journal of information security, 1–18.
    [Bibtex]
    @article{lyvas2021m,
    title={[m] allotROPism: a metamorphic engine for malicious software variation development},
    author={Lyvas, Christos and Ntantogian, Christoforos and Xenakis, Christos},
    journal={International Journal of Information Security},
    pages={1--18},
    year={2021},
    publisher={Springer}
    }
  • Farao, A., Veroni, E., Ntantogian, C., & Xenakis, C.. (2021). P4g2go: a privacy-preserving scheme for roaming energy consumers of the smart grid-to-go. Sensors, 21(8), 2686.
    [Bibtex]
    @article{farao2021p4g2go,
    title={P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go},
    author={Farao, Aristeidis and Veroni, Eleni and Ntantogian, Christoforos and Xenakis, Christos},
    journal={Sensors},
    volume={21},
    number={8},
    pages={2686},
    year={2021},
    publisher={Multidisciplinary Digital Publishing Institute}
    }
  • Soumelidou, A., & Tsohou, A.. (2021). Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics and informatics, 101592.
    [Bibtex]
    @article{soumelidou2021towards,
    title={Towards the creation of a Profile of the Information Privacy Aware User through a Systematic Literature review of Information Privacy Awareness},
    author={Soumelidou, Aikaterini and Tsohou, Aggeliki},
    journal={Telematics and Informatics},
    pages={101592},
    year={2021},
    publisher={Pergamon}
    }
  • PIRAS, L., AL-OBEIDALLAH, M. G., PAVLIDIS, M., MOURATIDIS, H., TSOHOU, A., MAGKOS, E., & PRAITANO, A.. (2021). A data scope management service to support privacy by design and gdpr compliancea. Journal of data intelligence, 2(2), 136–165.
    [Bibtex]
    @article{piras2021data,
    title={A DATA SCOPE MANAGEMENT SERVICE TO SUPPORT PRIVACY BY DESIGN AND GDPR COMPLIANCEa},
    author={PIRAS, LUCA and AL-OBEIDALLAH, MOHAMMED GHAZI and PAVLIDIS, MICHALIS and MOURATIDIS, HARALAMBOS and TSOHOU, AGGELIKI and MAGKOS, EMMANOUIL and PRAITANO, ANDREA},
    journal={Journal of Data Intelligence},
    volume={2},
    number={2},
    pages={136--165},
    year={2021}
    }
  • Papaioannou, T., Tsohou, A., & Karyda, M.. (2021). Forming digital identities in social networks: the role of privacy concerns and self-esteem. Information & computer security.
    [Bibtex]
    @article{papaioannou2021forming,
    title={Forming digital identities in social networks: the role of privacy concerns and self-esteem},
    author={Papaioannou, Thanos and Tsohou, Aggeliki and Karyda, Maria},
    journal={Information \& Computer Security},
    year={2021},
    publisher={Emerald Publishing Limited}
    }
  • Karagiannis, S., & Magkos, E.. (2021). Engaging students in basic cybersecurity concepts using digital game-based learning: computer games as virtual learning environments. In Advances in core computer science-based technologies (pp. 55–81). Springer, cham.
    [Bibtex]
    @incollection{karagiannis2021engaging,
    title={Engaging students in basic cybersecurity concepts using digital game-based learning: Computer games as virtual learning environments},
    author={Karagiannis, Stylianos and Magkos, Emmanouil},
    booktitle={Advances in Core Computer Science-Based Technologies},
    pages={55--81},
    year={2021},
    publisher={Springer, Cham}
    }
  • Marksteiner, S., Marko, N., Smulders, A., Karagiannis, S., Stahl, F., Hamazaryan, H., Schlick, R., Kraxberger, S., & Vasenev, A.. (2021). A process to facilitate automated automotive cybersecurity testing. Paper presented at the 2021 ieee 93rd vehicular technology conference (vtc2021-spring).
    [Bibtex]
    @inproceedings{marksteiner2021process,
    title={A process to facilitate automated automotive cybersecurity testing},
    author={Marksteiner, Stefan and Marko, Nadja and Smulders, Andre and Karagiannis, Stelios and Stahl, Florian and Hamazaryan, Hayk and Schlick, Rupert and Kraxberger, Stefan and Vasenev, Alexandr},
    booktitle={2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)},
    pages={1--7},
    year={2021},
    organization={IEEE}
    }
  • Vielberth, M., Glas, M., Dietz, M., Karagiannis, S., Magkos, E., & Pernul, G.. (2021). A digital twin-based cyber range for soc analysts. Paper presented at the Ifip annual conference on data and applications security and privacy.
    [Bibtex]
    @inproceedings{vielberth2021digital,
    title={A digital twin-based cyber range for SOC analysts},
    author={Vielberth, Manfred and Glas, Magdalena and Dietz, Marietheres and Karagiannis, Stylianos and Magkos, Emmanouil and Pernul, G{\"u}nther},
    booktitle={IFIP Annual Conference on Data and Applications Security and Privacy},
    pages={293--311},
    year={2021},
    organization={Springer, Cham}
    }
  • Karagiannis, S., Ntantogian, C., Magkos, E., Ribeiro, L. L., & Campos, L.. (2021). Pocketctf: a fully featured approach for hosting portable attack and defense cybersecurity exercises. Information, 12(8), 318.
    [Bibtex]
    @article{karagiannis2021pocketctf,
    title={PocketCTF: A fully featured approach for hosting portable attack and defense cybersecurity exercises},
    author={Karagiannis, Stylianos and Ntantogian, Christoforos and Magkos, Emmanouil and Ribeiro, Lu{\'\i}s L and Campos, Lu{\'\i}s},
    journal={Information},
    volume={12},
    number={8},
    pages={318},
    year={2021},
    publisher={MDPI}
    }
  • Karagiannis, S., Manso, M., Magkos, E., Ribeiro, L. L., & Campos, L.. (2021). Automated and on-demand cybersecurity certification. Paper presented at the 2021 ieee international conference on cyber security and resilience (csr).
    [Bibtex]
    @inproceedings{karagiannis2021automated,
    title={Automated and On-Demand Cybersecurity Certification},
    author={Karagiannis, Stylianos and Manso, Marco and Magkos, Emmanouil and Ribeiro, Lu{\'\i}s L and Campos, Lu{\'\i}s},
    booktitle={2021 IEEE International Conference on Cyber Security and Resilience (CSR)},
    pages={174--179},
    year={2021},
    organization={IEEE}
    }
  • Karagiannis, S., Tokatlis, A., Pelekis, S., Kontoulis, M., Doukas, G., Ntanos, C., & Magkos, E.. (2021). A-demo: att&ck documentation, emulation and mitigation operations: deploying and documenting realistic cyberattack scenarios-a rootkit case study. Paper presented at the 25th pan-hellenic conference on informatics.
    [Bibtex]
    @inproceedings{karagiannis2021demo,
    title={A-DEMO: ATT\&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios-A Rootkit Case Study},
    author={Karagiannis, Stylianos and Tokatlis, Alexandros and Pelekis, Sotiris and Kontoulis, Michael and Doukas, George and Ntanos, Christos and Magkos, Emmanouil},
    booktitle={25th Pan-Hellenic Conference on Informatics},
    pages={328--333},
    year={2021}
    }

2020

  • Tsohou, A., Magkos, E., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M., & Crespo, B. G.. (2020). Privacy, security, legal and technology acceptance elicited and consolidated requirements for a gdpr compliance platform. Information & computer security.
    [Bibtex]
    @article{tsohou2020privacy,
    title={Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform},
    author={Tsohou, Aggeliki and Magkos, Emmanouil and Mouratidis, Haralambos and Chrysoloras, George and Piras, Luca and Pavlidis, Michalis and Debussche, Julien and Rotoloni, Marco and Crespo, Beatriz Gallego-Nicasio},
    journal={Information \& Computer Security},
    year={2020},
    publisher={Emerald Publishing Limited}
    }
  • Karagiannis, S., & Magkos, E.. (2020). Engaging students in basic cybersecurity concepts using digital. Advances in core computer science-based technologies: papers in honor of professor nikolaos alexandris, 14, 55.
    [Bibtex]
    @article{karagiannis2020engaging,
    title={Engaging Students in Basic Cybersecurity Concepts Using Digital},
    author={Karagiannis, Stylianos and Magkos, Emmanouil},
    journal={Advances in Core Computer Science-Based Technologies: Papers in Honor of Professor Nikolaos Alexandris},
    volume={14},
    pages={55},
    year={2020},
    publisher={Springer Nature}
    }
  • Petrakos, N., Monachos, S., Magkos, E., & Kotzanikolaou, P.. (2020). Design and implementation of an anonymous and secure online evaluation protocol. Electronics, 9(9), 1415.
    [Bibtex]
    @article{petrakos2020design,
    title={Design and Implementation of an Anonymous and Secure Online Evaluation Protocol},
    author={Petrakos, Nikolaos and Monachos, Stefanos and Magkos, Emmanouil and Kotzanikolaou, Panayiotis},
    journal={Electronics},
    volume={9},
    number={9},
    pages={1415},
    year={2020},
    publisher={Multidisciplinary Digital Publishing Institute}
    }
  • Magkos, E.. (2020). An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. Information security education. information security in action: 13th ifip wg, 579, 61.
    [Bibtex]
    @article{magkos2020analysis,
    title={An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools},
    author={Magkos, Emmanouil},
    journal={INFORMATION SECURITY EDUCATION. INFORMATION SECURITY IN ACTION: 13th Ifip Wg},
    volume={579},
    pages={61},
    year={2020},
    publisher={Springer Nature}
    }
  • Piras, L., Al-Obeidallah, M. G., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A., & Crespo, B. G.. (2020). Defend dsm: a data scope management service for model-based privacy by design gdpr compliance. Paper presented at the International conference on trust and privacy in digital business.
    [Bibtex]
    @inproceedings{piras2020defend,
    title={DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance},
    author={Piras, Luca and Al-Obeidallah, Mohammed Ghazi and Pavlidis, Michalis and Mouratidis, Haralambos and Tsohou, Aggeliki and Magkos, Emmanouil and Praitano, Andrea and Iodice, Annarita and Crespo, Beatriz Gallego-Nicasio},
    booktitle={International Conference on Trust and Privacy in Digital Business},
    pages={186--201},
    year={2020},
    organization={Springer, Cham}
    }
  • Karagiannis, S., Maragkos-Belmpas, E., & Magkos, E.. (2020). An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. Paper presented at the Ifip world conference on information security education.
    [Bibtex]
    @inproceedings{karagiannis2020analysis,
    title={An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools},
    author={Karagiannis, Stylianos and Maragkos-Belmpas, Elpidoforos and Magkos, Emmanouil},
    booktitle={IFIP World Conference on Information Security Education},
    pages={61--77},
    year={2020},
    organization={Springer, Cham}
    }
  • Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A., & Crespo, B. G.. (2020). Defend dsm: a data scope management service for model-based privacy by design gdpr compliance. Paper presented at the Trust, privacy and security in digital business: 17th international conference, trustbus 2020, bratislava, slovakia, september 14–17, 2020, proceedings.
    [Bibtex]
    @inproceedings{mouratidis2020defend,
    title={DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance},
    author={Mouratidis, Haralambos and Tsohou, Aggeliki and Magkos, Emmanouil and Praitano, Andrea and Iodice, Annarita and Crespo, Beatriz Gallego-Nicasio},
    booktitle={Trust, Privacy and Security in Digital Business: 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14--17, 2020, Proceedings},
    volume={12395},
    pages={186},
    year={2020},
    organization={Springer Nature}
    }
  • Karagiannis, S., & Magkos, E.. (2020). Adapting ctf challenges into virtual cybersecurity learning environments. Information & computer security.
    [Bibtex]
    @article{karagiannis2020adapting,
    title={Adapting CTF challenges into virtual cybersecurity learning environments},
    author={Karagiannis, Stylianos and Magkos, Emmanouil},
    journal={Information \& Computer Security},
    year={2020},
    publisher={Emerald Publishing Limited}
    }
  • Karagiannis, S., Papaioannou, T., Magkos, E., & Tsohou, A.. (2020). Game-based information security/privacy education and awareness: theory and practice. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
    [Bibtex]
    @inproceedings{karagiannis2020game,
    title={Game-Based Information Security/Privacy Education and Awareness: Theory and Practice},
    author={Karagiannis, Stylianos and Papaioannou, Thanos and Magkos, Emmanouil and Tsohou, Aggeliki},
    booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems},
    pages={509--525},
    year={2020},
    organization={Springer, Cham}
    }
  • Karagiannis, S., Magkos, E., Ntantogian, C., & Ribeiro, L. L.. (2020). Sandboxing the cyberspace for cybersecurity education and learning. Paper presented at the European symposium on research in computer security.
    [Bibtex]
    @inproceedings{karagiannis2020sandboxing,
    title={Sandboxing the Cyberspace for Cybersecurity Education and Learning},
    author={Karagiannis, Stylianos and Magkos, Emmanouil and Ntantogian, Christoforos and Ribeiro, Lu{\'\i}s L},
    booktitle={European Symposium on Research in Computer Security},
    pages={181--196},
    year={2020},
    organization={Springer, Cham}
    }
  • Ringas, D., & Christopoulou, E.. (2020). Effect of urban computing on the public’s perception of place, community, and infrastructure. In Megacities and rapid urbanization: breakthroughs in research and practice (pp. 251–273). Igi global.
    [Bibtex]
    @incollection{ringas2020effect,
    title={Effect of Urban Computing on the Public's Perception of Place, Community, and Infrastructure},
    author={Ringas, Dimitrios and Christopoulou, Eleni},
    booktitle={Megacities and Rapid Urbanization: Breakthroughs in Research and Practice},
    pages={251--273},
    year={2020},
    publisher={IGI Global}
    }
  • Karageorgiou, Z., Mavrommati, E., Fotaris, P., & Christopoulou, E.. (2020). Escape room in education: evaluating using experience pyramid model. Paper presented at the 2020 5th south-east europe design automation, computer engineering, computer networks and social media conference (seeda-cecnsm).
    [Bibtex]
    @inproceedings{karageorgiou2020escape,
    title={Escape room in education: Evaluating using Experience Pyramid Model},
    author={Karageorgiou, Zoi and Mavrommati, Eirini and Fotaris, Panagiotis and Christopoulou, Eleni},
    booktitle={2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)},
    pages={1--8},
    year={2020},
    organization={IEEE}
    }
  • Mantellos, G., Exarhos, T. P., & Christopoulou, E.. (2020). Human activity and transportation mode recognition using smartphone sensors. Paper presented at the 2020 5th south-east europe design automation, computer engineering, computer networks and social media conference (seeda-cecnsm).
    [Bibtex]
    @inproceedings{mantellos2020human,
    title={Human activity and transportation mode recognition using smartphone sensors},
    author={Mantellos, George and Exarhos, Themis P and Christopoulou, Eleni},
    booktitle={2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)},
    pages={1--7},
    year={2020},
    organization={IEEE}
    }
  • Karagiannis, S., Magkos, E., Ntantogian, C., & Ribeiro, L. L.. (2020). Sandboxing the cyberspace for cybersecurity education and learning. Paper presented at the European symposium on research in computer security.
    [Bibtex]
    @inproceedings{karagiannis2020sandboxing,
    title={Sandboxing the Cyberspace for Cybersecurity Education and Learning},
    author={Karagiannis, Stylianos and Magkos, Emmanouil and Ntantogian, Christoforos and Ribeiro, Lu{\'\i}s L},
    booktitle={European Symposium on Research in Computer Security},
    pages={181--196},
    year={2020},
    organization={Springer}
    }
  • Tsohou, A., Siponen, M., & Newman, M.. (2020). How does information technology-based service degradation influence consumers’ use of services? an information technology-based service degradation decision theory. Journal of information technology, 35(1), 2–24.
    [Bibtex]
    @article{tsohou2020does,
    title={How does information technology-based service degradation influence consumers’ use of services? An information technology-based service degradation decision theory},
    author={Tsohou, Aggeliki and Siponen, Mikko and Newman, Mike},
    journal={Journal of Information Technology},
    volume={35},
    number={1},
    pages={2--24},
    year={2020},
    publisher={SAGE Publications Sage UK: London, England}
    }
  • Paspatis, I., Tsohou, A., & Kokolakis, S.. (2020). Appaware: a policy visualization model for mobile applications. Information & computer security.
    [Bibtex]
    @article{paspatis2020appaware,
    title={AppAware: a policy visualization model for mobile applications},
    author={Paspatis, Ioannis and Tsohou, Aggeliki and Kokolakis, Spyros},
    journal={Information \& Computer Security},
    year={2020},
    publisher={Emerald Publishing Limited}
    }
  • Tsohou, A., Magkos, E., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M., & Crespo, B. G.. (2020). Privacy, security, legal and technology acceptance elicited and consolidated requirements for a gdpr compliance platform. Information & computer security.
    [Bibtex]
    @article{tsohou2020privacy,
    title={Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform},
    author={Tsohou, Aggeliki and Magkos, Emmanouil and Mouratidis, Haralambos and Chrysoloras, George and Piras, Luca and Pavlidis, Michalis and Debussche, Julien and Rotoloni, Marco and Crespo, Beatriz Gallego-Nicasio},
    journal={Information \& Computer Security},
    year={2020},
    publisher={Emerald Publishing Limited}
    }
  • Diamantopoulou, V., Tsohou, A., & Karyda, M.. (2020). From iso/iec27001: 2013 and iso/iec27002: 2013 to gdpr compliance controls. Information & computer security.
    [Bibtex]
    @article{diamantopoulou2020iso,
    title={From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls},
    author={Diamantopoulou, Vasiliki and Tsohou, Aggeliki and Karyda, Maria},
    journal={Information \& Computer Security},
    year={2020},
    publisher={Emerald Publishing Limited}
    }
  • Jiang, H., Tsohou, A., Siponen, M., & Li, Y.. (2020). Examining the side effects of organizational internet monitoring on employees. Internet research.
    [Bibtex]
    @article{jiang2020examining,
    title={Examining the side effects of organizational Internet monitoring on employees},
    author={Jiang, Hemin and Tsohou, Aggeliki and Siponen, Mikko and Li, Ying},
    journal={Internet Research},
    year={2020},
    publisher={Emerald Publishing Limited}
    }
  • Piras, L., Al-Obeidallah, M. G., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A., & Crespo, B. G.. (2020). Defend dsm: a data scope management service for model-based privacy by design gdpr compliance. Paper presented at the International conference on trust and privacy in digital business.
    [Bibtex]
    @inproceedings{piras2020defend,
    title={DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance},
    author={Piras, Luca and Al-Obeidallah, Mohammed Ghazi and Pavlidis, Michalis and Mouratidis, Haralambos and Tsohou, Aggeliki and Magkos, Emmanouil and Praitano, Andrea and Iodice, Annarita and Crespo, Beatriz Gallego-Nicasio},
    booktitle={International Conference on Trust and Privacy in Digital Business},
    pages={186--201},
    year={2020},
    organization={Springer, Cham}
    }
  • Siponen, M., & Tsohou, A.. (2020). Demystifying the influential is legends of positivism: response to lee’s commentary. Journal of the association for information systems, 21(6), 1.
    [Bibtex]
    @article{siponen2020demystifying,
    title={Demystifying the Influential IS Legends of Positivism: Response to Lee’s Commentary},
    author={Siponen, Mikko and Tsohou, Aggeliki},
    journal={Journal of the Association for Information Systems},
    volume={21},
    number={6},
    pages={1},
    year={2020}
    }
  • Skalkos, A., Tsohou, A., Karyda, M., & Kokolakis, S.. (2020). Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis. Computers in human behavior reports, 2, 100034.
    [Bibtex]
    @article{skalkos2020identifying,
    title={Identifying the values associated with users’ behavior towards anonymity tools through means-end analysis},
    author={Skalkos, Andreas and Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros},
    journal={Computers in Human Behavior Reports},
    volume={2},
    pages={100034},
    year={2020},
    publisher={Elsevier}
    }
  • Karagiannis, S., Papaioannou, T., Magkos, E., & Tsohou, A.. (2020). Game-based information security/privacy education and awareness: theory and practice. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
    [Bibtex]
    @inproceedings{karagiannis2020game,
    title={Game-Based Information Security/Privacy Education and Awareness: Theory and Practice},
    author={Karagiannis, Stylianos and Papaioannou, Thanos and Magkos, Emmanouil and Tsohou, Aggeliki},
    booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems},
    pages={509--525},
    year={2020},
    organization={Springer, Cham}
    }
  • Karagiannis, S., & Magkos, E.. (2020). Engaging students in basic cybersecurity concepts using digital. Advances in core computer science-based technologies: papers in honor of professor nikolaos alexandris, 14, 55.
    [Bibtex]
    @article{karagiannis2020engaging,
    title={Engaging Students in Basic Cybersecurity Concepts Using Digital},
    author={Karagiannis, Stylianos and Magkos, Emmanouil},
    journal={Advances in Core Computer Science-Based Technologies: Papers in Honor of Professor Nikolaos Alexandris},
    volume={14},
    pages={55},
    year={2020},
    publisher={Springer Nature}
    }
  • Vasenev, A., Karagiannis, S., & Mathijssen, R.. (2020). Constructing tool-based security test sequences for vehicles as high-tech data-rich systems.. Paper presented at the Vehits.
    [Bibtex]
    @inproceedings{vasenev2020constructing,
    title={Constructing Tool-based Security Test Sequences for Vehicles as High-tech Data-rich Systems.},
    author={Vasenev, Alexandr and Karagiannis, Stelios and Mathijssen, Roland},
    booktitle={VEHITS},
    pages={53--58},
    year={2020}
    }
  • Magkos, E.. (2020). An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. Information security education. information security in action: 13th ifip wg, 579, 61.
    [Bibtex]
    @article{magkos2020analysis,
    title={An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools},
    author={Magkos, Emmanouil},
    journal={INFORMATION SECURITY EDUCATION. INFORMATION SECURITY IN ACTION: 13th Ifip Wg},
    volume={579},
    pages={61},
    year={2020},
    publisher={Springer Nature}
    }
  • Karagiannis, S., Maragkos-Belmpas, E., & Magkos, E.. (2020). An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. Paper presented at the Ifip world conference on information security education.
    [Bibtex]
    @inproceedings{karagiannis2020analysis,
    title={An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools},
    author={Karagiannis, Stylianos and Maragkos-Belmpas, Elpidoforos and Magkos, Emmanouil},
    booktitle={IFIP World Conference on Information Security Education},
    pages={61--77},
    year={2020},
    organization={Springer, Cham}
    }
  • Campos, L. M., Ribeiro, L., Karydis, I., Karagiannis, S., Pedro, D., Martins, J., Marques, C., Armada, A. G., Leal, R. P., López-Morales, M. J., & others. (2020). Reference scenarios and key performance indicators for 5g ultra-dense networks. Paper presented at the 2020 12th international symposium on communication systems, networks and digital signal processing (csndsp).
    [Bibtex]
    @inproceedings{campos2020reference,
    title={Reference Scenarios and Key Performance Indicators for 5G Ultra-dense Networks},
    author={Campos, Lu{\'e}s Miguel and Ribeiro, Lu{\'\i}s and Karydis, Ioannis and Karagiannis, Stelios and Pedro, D{\'a}rio and Martins, Jorge and Marques, Carlos and Armada, Ana Garcia and Leal, Raquel Perez and L{\'o}pez-Morales, Manuel Jos{\'e} and others},
    booktitle={2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)},
    pages={1--5},
    year={2020},
    organization={IEEE}
    }
  • Karagiannis, S., & Magkos, E.. (2020). Adapting ctf challenges into virtual cybersecurity learning environments. Information & computer security.
    [Bibtex]
    @article{karagiannis2020adapting,
    title={Adapting CTF challenges into virtual cybersecurity learning environments},
    author={Karagiannis, Stylianos and Magkos, Emmanouil},
    journal={Information \& Computer Security},
    year={2020},
    publisher={Emerald Publishing Limited}
    }
  • Karagiannis, S., Papaioannou, T., Magkos, E., & Tsohou, A.. (2020). Game-based information security/privacy education and awareness: theory and practice. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
    [Bibtex]
    @inproceedings{karagiannis2020game,
    title={Game-Based Information Security/Privacy Education and Awareness: Theory and Practice},
    author={Karagiannis, Stylianos and Papaioannou, Thanos and Magkos, Emmanouil and Tsohou, Aggeliki},
    booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems},
    pages={509--525},
    year={2020},
    organization={Springer, Cham}
    }
  • Karagiannis, S., Magkos, E., Ntantogian, C., & Ribeiro, L. L.. (2020). Sandboxing the cyberspace for cybersecurity education and learning. Paper presented at the European symposium on research in computer security.
    [Bibtex]
    @inproceedings{karagiannis2020sandboxing,
    title={Sandboxing the cyberspace for cybersecurity education and learning},
    author={Karagiannis, Stylianos and Magkos, Emmanouil and Ntantogian, Christoforos and Ribeiro, Lu{\'\i}s L},
    booktitle={European Symposium on Research in Computer Security},
    pages={181--196},
    year={2020},
    organization={Springer, Cham}
    }

2019

  • Piras, L., Al-Obeidallah, M. G., Praitano, A., Tsohou, A., Mouratidis, H., Crespo, B. G., Bernard, J. B., Fiorani, M., Magkos, E., Sanz, A. C., & others. (2019). Defend architecture: a privacy by design platform for gdpr compliance. Paper presented at the International conference on trust and privacy in digital business.
    [Bibtex]
    @inproceedings{piras2019defend,
    title={DEFeND architecture: a privacy by design platform for GDPR compliance},
    author={Piras, Luca and Al-Obeidallah, Mohammed Ghazi and Praitano, Andrea and Tsohou, Aggeliki and Mouratidis, Haralambos and Crespo, Beatriz Gallego-Nicasio and Bernard, Jean Baptiste and Fiorani, Marco and Magkos, Emmanouil and Sanz, Andres Castillo and others},
    booktitle={International Conference on Trust and Privacy in Digital Business},
    pages={78--93},
    year={2019},
    organization={Springer, Cham}
    }
  • Tsohou, A., Magkos, M., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M., & Crespo, B. G.. (2019). Privacy, security, legal and technology acceptance requirements for a gdpr compliance platform. In Computer security (pp. 204–223). Springer, cham.
    [Bibtex]
    @incollection{tsohou2019privacy,
    title={Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform},
    author={Tsohou, Aggeliki and Magkos, Manos and Mouratidis, Haralambos and Chrysoloras, George and Piras, Luca and Pavlidis, Michalis and Debussche, Julien and Rotoloni, Marco and Crespo, Beatriz Gallego-Nicasio},
    booktitle={Computer Security},
    pages={204--223},
    year={2019},
    publisher={Springer, Cham}
    }
  • Skiadopoulos, K., Tsipis, A., Giannakis, K., Koufoudakis, G., Christopoulou, E., Oikonomou, K., Kormentzas, G., & Stavrakakis, I.. (2019). Synchronization of data measurements in wireless sensor networks for iot applications. Ad hoc networks, 89, 47–57.
    [Bibtex]
    @article{skiadopoulos2019synchronization,
    title={Synchronization of data measurements in wireless sensor networks for IoT applications},
    author={Skiadopoulos, Konstantinos and Tsipis, Athanasios and Giannakis, Konstantinos and Koufoudakis, George and Christopoulou, Eleni and Oikonomou, Konstantinos and Kormentzas, George and Stavrakakis, Ioannis},
    journal={Ad Hoc Networks},
    volume={89},
    pages={47--57},
    year={2019},
    publisher={Elsevier}
    }
  • Karageorgiou, Z., Mavrommati, E., Christopoulou, E., & Fotaris, P.. (2019). Escape room as learning environment: combining technology, theater and creative writing in education. Paper presented at the 2nd international conference digital culture & audiovisual challenges 2019 (dcac 2019).
    [Bibtex]
    @inproceedings{karageorgiou2019escape,
    title={Escape Room as learning environment: combining technology, theater and creative writing in education},
    author={Karageorgiou, Zoi and Mavrommati, Eirini and Christopoulou, Eleni and Fotaris, Panagiotis},
    booktitle={2nd International Conference Digital Culture & AudioVisual Challenges
    2019 (DCAC 2019)},
    year={2019},
    institution={EasyChair}
    }
  • Magioladitis, M., Ringas, D., & Christopoulou, E.. (2019). Promoting cultural heritage via gamification and augmented reality. Paper presented at the 2nd international conference digital culture & audiovisual challenges 2019 (dcac 2019).
    [Bibtex]
    @inproceedings{magioladitis2019promoting,
    title={Promoting cultural heritage via gamification and augmented reality},
    author={Magioladitis, Marios and Ringas, Dimitrios and Christopoulou, Eleni},
    booktitle={2nd International Conference Digital Culture & AudioVisual Challenges
    2019 (DCAC 2019)},
    year={2019},
    institution={EasyChair}
    }
  • Stasinopoulos, A., Ntantogian, C., & Xenakis, C.. (2019). Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications. International journal of information security, 18(1), 49–72.
    [Bibtex]
    @article{stasinopoulos2019commix,
    title={Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications},
    author={Stasinopoulos, Anastasios and Ntantogian, Christoforos and Xenakis, Christos},
    journal={International Journal of Information Security},
    volume={18},
    number={1},
    pages={49--72},
    year={2019},
    publisher={Springer Berlin Heidelberg}
    }
  • Ntantogian, C., Malliaros, S., & Xenakis, C.. (2019). Evaluation of password hashing schemes in open source web platforms. Computers & security, 84, 206–224.
    [Bibtex]
    @article{ntantogian2019evaluation,
    title={Evaluation of password hashing schemes in open source web platforms},
    author={Ntantogian, Christoforos and Malliaros, Stefanos and Xenakis, Christos},
    journal={Computers \& Security},
    volume={84},
    pages={206--224},
    year={2019},
    publisher={Elsevier Advanced Technology}
    }
  • Ntantogian, C., Poulios, G., Karopoulos, G., & Xenakis, C.. (2019). Transforming malicious code to rop gadgets for antivirus evasion. Iet information security.
    [Bibtex]
    @article{ntantogian2019transforming,
    title={Transforming Malicious Code to ROP Gadgets for Antivirus Evasion},
    author={Ntantogian, Christoforos and Poulios, Giorgos and Karopoulos, Georgios and Xenakis, Christos},
    journal={IET Information Security},
    year={2019},
    publisher={IET}
    }
  • Ntantogian, C., Veroni, E., Karopoulos, G., & Xenakis, C.. (2019). A survey of voice and communication protection solutions against wiretapping. Computers & electrical engineering, 77, 163–178.
    [Bibtex]
    @article{ntantogian2019survey,
    title={A survey of voice and communication protection solutions against wiretapping},
    author={Ntantogian, Christoforos and Veroni, Eleni and Karopoulos, Georgios and Xenakis, Christos},
    journal={Computers \& Electrical Engineering},
    volume={77},
    pages={163--178},
    year={2019},
    publisher={Elsevier}
    }
  • Koutroumpouchos, N., Ntantogian, C., Menesidou, S., Liang, K., Gouvas, P., Xenakis, C., & Giannetsos, T.. (2019). Secure edge computing with lightweight control-flow property-based attestation. Paper presented at the 2019 ieee conference on network softwarization (netsoft).
    [Bibtex]
    @inproceedings{koutroumpouchos2019secure,
    title={Secure edge computing with lightweight control-flow property-based attestation},
    author={Koutroumpouchos, Nikos and Ntantogian, Christoforos and Menesidou, Sofia-Anna and Liang, Kaitai and Gouvas, Panagiotis and Xenakis, Christos and Giannetsos, Thanassis},
    booktitle={2019 IEEE Conference on Network Softwarization (NetSoft)},
    pages={84--92},
    year={2019},
    organization={IEEE}
    }
  • Bolgouras, V., Ntantogian, C., Panaousis, E., & Xenakis, C.. (2019). Distributed key management in microgrids. Ieee transactions on industrial informatics.
    [Bibtex]
    @article{bolgouras2019distributed,
    title={Distributed Key Management in Microgrids},
    author={Bolgouras, Vaios and Ntantogian, Christoforos and Panaousis, Emmanouil and Xenakis, Christos},
    journal={IEEE Transactions on Industrial Informatics},
    year={2019},
    publisher={IEEE}
    }
  • Ntantogian, C., Xenakis, C., & Lopez, J.. (2019). Sealedgrid: a secure interconnection of technologies for smart grid applications. Paper presented at the Critical information infrastructures security: 14th international conference, critis 2019, linköping, sweden, september 23–25, 2019, revised selected papers.
    [Bibtex]
    @inproceedings{ntantogian2019sealedgrid,
    title={SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications},
    author={Ntantogian, Christoforos and Xenakis, Christos and Lopez, Javier},
    booktitle={Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019, Link{\"o}ping, Sweden, September 23--25, 2019, Revised Selected Papers},
    volume={11777},
    pages={169},
    year={2019},
    organization={Springer Nature}
    }
  • Koutroumpouchos, N., Lavdanis, G., Veroni, E., Ntantogian, C., & Xenakis, C.. (2019). Objectmap: detecting insecure object deserialization. Paper presented at the Proceedings of the 23rd pan-hellenic conference on informatics.
    [Bibtex]
    @inproceedings{koutroumpouchos2019objectmap,
    title={ObjectMap: detecting insecure object deserialization},
    author={Koutroumpouchos, Nikolaos and Lavdanis, Georgios and Veroni, Eleni and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={Proceedings of the 23rd Pan-Hellenic Conference on Informatics},
    pages={67--72},
    year={2019}
    }
  • Bampatsikos, M., Ntantogian, C., Xenakis, C., & Thomopoulos, S. C.. (2019). Barrett blockchain regulated remote attestation. Paper presented at the Ieee/wic/acm international conference on web intelligence-companion volume.
    [Bibtex]
    @inproceedings{bampatsikos2019barrett,
    title={BARRETT BlockchAin Regulated REmote aTTestation},
    author={Bampatsikos, Michail and Ntantogian, Christoforos and Xenakis, Christos and Thomopoulos, Stelios CA},
    booktitle={IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume},
    pages={256--262},
    year={2019}
    }
  • Farao, A., Rubio, J. E., Alcaraz, C., Ntantogian, C., Xenakis, C., & Lopez, J.. (2019). Sealedgrid: a secure interconnection of technologies for smart grid applications. Paper presented at the International conference on critical information infrastructures security.
    [Bibtex]
    @inproceedings{farao2019sealedgrid,
    title={SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications},
    author={Farao, Aristeidis and Rubio, Juan Enrique and Alcaraz, Cristina and Ntantogian, Christoforos and Xenakis, Christos and Lopez, Javier},
    booktitle={International Conference on Critical Information Infrastructures Security},
    pages={169--175},
    year={2019},
    organization={Springer}
    }
  • Jiang, H., Siponen, M., & Tsohou, A.. (2019). A field experiment for understanding the unintended impact of internet monitoring on employees: policy satisfaction, organizational citizenship behaviour and work motivation. Paper presented at the 27th european conference on information systems (ecis).
    [Bibtex]
    @inproceedings{jiang2019field,
    title={A FIELD EXPERIMENT FOR UNDERSTANDING THE UNINTENDED IMPACT OF INTERNET MONITORING ON EMPLOYEES: POLICY SATISFACTION, ORGANIZATIONAL CITIZENSHIP BEHAVIOUR AND WORK MOTIVATION},
    author={Jiang, Hemin and Siponen, Mikko and Tsohou, Aggeliki},
    booktitle={27th European Conference on Information Systems (ECIS)},
    year={2019}
    }
  • Piras, L., Al-Obeidallah, M. G., Praitano, A., Tsohou, A., Mouratidis, H., Crespo, B. G., Bernard, J. B., Fiorani, M., Magkos, E., Sanz, A. C., & others. (2019). Defend architecture: a privacy by design platform for gdpr compliance. Paper presented at the International conference on trust and privacy in digital business.
    [Bibtex]
    @inproceedings{piras2019defend,
    title={DEFeND architecture: a privacy by design platform for GDPR compliance},
    author={Piras, Luca and Al-Obeidallah, Mohammed Ghazi and Praitano, Andrea and Tsohou, Aggeliki and Mouratidis, Haralambos and Crespo, Beatriz Gallego-Nicasio and Bernard, Jean Baptiste and Fiorani, Marco and Magkos, Emmanouil and Sanz, Andres Castillo and others},
    booktitle={International Conference on Trust and Privacy in Digital Business},
    pages={78--93},
    year={2019},
    organization={Springer, Cham}
    }
  • Diamantopoulou, V., Tsohou, A., & Karyda, M.. (2019). General data protection regulation and iso/iec 27001: 2013: synergies of activities towards organisations’ compliance. Paper presented at the International conference on trust and privacy in digital business.
    [Bibtex]
    @inproceedings{diamantopoulou2019general,
    title={General data protection regulation and ISO/IEC 27001: 2013: synergies of activities towards organisations’ compliance},
    author={Diamantopoulou, Vasiliki and Tsohou, Aggeliki and Karyda, Maria},
    booktitle={International Conference on Trust and Privacy in Digital Business},
    pages={94--109},
    year={2019},
    organization={Springer, Cham}
    }
  • Lavranou, R., & Tsohou, A.. (2019). Developing and validating a common body of knowledge for information privacy. Information & computer security.
    [Bibtex]
    @article{lavranou2019developing,
    title={Developing and validating a common body of knowledge for information privacy},
    author={Lavranou, Rena and Tsohou, Aggeliki},
    journal={Information \& Computer Security},
    year={2019},
    publisher={Emerald Publishing Limited}
    }
  • Soumelidou, A., & Tsohou, A.. (2019). Effects of privacy policy visualization on users’ information privacy awareness level. Information technology & people.
    [Bibtex]
    @article{soumelidou2019effects,
    title={Effects of privacy policy visualization on users’ information privacy awareness level},
    author={Soumelidou, Aikaterini and Tsohou, Aggeliki},
    journal={Information Technology \& People},
    year={2019},
    publisher={Emerald Publishing Limited}
    }
  • Diamantopoulou, V., Tsohou, A., & Karyda, M.. (2019). From iso/iec 27002: 2013 information security controls to personal data protection controls: guidelines for gdpr compliance. In Computer security (pp. 238–257). Springer, cham.
    [Bibtex]
    @incollection{diamantopoulou2019iso,
    title={From ISO/IEC 27002: 2013 information security controls to personal data protection controls: guidelines for GDPR compliance},
    author={Diamantopoulou, Vasiliki and Tsohou, Aggeliki and Karyda, Maria},
    booktitle={Computer Security},
    pages={238--257},
    year={2019},
    publisher={Springer, Cham}
    }
  • Tsohou, A., Magkos, M., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M., & Crespo, B. G.. (2019). Privacy, security, legal and technology acceptance requirements for a gdpr compliance platform. In Computer security (pp. 204–223). Springer, cham.
    [Bibtex]
    @incollection{tsohou2019privacy,
    title={Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform},
    author={Tsohou, Aggeliki and Magkos, Manos and Mouratidis, Haralambos and Chrysoloras, George and Piras, Luca and Pavlidis, Michalis and Debussche, Julien and Rotoloni, Marco and Crespo, Beatriz Gallego-Nicasio},
    booktitle={Computer Security},
    pages={204--223},
    year={2019},
    publisher={Springer, Cham}
    }
  • Gritzalis, A., Tsohou, A., & Lambrinoudakis, C.. (2019). Transparency-enabling information systems: trust relations and privacy concerns in open governance. International journal of electronic governance, 11(3-4), 310–332.
    [Bibtex]
    @article{gritzalis2019transparency,
    title={Transparency-enabling information systems: trust relations and privacy concerns in open governance},
    author={Gritzalis, Aristomenis and Tsohou, Aggeliki and Lambrinoudakis, Costas},
    journal={International Journal of Electronic Governance},
    volume={11},
    number={3-4},
    pages={310--332},
    year={2019},
    publisher={Inderscience Publishers (IEL)}
    }
  • Papaioannou, T., Tsohou, A., & Karyda, M.. (2019). Shaping digital identities in social networks: data elements and the role of privacy concerns. In Computer security (pp. 159–180). Springer, cham.
    [Bibtex]
    @incollection{papaioannou2019shaping,
    title={Shaping digital identities in social networks: Data elements and the role of privacy concerns},
    author={Papaioannou, Thanos and Tsohou, Aggeliki and Karyda, Maria},
    booktitle={Computer security},
    pages={159--180},
    year={2019},
    publisher={Springer, Cham}
    }

2018

  • Fanarioti, S., Tsipis, A., Giannakis, K., Koufoudakis, G., Christopoulou, E., Oikonomou, K., & Stavrakakis, I.. (2018). A proposed algorithm for data measurements synchronization in wireless sensor networks. Paper presented at the Second international balkan conference on communications and networking 2018 (balkancom’18).
    [Bibtex]
    @inproceedings{fanarioti2018proposed,
    title={A proposed algorithm for data measurements synchronization in wireless sensor networks},
    author={Fanarioti, Sofia and Tsipis, Athanasios and Giannakis, Konstantinos and Koufoudakis, George and Christopoulou, Eleni and Oikonomou, Konstantinos and Stavrakakis, Ioannis},
    booktitle={Second International Balkan Conference on Communications and Networking 2018 (BalkanCom’18)},
    pages={1--5},
    year={2018}
    }
  • Karopoulos, G., Ntantogian, C., & Xenakis, C.. (2018). Masker: masking for privacy-preserving aggregation in the smart grid ecosystem. Computers & security, 73, 307–325.
    [Bibtex]
    @article{karopoulos2018masker,
    title={MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem},
    author={Karopoulos, Georgios and Ntantogian, Christoforos and Xenakis, Christos},
    journal={Computers \& Security},
    volume={73},
    pages={307--325},
    year={2018},
    publisher={Elsevier}
    }
  • Kitsaki, T., Angelogianni, A., Ntantogian, C., & Xenakis, C.. (2018). A forensic investigation of android mobile applications. Paper presented at the Proceedings of the 22nd pan-hellenic conference on informatics.
    [Bibtex]
    @inproceedings{kitsaki2018forensic,
    title={A forensic investigation of Android mobile applications},
    author={Kitsaki, Theodoula-Ioanna and Angelogianni, Anna and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={Proceedings of the 22nd Pan-Hellenic Conference on Informatics},
    pages={58--63},
    year={2018},
    organization={ACM}
    }
  • Tsohou, A., & Holtkamp, P.. (2018). Are users competent to comply with information security policies? an analysis of professional competence models. Information technology & people.
    [Bibtex]
    @article{tsohou2018users,
    title={Are users competent to comply with information security policies? An analysis of professional competence models},
    author={Tsohou, Aggeliki and Holtkamp, Philipp},
    journal={Information Technology \& People},
    year={2018},
    publisher={Emerald Publishing Limited}
    }
  • Siponen, M., & Tsohou, A.. (2018). Demystifying the influential is legends of positivism. Journal of the association for information systems, 19(7), 600–617.
    [Bibtex]
    @article{siponen2018demystifying,
    title={Demystifying the influential IS legends of positivism},
    author={Siponen, Mikko and Tsohou, Aggeliki},
    journal={Journal of the Association for Information Systems},
    volume={19},
    number={7},
    pages={600--617},
    year={2018},
    publisher={Association for Information Systems}
    }
  • Paspatis, I., Tsohou, A., & Kokolakis, S.. (2018). Appaware: a model for privacy policy visualization for mobile applications.. Paper presented at the Mcis.
    [Bibtex]
    @inproceedings{paspatis2018appaware,
    title={AppAware: A Model for Privacy Policy Visualization for Mobile Applications.},
    author={Paspatis, Ioannis and Tsohou, Aggeliki and Kokolakis, Spyros},
    booktitle={MCIS},
    pages={3},
    year={2018}
    }
  • Karagiannis, S., & Magkos, E.. (2018). User profiling in cybersecurity education and training. Paper presented at the Mcis2018.
    [Bibtex]
    @inproceedings{karagiannis2018user,
    title={User Profiling in Cybersecurity Education and Training},
    author={Karagiannis, S and Magkos, E},
    booktitle={MCIS2018},
    year={2018}
    }

2017

  • Kosyfaki, C., Angelova, N. P., Tsohou, A., & Magkos, E.. (2017). The privacy paradox in the context of online health data disclosure by users. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
    [Bibtex]
    @inproceedings{kosyfaki2017privacy,
    title={The Privacy Paradox in the Context of Online Health Data Disclosure by Users},
    author={Kosyfaki, Chrysanthi and Angelova, Nelina P and Tsohou, Aggeliki and Magkos, Emmanouil},
    booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems},
    pages={421--428},
    year={2017},
    organization={Springer, Cham}
    }
  • Grammenos, P., Syrengela, N., Magkos, E., & Tsohou, A.. (2017). Internet addiction of young greek adults: psychological aspects and information privacy. In Genedis 2016 (pp. 67–78). Springer, cham.
    [Bibtex]
    @incollection{grammenos2017internet,
    title={Internet addiction of young Greek adults: psychological aspects and information privacy},
    author={Grammenos, P and Syrengela, NA and Magkos, E and Tsohou, A},
    booktitle={GeNeDis 2016},
    pages={67--78},
    year={2017},
    publisher={Springer, Cham}
    }
  • Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C.. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer networks, 113, 94–110.
    [Bibtex]
    @article{panos2017analyzing,
    title={Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks},
    author={Panos, Christoforos and Ntantogian, Chirstoforos and Malliaros, Stefanos and Xenakis, Christos},
    journal={Computer Networks},
    volume={113},
    pages={94--110},
    year={2017},
    publisher={Elsevier}
    }
  • Panou, A., Ntantogian, C., & Xenakis, C.. (2017). Riski: a framework for modeling cyber threats to estimate risk for data breach insurance. Paper presented at the Proceedings of the 21st pan-hellenic conference on informatics.
    [Bibtex]
    @inproceedings{panou2017riski,
    title={RiSKi: A framework for modeling cyber threats to estimate risk for data breach insurance},
    author={Panou, Angeliki and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={Proceedings of the 21st Pan-Hellenic Conference on Informatics},
    pages={1--6},
    year={2017}
    }
  • Panos, C., Malliaros, S., Ntantogian, C., Panou, A., & Xenakis, C.. (2017). A security evaluation of fido’s uaf protocol in mobile and embedded devices. Paper presented at the International tyrrhenian workshop on digital communication.
    [Bibtex]
    @inproceedings{panos2017security,
    title={A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices},
    author={Panos, Christoforos and Malliaros, Stefanos and Ntantogian, Christoforos and Panou, Angeliki and Xenakis, Christos},
    booktitle={International Tyrrhenian Workshop on Digital Communication},
    pages={127--142},
    year={2017},
    organization={Springer}
    }
  • Karopoulos, G., Ntantogian, C., & Xenakis, C.. (2017). Privacy-preserving aggregation in the smart grid. In Security solutions and applied cryptography in smart grid communications (pp. 80–97). Igi global.
    [Bibtex]
    @incollection{karopoulos2017privacy,
    title={Privacy-Preserving Aggregation in the Smart Grid},
    author={Karopoulos, Georgios and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={Security Solutions and Applied Cryptography in Smart Grid Communications},
    pages={80--97},
    year={2017},
    publisher={IGI Global}
    }
  • Tsohou, A., & Kosta, E.. (2017). Enabling valid informed consent for location tracking through privacy awareness of users: a process theory. Computer law & security review, 33(4), 434–457.
    [Bibtex]
    @article{tsohou2017enabling,
    title={Enabling valid informed consent for location tracking through privacy awareness of users: A process theory},
    author={Tsohou, Aggeliki and Kosta, Eleni},
    journal={Computer Law \& Security Review},
    volume={33},
    number={4},
    pages={434--457},
    year={2017},
    publisher={Elsevier Advanced Technology}
    }
  • Diamantopoulou, V., Tsohou, A., Loukis, E. N., & Gritzalis, S.. (2017). Does the development of information systems resources lead to the development of information security resources? an empirical investigation. .
    [Bibtex]
    @article{diamantopoulou2017does,
    title={Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation},
    author={Diamantopoulou, Vasiliki and Tsohou, Aggeliki and Loukis, Euripidis N and Gritzalis, Stefanos},
    year={2017}
    }
  • Kosyfaki, C., Angelova, N. P., Tsohou, A., & Magkos, E.. (2017). The privacy paradox in the context of online health data disclosure by users. Paper presented at the European, mediterranean, and middle eastern conference on information systems.
    [Bibtex]
    @inproceedings{kosyfaki2017privacy,
    title={The Privacy Paradox in the Context of Online Health Data Disclosure by Users},
    author={Kosyfaki, Chrysanthi and Angelova, Nelina P and Tsohou, Aggeliki and Magkos, Emmanouil},
    booktitle={European, Mediterranean, and Middle Eastern Conference on Information Systems},
    pages={421--428},
    year={2017},
    organization={Springer, Cham}
    }
  • Grammenos, P., Syrengela, N., Magkos, E., & Tsohou, A.. (2017). Internet addiction of young greek adults: psychological aspects and information privacy. In Genedis 2016 (pp. 67–78). Springer, cham.
    [Bibtex]
    @incollection{grammenos2017internet,
    title={Internet addiction of young Greek adults: psychological aspects and information privacy},
    author={Grammenos, P and Syrengela, NA and Magkos, E and Tsohou, A},
    booktitle={GeNeDis 2016},
    pages={67--78},
    year={2017},
    publisher={Springer, Cham}
    }
  • Gritzalis, A., Tsohou, A., & Lambrinoudakis, C.. (2017). Transparency-enabling systems for open governance: their impact on citizens’ trust and the role of information privacy. Paper presented at the International conference on e-democracy.
    [Bibtex]
    @inproceedings{gritzalis2017transparency,
    title={Transparency-Enabling Systems for Open Governance: Their Impact on Citizens’ Trust and the Role of Information Privacy},
    author={Gritzalis, Aristomenis and Tsohou, Aggeliki and Lambrinoudakis, Costas},
    booktitle={International Conference on e-Democracy},
    pages={47--63},
    year={2017},
    organization={Springer, Cham}
    }
  • Lee, H., Tsohou, A., & Choi, Y.. (2017). Embedding persuasive features into policy issues: implications to designing public participation processes. Government information quarterly, 34(4), 591–600.
    [Bibtex]
    @article{lee2017embedding,
    title={Embedding persuasive features into policy issues: Implications to designing public participation processes},
    author={Lee, Habin and Tsohou, Aggeliki and Choi, Youngseok},
    journal={Government Information Quarterly},
    volume={34},
    number={4},
    pages={591--600},
    year={2017},
    publisher={JAI}
    }
  • Ioannis Paspatis, I. P., Aggeliki Tsohou, A. T., & Spyros Kokolakis, S. K.. (2017). Mobile application privacy risks: viber users’ de-anonymization using public data. Paper presented at the Mediterranean conference on information systems (mcis).
    [Bibtex]
    @inproceedings{ioannis2017mobile,
    title={Mobile application privacy risks: Viber users’ de-anonymization using public data},
    author={Ioannis Paspatis, Ioannis Paspatis and Aggeliki Tsohou, Aggeliki Tsohou and Spyros Kokolakis, Spyros Kokolakis},
    booktitle={Mediterranean Conference on Information Systems (MCIS)},
    year={2017},
    organization={Association For Information Systems}
    }
  • Karagiannis, S., & Magkos, E.. (2017). Decentralized internet privacy: towards a blockchain framework for healthcare. Paper presented at the Mcis2017.
    [Bibtex]
    @inproceedings{karagiannis2017decentralized,
    title={Decentralized Internet Privacy: Towards a Blockchain Framework for Healthcare},
    author={Karagiannis, S and Magkos, E},
    booktitle={MCIS2017},
    year={2017}
    }

2016

  • Kotzanikolaou, P., Patsakis, C., Magkos, E., & Korakakis, M.. (2016). Lightweight private proximity testing for geospatial social networks. Computer communications, 73, 263–270.
    [Bibtex]
    @article{kotzanikolaou2016lightweight,
    title={Lightweight private proximity testing for geospatial social networks},
    author={Kotzanikolaou, Panayiotis and Patsakis, Constantinos and Magkos, Emmanouil and Korakakis, Michalis},
    journal={Computer Communications},
    volume={73},
    pages={263--270},
    year={2016},
    publisher={Elsevier}
    }
  • Magkos, E.. (2016). National critical infrastructure protection: an identification and assessment methodology. .
    [Bibtex]
    @article{magkos2016national,
    title={National Critical Infrastructure Protection: An Identification and Assessment Methodology},
    author={Magkos, E},
    year={2016}
    }
  • Karavaras, E., Magkos, E., & Tsohou, A.. (2016). Low user awareness against social malware: an empirical study and design of a security awareness application. Paper presented at the 13th european mediterranean and middle eastern conference on information systems.
    [Bibtex]
    @inproceedings{karavaras2016low,
    title={Low user awareness against social malware: An empirical study and design of a security awareness application},
    author={Karavaras, Eleftherios and Magkos, Emmanouil and Tsohou, Aggeliki},
    booktitle={13th European Mediterranean and Middle Eastern Conference on Information Systems},
    volume={13},
    pages={1--10},
    year={2016}
    }
  • Gritzalis, D., Stergiopoulos, G., Kotzanikolaou, P., Magkos, E., & Lykou, G.. (2016). Critical infrastructure protection: a holistic methodology for greece. Paper presented at the International workshop on the security of industrial control systems and cyber-physical systems.
    [Bibtex]
    @inproceedings{gritzalis2016critical,
    title={Critical infrastructure protection: a holistic methodology for Greece},
    author={Gritzalis, Dimitris and Stergiopoulos, George and Kotzanikolaou, Panayiotis and Magkos, Emmanouil and Lykou, Georgia},
    booktitle={International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems},
    pages={19--34},
    year={2016},
    organization={Springer, Cham}
    }
  • Xenakis, C., Ntantogian, C., & Panos, O.. (2016). (u) simmonitor: a mobile application for security evaluation of cellular networks. Computers & security, 60, 62–78.
    [Bibtex]
    @article{xenakis2016u,
    title={(U) SimMonitor: A mobile application for security evaluation of cellular networks},
    author={Xenakis, Christos and Ntantogian, Christoforos and Panos, Orestis},
    journal={Computers \& Security},
    volume={60},
    pages={62--78},
    year={2016},
    publisher={Elsevier}
    }
  • Malliaros, S., Ntantogian, C., & Xenakis, C.. (2016). Protecting sensitive information in the volatile memory from disclosure attacks. Paper presented at the 2016 11th international conference on availability, reliability and security (ares).
    [Bibtex]
    @inproceedings{malliaros2016protecting,
    title={Protecting sensitive information in the volatile memory from disclosure attacks},
    author={Malliaros, Stefanos and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={2016 11th International Conference on Availability, Reliability and Security (ARES)},
    pages={687--693},
    year={2016},
    organization={IEEE}
    }
  • Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G., & Xenakis, C.. (2016). Evaluation of cryptography usage in android applications. Paper presented at the Proceedings of the 9th eai international conference on bio-inspired information and communications technologies (formerly bionetics).
    [Bibtex]
    @inproceedings{chatzikonstantinou2016evaluation,
    title={Evaluation of cryptography usage in android applications},
    author={Chatzikonstantinou, Alexia and Ntantogian, Christoforos and Karopoulos, Georgios and Xenakis, Christos},
    booktitle={Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)},
    pages={83--90},
    year={2016},
    organization={ICST (Institute for Computer Sciences, Social-Informatics and~…}
    }
  • Karavaras, E., Magkos, E., & Tsohou, A.. (2016). Low user awareness against social malware: an empirical study and design of a security awareness application. Paper presented at the European, mediterranean and middle eastern conference on information systems.
    [Bibtex]
    @inproceedings{karavaras2016low,
    title={LOW USER AWARENESS AGAINST SOCIAL MALWARE: AN EMPIRICAL STUDY AND DESIGN OF A SECURITY AWARENESS APPLICATION},
    author={Karavaras, Eleftherios and Magkos, Emmanouil and Tsohou, Aggeliki},
    booktitle={European, Mediterranean and Middle Eastern Conference on Information Systems},
    year={2016}
    }

2015

  • Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2015). Field experience and user evaluation from a real-world internet application in an urban-scale environment. International journal of intelligent engineering informatics, 3(2-3), 144–165.
    [Bibtex]
    @article{ringas2015field,
    title={Field experience and user evaluation from a real-world internet application in an urban-scale environment},
    author={Ringas, Dimitrios and Christopoulou, Eleni and Stefanidakis, Michail},
    journal={International Journal of Intelligent Engineering Informatics},
    volume={3},
    number={2-3},
    pages={144--165},
    year={2015},
    publisher={Inderscience Publishers (IEL)}
    }
  • Christopoulou, E., & Ringas, D.. (2015). Wild recommendations: presenting citizens relevant content based on use patterns and context. Paper presented at the 2015 6th international conference on information, intelligence, systems and applications (iisa).
    [Bibtex]
    @inproceedings{christopoulou2015wild,
    title={Wild recommendations: Presenting citizens relevant content based on use patterns and context},
    author={Christopoulou, Eleni and Ringas, Dimitrios},
    booktitle={2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)},
    pages={1--6},
    year={2015},
    organization={IEEE}
    }
  • Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2015). Content seeking strategies in urban computing applications. Paper presented at the 2015 6th international conference on information, intelligence, systems and applications (iisa).
    [Bibtex]
    @inproceedings{ringas2015content,
    title={Content seeking strategies in urban computing applications},
    author={Ringas, Dimitrios and Christopoulou, Eleni and Stefanidakis, Michail},
    booktitle={2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)},
    pages={1--6},
    year={2015},
    organization={IEEE}
    }
  • Ntantogian, C., Valtas, G., Kapetanakis, N., Lalagiannis, F., Karopoulos, G., & Xenakis, C.. (2015). Attacking gsm networks as a script kiddie using commodity hardware and software. Paper presented at the International conference on trust and privacy in digital business.
    [Bibtex]
    @inproceedings{ntantogian2015attacking,
    title={Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software},
    author={Ntantogian, Christoforos and Valtas, Grigoris and Kapetanakis, Nikos and Lalagiannis, Faidon and Karopoulos, Georgios and Xenakis, Christos},
    booktitle={International Conference on Trust and Privacy in Digital Business},
    pages={73--86},
    year={2015},
    organization={Springer}
    }
  • Poulios, G., Ntantogian, C., & Xenakis, C.. (2015). Ropinjector: using return oriented programming for polymorphism and antivirus evasion. Blackhat usa.
    [Bibtex]
    @article{poulios2015ropinjector,
    title={Ropinjector: Using return oriented programming for polymorphism and antivirus evasion},
    author={Poulios, Giorgos and Ntantogian, Christoforos and Xenakis, Christos},
    journal={Blackhat USA},
    year={2015}
    }
  • Xenakis, C., & Ntantogian, C.. (2015). Attacking the baseband modem of mobile phones to breach the users’ privacy and network security. Paper presented at the 2015 7th international conference on cyber conflict: architectures in cyberspace.
    [Bibtex]
    @inproceedings{xenakis2015attacking,
    title={Attacking the baseband modem of mobile phones to breach the users' privacy and network security},
    author={Xenakis, Christos and Ntantogian, Christoforos},
    booktitle={2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace},
    pages={231--244},
    year={2015},
    organization={IEEE}
    }
  • Stasinopoulos, A., Ntantogian, C., & Xenakis, C.. (2015). Commix: detecting and exploiting command injection flaws.. Department of digital systems, university of piraeus, blackhat europe, nov, 10–13.
    [Bibtex]
    @article{stasinopoulos2015commix,
    title={Commix: Detecting and exploiting command injection flaws.},
    author={Stasinopoulos, Anastasios and Ntantogian, Christoforos and Xenakis, Christos},
    journal={Department of Digital Systems, University of Piraeus, BlackHat Europe, Nov},
    pages={10--13},
    year={2015}
    }
  • Ntantogian, C., Malliaros, S., & Xenakis, C.. (2015). Gaithashing: a two-factor authentication scheme based on gait features. Computers & security, 52, 17–32.
    [Bibtex]
    @article{ntantogian2015gaithashing,
    title={Gaithashing: a two-factor authentication scheme based on gait features},
    author={Ntantogian, Christoforos and Malliaros, Stefanos and Xenakis, Christos},
    journal={Computers \& Security},
    volume={52},
    pages={17--32},
    year={2015},
    publisher={Elsevier}
    }
  • Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.. (2015). Managing the introduction of information security awareness programmes in organisations. European journal of information systems, 24(1), 38–58.
    [Bibtex]
    @article{tsohou2015managing,
    title={Managing the introduction of information security awareness programmes in organisations},
    author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos},
    journal={European Journal of Information Systems},
    volume={24},
    number={1},
    pages={38--58},
    year={2015},
    publisher={Taylor \& Francis}
    }
  • Tsohou, A., Karyda, M., & Kokolakis, S.. (2015). Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs. Computers & security, 52, 128–141.
    [Bibtex]
    @article{tsohou2015analyzing,
    title={Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs},
    author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros},
    journal={Computers \& security},
    volume={52},
    pages={128--141},
    year={2015},
    publisher={Elsevier Advanced Technology}
    }
  • Jiang, H., & Tsohou, A.. (2015). The same antecedents do not fit all activities: an activity-specific model of personal internet use in workplace. .
    [Bibtex]
    @article{jiang2015same,
    title={The Same Antecedents Do Not Fit All Activities: An Activity-specific Model of Personal Internet Use in Workplace},
    author={Jiang, Hemin and Tsohou, Aggeliki},
    year={2015}
    }
  • Moon, J. O., Lee, H., Kim, J. W., Aktas, E., Tsohou, A., & Choi, Y.. (2015). Customer satisfaction from open source software services in the presence of commercially licensed software. Asia pacific journal of information systems, 25(3), 473–499.
    [Bibtex]
    @article{moon2015customer,
    title={Customer satisfaction from open source software services in the presence of commercially licensed software},
    author={Moon, Jung Oh and Lee, Habin and Kim, Jong Woo and Aktas, Emel and Tsohou, Aggeliki and Choi, Youngseok},
    journal={Asia pacific journal of information systems},
    volume={25},
    number={3},
    pages={473--499},
    year={2015},
    publisher={The Korea Society of Management Information Systems}
    }

2014

  • Magkos, E., Kotzanikolaou, P., Magioladitis, M., Sioutas, S., & Verykios, V. S.. (2014). Towards secure and practical location privacy through private equality testing. Paper presented at the International conference on privacy in statistical databases.
    [Bibtex]
    @inproceedings{magkos2014towards,
    title={Towards secure and practical location privacy through private equality testing},
    author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Magioladitis, Marios and Sioutas, Spyros and Verykios, Vassilios S},
    booktitle={International Conference on Privacy in Statistical Databases},
    pages={312--325},
    year={2014},
    organization={Springer, Cham}
    }
  • Fronimos, D., Magkos, E., & Chrissikopoulos, V.. (2014). Evaluating low interaction honeypots and on their use against advanced persistent threats. Paper presented at the Proceedings of the 18th panhellenic conference on informatics.
    [Bibtex]
    @inproceedings{fronimos2014evaluating,
    title={Evaluating low interaction honeypots and on their use against advanced persistent threats},
    author={Fronimos, D and Magkos, Emmanouil and Chrissikopoulos, Vassilios},
    booktitle={Proceedings of the 18th Panhellenic Conference on Informatics},
    pages={1--2},
    year={2014}
    }
  • Magkos, E., Kleisiari, E., Chanias, P., & Giannakouris-Salalidis, V.. (2014). Parental control and children’s internet safety: the good, the bad and the ugly. Paper presented at the 6th international conference on information law and ethics (icil 2014).
    [Bibtex]
    @inproceedings{magkos2014parental,
    title={Parental Control and Children’s Internet Safety: The Good, the Bad and the Ugly},
    author={Magkos, Emmanouil and Kleisiari, Eleni and Chanias, Panagiotis and Giannakouris-Salalidis, Viktor},
    booktitle={6th International Conference on Information Law and Ethics (ICIL 2014)},
    year={2014}
    }
  • Korakakis, M., Magkos, E., & Mylonas, P.. (2014). Automated captcha solving: an empirical comparison of selected techniques. Paper presented at the 2014 9th international workshop on semantic and social media adaptation and personalization.
    [Bibtex]
    @inproceedings{korakakis2014automated,
    title={Automated CAPTCHA solving: An empirical comparison of selected techniques},
    author={Korakakis, Michalis and Magkos, Emmanouil and Mylonas, Phivos},
    booktitle={2014 9th International Workshop on Semantic and Social Media Adaptation and Personalization},
    pages={44--47},
    year={2014},
    organization={IEEE}
    }
  • Christopoulou, E., Ringas, D., & Garofalakis, J.. (2014). The vision of the sociable smart city. Paper presented at the International conference on distributed, ambient, and pervasive interactions.
    [Bibtex]
    @inproceedings{christopoulou2014vision,
    title={The vision of the sociable smart city},
    author={Christopoulou, Eleni and Ringas, Dimitrios and Garofalakis, John},
    booktitle={International Conference on Distributed, Ambient, and Pervasive Interactions},
    pages={545--554},
    year={2014},
    organization={Springer, Cham}
    }
  • Ntantogian, C., Apostolopoulos, D., Marinakis, G., & Xenakis, C.. (2014). Evaluating the privacy of android mobile applications under forensic analysis. Computers & security, 42, 66–76.
    [Bibtex]
    @article{ntantogian2014evaluating,
    title={Evaluating the privacy of Android mobile applications under forensic analysis},
    author={Ntantogian, Christoforos and Apostolopoulos, Dimitris and Marinakis, Giannis and Xenakis, Christos},
    journal={Computers \& Security},
    volume={42},
    pages={66--76},
    year={2014},
    publisher={Elsevier}
    }
  • Stasinopoulos, A., Ntantogian, C., & Xenakis, C.. (2014). Bypassing xss auditor: taking advantage of badly written php code. Paper presented at the 2014 ieee international symposium on signal processing and information technology (isspit).
    [Bibtex]
    @inproceedings{stasinopoulos2014bypassing,
    title={Bypassing XSS Auditor: Taking advantage of badly written PHP code},
    author={Stasinopoulos, Anastasios and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)},
    pages={000290--000295},
    year={2014},
    organization={IEEE}
    }
  • Xenakis, C., & Ntantogian, C.. (2014). An advanced persistent threat in 3g networks: attacking the home network from roaming networks. Computers & security, 40, 84–94.
    [Bibtex]
    @article{xenakis2014advanced,
    title={An advanced persistent threat in 3G networks: Attacking the home network from roaming networks},
    author={Xenakis, Christos and Ntantogian, Christoforos},
    journal={Computers \& Security},
    volume={40},
    pages={84--94},
    year={2014},
    publisher={Elsevier}
    }
  • Tsohou, A., Lee, H., & Irani, Z.. (2014). Innovative public governance through cloud computing. Transforming government: people, process and policy.
    [Bibtex]
    @article{tsohou2014innovative,
    title={Innovative public governance through cloud computing},
    author={Tsohou, Aggeliki and Lee, Habin and Irani, Zahir},
    journal={Transforming Government: People, Process and Policy},
    year={2014},
    publisher={Emerald Group Publishing Limited}
    }
  • Jiang, H., & Tsohou, A.. (2014). Expressive or instrumental: the dual perspective model of personal web usage at workplace. .
    [Bibtex]
    @article{jiang2014expressive,
    title={EXPRESSIVE OR INSTRUMENTAL: THE DUAL PERSPECTIVE MODEL OF PERSONAL WEB USAGE AT WORKPLACE},
    author={Jiang, Hemin and Tsohou, Aggeliki},
    year={2014}
    }
  • Jiang, H., & Tsohou, A.. (2014). The dual nature of personal web usage at workplace: impacts, antecedents and regulating policies. .
    [Bibtex]
    @article{jiang2014dual,
    title={The dual nature of personal web usage at workplace: impacts, antecedents and regulating policies},
    author={Jiang, Hemin and Tsohou, Aggeliki},
    year={2014}
    }
  • Koufi, V., Malamateniou, F., Tsohou, A., & Vassilacopoulos, G.. (2014). A framework for privacy-preserving access to next-generation ehrs. In E-health–for continuity of care (pp. 740–744). Ios press.
    [Bibtex]
    @incollection{koufi2014framework,
    title={A framework for privacy-preserving access to next-generation EHRs},
    author={Koufi, Vassiliki and Malamateniou, Flora and Tsohou, Aggeliki and Vassilacopoulos, George},
    booktitle={e-Health--For Continuity of Care},
    pages={740--744},
    year={2014},
    publisher={IOS Press}
    }

2013

  • Magkos, E., Avlonitis, M., Kotzanikolaou, P., & Stefanidakis, M.. (2013). Towards early warning against internet worms based on critical-sized networks. Security and communication networks, 6(1), 78–88.
    [Bibtex]
    @article{magkos2013towards,
    title={Towards Early Warning Against Internet Worms Based on Critical-Sized Networks},
    author={Magkos, Emmanouil and Avlonitis, Markos and Kotzanikolaou, Panayiotis and Stefanidakis, Michalis},
    journal={Security and Communication Networks},
    volume={6},
    number={1},
    pages={78--88},
    year={2013},
    publisher={Wiley Interscience}
    }
  • Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2013). T-abac: an attribute-based access control model for real-time availability in highly dynamic systems. Paper presented at the Ieee symposium on computers and communications – iscc 2013.
    [Bibtex]
    @inproceedings{burmester2013t,
    title={T-ABAC: An Attribute-Based Access Control Model for Real-Time Availability in Highly Dynamic Systems},
    author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilis},
    booktitle={IEEE Symposium on Computers and Communications - ISCC 2013},
    year={2013},
    organization={IEEE}
    }
  • Ringas, D., & Christopoulou, E.. (2013). Collective city memory: field experience on the effect of urban computing on community. Paper presented at the Proceedings of the 6th international conference on communities and technologies.
    [Bibtex]
    @inproceedings{ringas2013collective,
    title={Collective city memory: field experience on the effect of urban computing on community},
    author={Ringas, Dimitrios and Christopoulou, Eleni},
    booktitle={Proceedings of the 6th International Conference on Communities and Technologies},
    pages={157--165},
    year={2013}
    }
  • Christopoulou, E., & Ringas, D.. (2013). Learning activities in a sociable smart city.. Ixd&a, 17, 29–42.
    [Bibtex]
    @article{christopoulou2013learning,
    title={Learning Activities in a Sociable Smart City.},
    author={Christopoulou, Eleni and Ringas, Dimitris},
    journal={IxD\&A},
    volume={17},
    pages={29--42},
    year={2013}
    }
  • Christopoulou, E., Ringas, D., & Garofalakis, J. D.. (2013). Introduction to the proceedings of the sociable smart city 2013 workshop.. Paper presented at the Intelligent environments (workshops).
    [Bibtex]
    @inproceedings{christopoulou2013introduction,
    title={Introduction to the Proceedings of the Sociable Smart City 2013 Workshop.},
    author={Christopoulou, Eleni and Ringas, Dimitris and Garofalakis, John D},
    booktitle={Intelligent Environments (Workshops)},
    pages={615--616},
    year={2013}
    }
  • Christopoulou, E., & Ringas, D.. (2013). Towards the sociable smart city. Paper presented at the Workshop proceedings of the 9th international conference on intelligent environments.
    [Bibtex]
    @inproceedings{christopoulou2013towards,
    title={Towards the Sociable Smart City},
    author={Christopoulou, Eleni and Ringas, Dimitrios},
    booktitle={Workshop Proceedings of the 9th International Conference on Intelligent Environments},
    pages={673--677},
    year={2013},
    organization={IOS Press}
    }
  • Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2013). Infusing collective memory into the city landscape. Paper presented at the Proceedings of the hybrid city conference 2013: subtle revolutions.
    [Bibtex]
    @inproceedings{ringas2013infusing,
    title={Infusing Collective Memory into the City Landscape},
    author={Ringas, Dimitrios and Christopoulou, E and Stefanidakis, M},
    booktitle={Proceedings of the Hybrid City Conference 2013: Subtle rEvolutions},
    pages={23--25},
    year={2013}
    }
  • Apostolopoulos, D., Marinakis, G., Ntantogian, C., & Xenakis, C.. (2013). Discovering authentication credentials in volatile memory of android mobile devices. Paper presented at the Conference on e-business, e-services and e-society.
    [Bibtex]
    @inproceedings{apostolopoulos2013discovering,
    title={Discovering authentication credentials in volatile memory of android mobile devices},
    author={Apostolopoulos, Dimitris and Marinakis, Giannis and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={Conference on e-Business, e-Services and e-Society},
    pages={178--185},
    year={2013},
    organization={Springer}
    }
  • Stasinopoulos, A., Ntantogian, C., & Xenakis, C.. (2013). The weakest link on the network: exploiting adsl routers to perform cyber-attacks. Paper presented at the 2013 ieee international symposium on signal processing and information technology (isspit).
    [Bibtex]
    @inproceedings{stasinopoulos2013weakest,
    title={The weakest link on the network: exploiting ADSL routers to perform cyber-attacks},
    author={Stasinopoulos, Anastasios and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={2013 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)},
    pages={000135--000139},
    year={2013},
    organization={IEEE}
    }
  • Xenakis, C., & Ntantogian, C.. (2013). Acquisition and analysis of android memory (cync 2013-cybercrime network conference-8th-10th december 2013 at the o’brien centre for science ucd dublin ireland). Department of digital systems, university of piraeus, greece.
    [Bibtex]
    @article{xenakis2013acquisition,
    title={Acquisition and Analysis of Android Memory (CyNC 2013-Cybercrime Network Conference-8th-10th December 2013 at the O'Brien Centre for Science UCD Dublin Ireland)},
    author={Xenakis, Christos and Ntantogian, Christoforos},
    journal={Department of Digital Systems, University of Piraeus, Greece},
    year={2013}
    }
  • Petrou, C., Ntantogian, C., & Xenakis, C.. (2013). A better time approximation scheme for e-passports. Paper presented at the International conference on trust, privacy and security in digital business.
    [Bibtex]
    @inproceedings{petrou2013better,
    title={A better time approximation scheme for e-passports},
    author={Petrou, Charalampos and Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={International Conference on Trust, Privacy and Security in Digital Business},
    pages={13--23},
    year={2013},
    organization={Springer}
    }
  • Tsohou, A., Lee, H., Irani, Z., Weerakkody, V., Osman, I. H., Anouze, A. L., & Medeni, T.. (2013). Proposing a reference process model for the citizen-centric evaluation of e-government services. Transforming government: people, process and policy.
    [Bibtex]
    @article{tsohou2013proposing,
    title={Proposing a reference process model for the citizen-centric evaluation of e-government services},
    author={Tsohou, Aggeliki and Lee, Habin and Irani, Zahir and Weerakkody, Vishanth and Osman, Ibrahim H and Anouze, Abdel L and Medeni, Tunc},
    journal={Transforming Government: People, Process and Policy},
    year={2013},
    publisher={Emerald Group Publishing Limited}
    }
  • Oh, J., Lee, H., & Tsohou, A.. (2013). Governance of it service procurement: relationship vs network based approach. Governance, 6, 18–2013.
    [Bibtex]
    @article{oh2013governance,
    title={Governance of IT Service Procurement: Relationship vs Network based Approach},
    author={Oh, Jaeyoun and Lee, Habin and Tsohou, Aggeliki},
    journal={Governance},
    volume={6},
    pages={18--2013},
    year={2013}
    }

2012

  • Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2012). Secure and privacy-preserving, timed vehicular communications. International journal of ad hoc and ubiquitous computing, 10(4), 219–229.
    [Bibtex]
    @article{burmester2012secure,
    title={Secure and Privacy-Preserving, Timed Vehicular Communications},
    author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilis},
    journal={International Journal of Ad Hoc and Ubiquitous Computing},
    volume={10},
    number={4},
    pages={219--229},
    year={2012},
    publisher={Inderscience Publishers}
    }
  • Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2012). Modeling security in cyber-physical systems. International journal of critical infrastructure protection, 5(3-4), 118–126.
    [Bibtex]
    @article{burmester2012modeling,
    title={Modeling Security in Cyber-Physical Systems},
    author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilis},
    journal={International Journal of Critical Infrastructure Protection},
    volume={5},
    number={3-4},
    pages={118--126},
    year={2012},
    publisher={Elsevier}
    }
  • Magkos, E.. (2012). Cryptographic approaches for privacy preservation in location-based services: a survey. Systems approach applications for developments in information technology, 273–297.
    [Bibtex]
    @article{magkos2012cryptographic,
    title={Cryptographic approaches for privacy preservation in location-based services: a survey},
    author={Magkos, Emmanouil},
    journal={Systems approach applications for developments in information technology},
    pages={273--297},
    year={2012},
    publisher={IGI Global}
    }
  • Kotzanikolaou, P., Magkos, E., Petrakos, N., Douligeris, C., & Chrissikopoulos, V.. (2012). Fair anonymous authentication for location based services. Paper presented at the Dpm 2012 – 7th international workshop on data privacy management.
    [Bibtex]
    @inproceedings{kotzanikolaou2012fair,
    title={Fair Anonymous Authentication for Location Based Services},
    author={Kotzanikolaou, Panayiotis and Magkos, Emmanouil and Petrakos, Nikolaos and Douligeris, Christos and Chrissikopoulos, Vassilis},
    booktitle={DPM 2012 - 7th International Workshop on Data Privacy Management},
    pages={13--14},
    year={2012},
    organization={Springer LNCS}
    }
  • Vlachopoulos, K., Magkos, E., & Chrissikopoulos, V.. (2012). A model for hybrid evidence investigation. International journal of digital crime and forensics (ijdcf), 4(4), 47–62.
    [Bibtex]
    @article{vlachopoulos2012model,
    title={A model for hybrid evidence investigation},
    author={Vlachopoulos, Konstantinos and Magkos, Emmanouil and Chrissikopoulos, Vassileios},
    journal={International Journal of Digital Crime and Forensics (IJDCF)},
    volume={4},
    number={4},
    pages={47--62},
    year={2012},
    publisher={IGI Global}
    }
  • Christopoulou, E., Ringas, D., & Stefanidakis, M.. (2012). Experiences from the urban computing impact on urban culture. Paper presented at the 2012 16th panhellenic conference on informatics.
    [Bibtex]
    @inproceedings{christopoulou2012experiences,
    title={Experiences from the urban computing impact on urban culture},
    author={Christopoulou, Eleni and Ringas, Dimitrios and Stefanidakis, Michail},
    booktitle={2012 16th Panhellenic Conference on Informatics},
    pages={56--61},
    year={2012},
    organization={IEEE}
    }
  • Ntantogian, C., & Xenakis, C.. (2012). Questioning the feasibility of umts-gsm interworking attacks. Wireless personal communications, 65(1), 157–163.
    [Bibtex]
    @article{ntantogian2012questioning,
    title={Questioning the feasibility of UMTS-GSM interworking attacks},
    author={Ntantogian, Christoforos and Xenakis, Christos},
    journal={Wireless Personal Communications},
    volume={65},
    number={1},
    pages={157--163},
    year={2012},
    publisher={Springer}
    }
  • Ntantogian, C., Xenakis, C., & Stavrakakis, I.. (2012). Analysis and modeling of false synchronizations in 3g-wlan integrated networks. Paper presented at the Ifip international information security conference.
    [Bibtex]
    @inproceedings{ntantogian2012analysis,
    title={Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks},
    author={Ntantogian, Christoforos and Xenakis, Christos and Stavrakakis, Ioannis},
    booktitle={IFIP International Information Security Conference},
    pages={475--488},
    year={2012},
    organization={Springer}
    }
  • Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.. (2012). Analyzing trajectories of information security awareness. Information technology & people.
    [Bibtex]
    @article{tsohou2012analyzing,
    title={Analyzing trajectories of information security awareness},
    author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos},
    journal={Information Technology \& People},
    year={2012},
    publisher={Emerald Group Publishing Limited}
    }
  • El-Haddadeh, R., Tsohou, A., & Karyda, M.. (2012). Implementation challenges for information security awareness initiatives in e-government. .
    [Bibtex]
    @article{el2012implementation,
    title={Implementation challenges for information security awareness initiatives in e-government},
    author={El-Haddadeh, Ramzi and Tsohou, Aggeliki and Karyda, Maria},
    year={2012}
    }
  • Tsohou, A., Al-Yafi, K., & Lee, H.. (2012). Evaluating m-government applications: an elaboration likelihood model framework. .
    [Bibtex]
    @article{tsohou2012evaluating,
    title={Evaluating m-government applications: an elaboration likelihood model framework},
    author={Tsohou, Aggeliki and Al-Yafi, Karim and Lee, Habin},
    year={2012}
    }
  • Tsohou, A., Lee, H., Irani, Z., Weerakkody, V., Osman, I., Latif, A. A., & Medeni, T.. (2012). Evaluating e-government services from a citizens’ prespective: a reference process model. .
    [Bibtex]
    @article{tsohou2012evaluating,
    title={Evaluating e-Government services from a citizens' prespective: A reference process model},
    author={Tsohou, Aggeliki and Lee, Habin and Irani, Zahir and Weerakkody, Vishanth and Osman, Ibrahim and Latif, Abdel Anuz and Medeni, Tunc},
    year={2012},
    publisher={Brunel University}
    }
  • Tsohou, A., Lee, H., Al-Yafi, K., Weerakkody, V., El-Haddadeh, R., Irani, Z., Ko, A., Medeni, T. D., & Campos, L. M.. (2012). Supporting public policy making processes with workflow technology: lessons learned from cases in four european countries. International journal of electronic government research (ijegr), 8(3), 63–77.
    [Bibtex]
    @article{tsohou2012supporting,
    title={Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries},
    author={Tsohou, Aggeliki and Lee, Habin and Al-Yafi, Karim and Weerakkody, Vishanth and El-Haddadeh, Ramzi and Irani, Zahir and Ko, Andrea and Medeni, Tunc D and Campos, Luis Miguel},
    journal={International Journal of Electronic Government Research (IJEGR)},
    volume={8},
    number={3},
    pages={63--77},
    year={2012},
    publisher={IGI Global}
    }
  • Tsohou, A., Lee, H., Rebahi, Y., Khalil, M., & Hohberg, S.. (2012). Ubiquitous participation platform for policy making (ubipol): security and identity management considerations. Paper presented at the International conference on trust, privacy and security in digital business.
    [Bibtex]
    @inproceedings{tsohou2012ubiquitous,
    title={Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations},
    author={Tsohou, Aggeliki and Lee, Habin and Rebahi, Yacine and Khalil, Mateusz and Hohberg, Simon},
    booktitle={International Conference on Trust, Privacy and Security in Digital Business},
    pages={236--237},
    year={2012},
    organization={Springer, Berlin, Heidelberg}
    }

2011

  • Magkos, E., & Kotzanikolaou, P.. (2011). Achieving privacy and access control in pervasive computing environments. Security and communication networks.
    [Bibtex]
    @article{magkos2011achieving,
    title={Achieving privacy and access control in pervasive computing environments},
    author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis},
    journal={Security and Communication Networks},
    year={2011},
    publisher={John Wiley \& Sons, Ltd.}
    }
  • Sioutas, S., Magkos, E., Karydis, I., & Verykios, V. S.. (2011). Uncertainty for privacy and 2-dimensional range query distortion. Journal of computing science and engineering, 5(3), 210–222.
    [Bibtex]
    @article{sioutas2011uncertainty,
    title={Uncertainty for Privacy and 2-Dimensional Range Query Distortion},
    author={Sioutas, Spyros and Magkos, Emmanouil and Karydis, Ioannis and Verykios, Vassilios S},
    journal={Journal of Computing Science and Engineering},
    volume={5},
    number={3},
    pages={210--222},
    year={2011},
    publisher={KIISE}
    }
  • Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2011). Clio: blending the collective memory with the urban landscape. Paper presented at the Proceedings of the 10th international conference on mobile and ubiquitous multimedia.
    [Bibtex]
    @inproceedings{ringas2011clio,
    title={CLIO: blending the collective memory with the urban landscape},
    author={Ringas, Dimitrios and Christopoulou, Eleni and Stefanidakis, Michail},
    booktitle={Proceedings of the 10th international conference on mobile and ubiquitous multimedia},
    pages={185--194},
    year={2011}
    }
  • Christopoulou, E., & Ringas, D.. (2011). Clio: context supporting collective city memory. Paper presented at the 2011 fifth ftra international conference on multimedia and ubiquitous engineering.
    [Bibtex]
    @inproceedings{christopoulou2011clio,
    title={CLIO: context supporting collective city memory},
    author={Christopoulou, Eleni and Ringas, Dimitrios},
    booktitle={2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering},
    pages={6--11},
    year={2011},
    organization={IEEE}
    }
  • Christopoulou, E., & Garofalakis, J.. (2011). Context-aware cultural heritage environments. In Handbook of research on technologies and cultural heritage: applications and environments (pp. 241–258). Igi global.
    [Bibtex]
    @incollection{christopoulou2011context,
    title={Context-Aware Cultural Heritage Environments},
    author={Christopoulou, Eleni and Garofalakis, John},
    booktitle={Handbook of Research on Technologies and Cultural Heritage: Applications and Environments},
    pages={241--258},
    year={2011},
    publisher={IGI Global}
    }
  • Ringas, D., Christopoulou, E., & Stefanidakis, M.. (2011). Urban memory in space and time. In Handbook of research on technologies and cultural heritage: applications and environments (pp. 325–340). Igi global.
    [Bibtex]
    @incollection{ringas2011urban,
    title={Urban memory in space and time},
    author={Ringas, Dimitrios and Christopoulou, Eleni and Stefanidakis, Michalis},
    booktitle={Handbook of research on technologies and cultural heritage: applications and environments},
    pages={325--340},
    year={2011},
    publisher={IGI Global}
    }
  • Darra, E., Ntantogian, C., Xenakis, C., & Katsikas, S.. (2011). A mobility and energy-aware hierarchical intrusion detection system for mobile ad hoc networks. Paper presented at the International conference on trust, privacy and security in digital business.
    [Bibtex]
    @inproceedings{darra2011mobility,
    title={A mobility and energy-aware hierarchical intrusion detection system for mobile ad hoc networks},
    author={Darra, Eleni and Ntantogian, Christoforos and Xenakis, Christos and Katsikas, Sokratis},
    booktitle={International Conference on Trust, Privacy and Security in Digital Business},
    pages={138--149},
    year={2011},
    organization={Springer}
    }
  • Ntantogian, C., Xenakis, C., & Stavrakakis, I.. (2011). Reducing false synchronizations in 3g-wlan integrated networks. Ieee transactions on wireless communications, 10(11), 3765–3773.
    [Bibtex]
    @article{ntantogian2011reducing,
    title={Reducing false synchronizations in 3G-WLAN integrated networks},
    author={Ntantogian, Christoforos and Xenakis, Christos and Stavrakakis, Ioannis},
    journal={IEEE Transactions on Wireless Communications},
    volume={10},
    number={11},
    pages={3765--3773},
    year={2011},
    publisher={IEEE}
    }
  • Tsohou, A., Kokolakis, S., Lambrinoudakis, C., & Gritzalis, S.. (2011). Unifying iso security standards practices into a single security framework. Paper presented at the Proceedings of the south african information security multi-conference: port elizabeth, south africa, 17-18 may 2010.
    [Bibtex]
    @inproceedings{tsohou2011unifying,
    title={Unifying ISO Security Standards Practices into a Single Security Framework},
    author={Tsohou, A and Kokolakis, S and Lambrinoudakis, C and Gritzalis, S},
    booktitle={Proceedings of the South African Information Security Multi-Conference: Port Elizabeth, South Africa, 17-18 May 2010},
    pages={188},
    year={2011},
    organization={Lulu. com}
    }

2010

  • Magkos, E., Kotzanikolaou, P., Sioutas, S., & Oikonomou, K.. (2010). A distributed privacy-preserving scheme for location-based queries. Paper presented at the Aoc 2010 – ieee wowmom workshop on autonomic and opportunistic communications, 2010.
    [Bibtex]
    @inproceedings{magkos2010distributed,
    title={A distributed privacy-preserving scheme for location-based queries},
    author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Sioutas, Spyros and Oikonomou, Konstantinos},
    booktitle={AOC 2010 - IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications, 2010},
    pages={1--6},
    year={2010},
    organization={IEEE}
    }
  • Magkos, E., & Kotzanikolaou, P.. (2010). Enhancing privacy-preserving access control for pervasive computing environments. Paper presented at the The second international icst conference on security and privacy in mobile information and communication systems – mobisec 2010.
    [Bibtex]
    @inproceedings{magkos2010enhancing,
    title={Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments},
    author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis},
    booktitle={The Second International ICST Conference on Security and Privacy in Mobile Information and Communication Systems - MOBISEC 2010},
    pages={53--64},
    year={2010},
    organization={LNICST, Springer}
    }
  • Sioutas, S., Magkos, E., Karydis, I., & Verykios, V.. (2010). Uncertainty for anonymity and 2-dimensional range query distortion. Paper presented at the Privacy in statistical databases 2010 (psd 2010).
    [Bibtex]
    @inproceedings{sioutas2010uncertainty,
    title={Uncertainty for anonymity and 2-dimensional range query distortion},
    author={Sioutas, Spyros and Magkos, Emmanouil and Karydis, Ioannis and Verykios, Vassilios},
    booktitle={Privacy in Statistical Databases 2010 (PSD 2010)},
    pages={85--96},
    year={2010},
    organization={Springer Berlin/Heidelberg LNCS 6344}
    }
  • Christopoulou, E., & Garofalakis, J.. (2010). Enabling the user to setup ubiquitous computing applications based on intelligent context. Paper presented at the 2010 international conference on complex, intelligent and software intensive systems.
    [Bibtex]
    @inproceedings{christopoulou2010enabling,
    title={Enabling the user to setup ubiquitous computing applications based on intelligent context},
    author={Christopoulou, Eleni and Garofalakis, John},
    booktitle={2010 International Conference on Complex, Intelligent and Software Intensive Systems},
    pages={87--92},
    year={2010},
    organization={IEEE}
    }
  • Ntantogian, C., Xenakis, C., & Stavrakakis, I.. (2010). A generic mechanism for efficient authentication in b3g networks. Computers & security, 29(4), 460–475.
    [Bibtex]
    @article{ntantogian2010generic,
    title={A generic mechanism for efficient authentication in B3G networks},
    author={Ntantogian, Christoforos and Xenakis, Christos and Stavrakakis, Ioannis},
    journal={computers \& security},
    volume={29},
    number={4},
    pages={460--475},
    year={2010},
    publisher={Elsevier}
    }
  • Chatzikonstantinou, A., Ntantogian, C., Xenakis, C., & Karopoulos, G.. (2010). An empirical evaluation of cryptography usage in android applications. .
    [Bibtex]
    @article{chatzikonstantinou2010empirical,
    title={An Empirical Evaluation of Cryptography Usage in Android Applications},
    author={Chatzikonstantinou, Alexia and Ntantogian, Christoforos and Xenakis, Christos and Karopoulos, Georgios},
    year={2010}
    }
  • Evans, R., Tsohou, A., Tryfonas, T., & Morgan, T.. (2010). Engineering secure systems with iso 26702 and 27001. Paper presented at the 2010 5th international conference on system of systems engineering.
    [Bibtex]
    @inproceedings{evans2010engineering,
    title={Engineering secure systems with ISO 26702 and 27001},
    author={Evans, Rhys and Tsohou, Aggeliki and Tryfonas, Theo and Morgan, Thea},
    booktitle={2010 5th International Conference on System of Systems Engineering},
    pages={1--6},
    year={2010},
    organization={IEEE}
    }
  • Vrakas, N., Kalloniatis, C., Tsohou, A., & Lambrinoudakis, C.. (2010). Privacy requirements engineering for trustworthy e-government services. Paper presented at the International conference on trust and trustworthy computing.
    [Bibtex]
    @inproceedings{vrakas2010privacy,
    title={Privacy requirements engineering for trustworthy e-government services},
    author={Vrakas, Nikos and Kalloniatis, Christos and Tsohou, Aggeliki and Lambrinoudakis, Costas},
    booktitle={International Conference on Trust and Trustworthy Computing},
    pages={298--307},
    year={2010},
    organization={Springer, Berlin, Heidelberg}
    }
  • Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.. (2010). Analyzing information security awareness through networks of association. Paper presented at the International conference on trust, privacy and security in digital business.
    [Bibtex]
    @inproceedings{tsohou2010analyzing,
    title={Analyzing information security awareness through networks of association},
    author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos},
    booktitle={International Conference on Trust, Privacy and Security in Digital Business},
    pages={227--237},
    year={2010},
    organization={Springer, Berlin, Heidelberg}
    }
  • Tsohou, A., Kokolakis, S., Lambrinoudakis, C., & Gritzalis, S.. (2010). A security standards’ framework to facilitate best practices’ awareness and conformity. Information management & computer security.
    [Bibtex]
    @article{tsohou2010security,
    title={A security standards' framework to facilitate best practices' awareness and conformity},
    author={Tsohou, Aggeliki and Kokolakis, Spyros and Lambrinoudakis, Costas and Gritzalis, Stefanos},
    journal={Information Management \& Computer Security},
    year={2010},
    publisher={Emerald Group Publishing Limited}
    }
  • Tsohou, A., Lambrinoudakis, C., Kokolakis, S., & Gritzalis, S.. (2010). The importance of context-dependent privacy requirements and perceptions to the design of privacy-aware systems. Upgrade: the european journal for the informatics professional, 11, 32–37.
    [Bibtex]
    @article{tsohou2010importance,
    title={The importance of context-dependent privacy requirements and perceptions to the design of privacy-aware systems},
    author={Tsohou, Aggeliki and Lambrinoudakis, Costas and Kokolakis, Spyros and Gritzalis, Stefanos},
    journal={UPGRADE: The European Journal for the Informatics Professional},
    volume={11},
    pages={32--37},
    year={2010}
    }
  • Tsohou, A., Lambrinoudakis, C., Kokolakis, S., & Gritzalis, S.. (2010). La importancia de los requerimientos de la privacidad dependiente del contexto y percepciones para el diseño de sistemas sensibles a la privacidad. Novática: revista de la asociación de técnicos de informática(205), 58–62.
    [Bibtex]
    @article{tsohou2010importancia,
    title={La importancia de los requerimientos de la privacidad dependiente del contexto y percepciones para el dise{\~n}o de sistemas sensibles a la privacidad},
    author={Tsohou, Aggeliki and Lambrinoudakis, Costas and Kokolakis, Spyros and Gritzalis, Stefanos},
    journal={Nov{\'a}tica: Revista de la Asociaci{\'o}n de T{\'e}cnicos de Inform{\'a}tica},
    number={205},
    pages={58--62},
    year={2010},
    publisher={Asociaci{\'o}n de T{\'e}cnicos de Inform{\'a}tica, ATI}
    }

2009

  • Magkos, E., Maragoudakis, M., Chrissikopoulos, V., & Gritzalis, S.. (2009). Accurate and large-scale privacy-preserving data mining using the election paradigm. Data & knowledge engineering, 68(11), 1224–1236.
    [Bibtex]
    @article{magkos2009accurate,
    title={Accurate and large-scale privacy-preserving data mining using the election paradigm},
    author={Magkos, Emmanouil and Maragoudakis, Manolis and Chrissikopoulos, Vassilis and Gritzalis, Stefanos},
    journal={Data \& Knowledge Engineering},
    volume={68},
    number={11},
    pages={1224--1236},
    year={2009},
    publisher={North-Holland}
    }
  • Kotzanikolaou, P., Magkos, E., Vergados, D., & Stefanidakis, M.. (2009). Secure and practical key establishment for distributed sensor networks. Security and communication networks, 2(6), 595–610.
    [Bibtex]
    @article{kotzanikolaou2009secure,
    title={Secure and practical key establishment for distributed sensor networks},
    author={Kotzanikolaou, Panayiotis and Magkos, Emmanouil and Vergados, Dimitrios and Stefanidakis, Michalis},
    journal={Security and Communication Networks},
    volume={2},
    number={6},
    pages={595--610},
    year={2009},
    publisher={John Wiley \& Sons, Ltd. Chichester, UK}
    }
  • Kermanidis, K., & Magkos, E.. (2009). Empirical paraphrasing of modern greek text in two phases: an application to steganography. Paper presented at the 10th international conference on intelligent text processing and computational linguistics (cicling 2009).
    [Bibtex]
    @inproceedings{kermanidis2009empirical,
    title={Empirical paraphrasing of modern Greek text in two phases: an application to steganography},
    author={Kermanidis, Katia and Magkos, Emmanouil},
    booktitle={10th International Conference on Intelligent Text Processing and Computational Linguistics (CICLing 2009)},
    pages={535--546},
    year={2009},
    organization={Springer Berlin/Heidelberg LNCS 5449}
    }
  • Avlonitis, M., Magkos, E., Stefanidakis, M., & Chrissikopoulos, V.. (2009). A novel stochastic approach for modeling random scanning worms. Paper presented at the 13th panhellenic conference on informatics (pci’09), 2009.
    [Bibtex]
    @inproceedings{avlonitis2009novel,
    title={A novel stochastic approach for modeling random scanning worms},
    author={Avlonitis, Markos and Magkos, Emmanouil and Stefanidakis, Michalis and Chrissikopoulos, Vassilis},
    booktitle={13th Panhellenic Conference on Informatics (PCI'09), 2009},
    pages={176--179},
    year={2009},
    organization={IEEE}
    }
  • Avlonitis, M., Magkos, E., Stefanidakis, M., & Chrissikopoulos, V.. (2009). Treating scalability and modelling human countermeasures against local preference worms via gradient models. Journal in computer virology, 5(4), 357–364.
    [Bibtex]
    @article{avlonitis2009treating,
    title={Treating scalability and modelling human countermeasures against local preference worms via gradient models},
    author={Avlonitis, Markos and Magkos, Emmanouil and Stefanidakis, Michalis and Chrissikopoulos, Vassilis},
    journal={Journal in computer virology},
    volume={5},
    number={4},
    pages={357--364},
    year={2009},
    publisher={Springer-Verlag}
    }
  • Christopoulou, E.. (2009). Context as a necessity in mobile applications. In Mobile computing: concepts, methodologies, tools, and applications (pp. 65–83). Igi global.
    [Bibtex]
    @incollection{christopoulou2009context,
    title={Context as a necessity in mobile applications},
    author={Christopoulou, Eleni},
    booktitle={Mobile computing: concepts, methodologies, tools, and applications},
    pages={65--83},
    year={2009},
    publisher={IGI Global}
    }
  • Ntantogian, C., & Xenakis, C.. (2009). One-pass eap-aka authentication in 3g-wlan integrated networks. Wireless personal communications, 48(4), 569–584.
    [Bibtex]
    @article{ntantogian2009one,
    title={One-pass EAP-AKA authentication in 3G-WLAN integrated networks},
    author={Ntantogian, Christoforos and Xenakis, Christos},
    journal={Wireless personal communications},
    volume={48},
    number={4},
    pages={569--584},
    year={2009},
    publisher={Springer}
    }
  • Ntantogian, C., & Xenakis, C.. (2009). Security architectures for b3g mobile networks. In Mobile computing: concepts, methodologies, tools, and applications (pp. 2674–2695). Igi global.
    [Bibtex]
    @incollection{ntantogian2009security,
    title={Security Architectures for B3G Mobile Networks},
    author={Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={Mobile Computing: Concepts, Methodologies, Tools, and Applications},
    pages={2674--2695},
    year={2009},
    publisher={IGI Global}
    }
  • Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. A.. (2009). Aligning security awareness with information systems security management.. Paper presented at the Mcis.
    [Bibtex]
    @inproceedings{tsohou2009aligning,
    title={Aligning Security Awareness With Information Systems Security Management.},
    author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos A},
    booktitle={MCIS},
    pages={73},
    year={2009}
    }
  • Tsohou, A., Kokolakis, S., Lambrinoudakis, C., & Gritzalis, S.. (2009). Information systems security management: a review and a classification of the iso standards. Paper presented at the International conference on e-democracy.
    [Bibtex]
    @inproceedings{tsohou2009information,
    title={Information systems security management: a review and a classification of the ISO standards},
    author={Tsohou, Aggeliki and Kokolakis, Spyros and Lambrinoudakis, Costas and Gritzalis, Stefanos},
    booktitle={International Conference on e-Democracy},
    pages={220--235},
    year={2009},
    organization={Springer, Berlin, Heidelberg}
    }
  • Rizomiliotis, P., Tsohou, A., Lambrinoudakis, C., & Gritzalis, S.. (2009). Security and privacy issues in bipolar disorder research. .
    [Bibtex]
    @article{rizomiliotis2009security,
    title={Security and Privacy Issues in Bipolar Disorder Research},
    author={Rizomiliotis, Panagiotis and Tsohou, Aggeliki and Lambrinoudakis, Costas and Gritzalis, Stefanos},
    year={2009}
    }

2008

  • Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2008). Strengthening privacy protection in vanets. Paper presented at the Wimob ’08 – ieee international conference on wireless and mobile computing, networking and communications, 2008..
    [Bibtex]
    @inproceedings{burmester2008strengthening,
    title={Strengthening privacy protection in VANETs},
    author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilis},
    booktitle={WIMOB '08 - IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008.},
    pages={508--513},
    year={2008},
    organization={IEEE}
    }
  • Kotzanikolaou, P., Vergados, D. D., Stergiou, G., & Magkos, E.. (2008). Multilayer key establishment for large-scale sensor networks. International journal of security and networks, 3(1), 1–9.
    [Bibtex]
    @article{kotzanikolaou2008multilayer,
    title={Multilayer key establishment for large-scale sensor networks},
    author={Kotzanikolaou, Panayiotis and Vergados, Dimitris D and Stergiou, Giannis and Magkos, Emmanouil},
    journal={International Journal of Security and Networks},
    volume={3},
    number={1},
    pages={1--9},
    year={2008},
    publisher={Inderscience Publishers}
    }
  • Stathopoulos, V., Kotzanikolaou, P., & Magkos, E.. (2008). Secure log management for privacy assurance in electronic communications. Computers & security, 27(7-8), 298–308.
    [Bibtex]
    @article{stathopoulos2008secure,
    title={Secure Log Management for Privacy Assurance in Electronic Communications},
    author={Stathopoulos, Vassilios and Kotzanikolaou, Panayiotis and Magkos, Emmanouil},
    journal={Computers \& Security},
    volume={27},
    number={7-8},
    pages={298--308},
    year={2008},
    publisher={Elsevier}
    }
  • Magkos, E., Maragoudakis, M., Chrissikopoulos, V., & Gridzalis, S.. (2008). Accuracy in privacy-preserving data mining using the paradigm of cryptographic elections. Paper presented at the Privacy in statistical databases (psd 2008).
    [Bibtex]
    @inproceedings{magkos2008accuracy,
    title={Accuracy in privacy-preserving data mining using the paradigm of cryptographic elections},
    author={Magkos, Emmanouil and Maragoudakis, Manolis and Chrissikopoulos, Vassilis and Gridzalis, Stefanos},
    booktitle={Privacy in Statistical Databases (PSD 2008)},
    pages={284--297},
    year={2008},
    organization={Springer Berlin/Heidelberg LNCS 5262}
    }
  • Pateli, A., Floros, A., Oikonomou, K., & Magkos, E.. (2008). Corfunet: a mesh network providing wireless services at metropolitan level. Paper presented at the Iadis international conference on wireless applications and computing 2008.
    [Bibtex]
    @inproceedings{pateli2008corfunet,
    title={Corfunet: A mesh network providing wireless services AT metropolitan level},
    author={Pateli, Adamantia and Floros, Andreas and Oikonomou, Konstantinos and Magkos, Emmanouil},
    booktitle={IADIS International Conference on Wireless Applications and Computing 2008},
    pages={22--24},
    year={2008}
    }
  • Avlonitis, M., Magkos, E., Stefanidakis, M., & Chrissikopoulos, V.. (2008). Exploring scalability and fast spreading of local preference worms via gradient models. Paper presented at the 17th eicar annual conference, 3-6 may 2008, laval, france, 2008.
    [Bibtex]
    @inproceedings{avlonitis2008exploring,
    title={Exploring Scalability and Fast Spreading of Local Preference Worms via Gradient Models},
    author={Avlonitis, Markos and Magkos, Emmanouil and Stefanidakis, Michalis and Chrissikopoulos, Vassilis},
    booktitle={17th EICAR Annual Conference, 3-6 May 2008, Laval, France, 2008},
    year={2008}
    }
  • Magkos, E., & Chrissikopoulos, V.. (2008). Towards efficient cryptography for privacy preserving data mining in distributed systems.. Paper presented at the Webist (1).
    [Bibtex]
    @inproceedings{magkos2008towards,
    title={Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems.},
    author={Magkos, Emmanouil and Chrissikopoulos, Vassilios},
    booktitle={WEBIST (1)},
    pages={301--304},
    year={2008}
    }
  • Lambrinoudakis, C., Magkos, E., & Chrissikopoulos, V.. (2008). Electronic voting systems. Chapter): j. lopez, s. furnell, a. patel, s. katsikas,(ed.),” securing information and communication systems: principles, technologies and applications”. artech house publishers, computer security series, 307–323.
    [Bibtex]
    @article{lambrinoudakis2008electronic,
    title={Electronic voting systems},
    author={Lambrinoudakis, C and Magkos, E and Chrissikopoulos, V},
    journal={Chapter): J. Lopez, S. Furnell, A. Patel, S. Katsikas,(Ed.),” Securing Information and Communication Systems: Principles, Technologies and Applications”. Artech House Publishers, Computer Security Series},
    pages={307--323},
    year={2008}
    }
  • Xenakis, C., Ntantogian, C., & Stavrakakis, I.. (2008). A network-assisted mobile vpn for securing users data in umts. Computer communications, 31(14), 3315–3327.
    [Bibtex]
    @article{xenakis2008network,
    title={A network-assisted mobile VPN for securing users data in UMTS},
    author={Xenakis, Christos and Ntantogian, Christoforos and Stavrakakis, Ioannis},
    journal={Computer Communications},
    volume={31},
    number={14},
    pages={3315--3327},
    year={2008},
    publisher={Elsevier}
    }
  • Ntantogian, C., Stavrakakis, I., & Xenakis, C.. (2008). Reducing the user authentication cost in next generation networks. Paper presented at the 2008 fifth annual conference on wireless on demand network systems and services.
    [Bibtex]
    @inproceedings{ntantogian2008reducing,
    title={Reducing the user authentication cost in next generation networks},
    author={Ntantogian, Christoforos and Stavrakakis, Ioannis and Xenakis, Christos},
    booktitle={2008 Fifth Annual Conference on Wireless on Demand Network Systems and Services},
    pages={65--72},
    year={2008},
    organization={IEEE}
    }
  • Tsohou, A., Kokolakis, S., Karyda, M., & Kiountouzis, E.. (2008). Investigating information security awareness: research and practice gaps. Information security journal: a global perspective, 17(5-6), 207–227.
    [Bibtex]
    @article{tsohou2008investigating,
    title={Investigating information security awareness: research and practice gaps},
    author={Tsohou, Aggeliki and Kokolakis, Spyros and Karyda, Maria and Kiountouzis, Evangelos},
    journal={Information Security Journal: A Global Perspective},
    volume={17},
    number={5-6},
    pages={207--227},
    year={2008},
    publisher={Taylor \& Francis}
    }
  • Tsohou, A., Kokolakis, S., Karyda, M., & Kiountouzis, E.. (2008). Process-variance models in information security awareness research. Information management & computer security.
    [Bibtex]
    @article{tsohou2008process,
    title={Process-variance models in information security awareness research},
    author={Tsohou, Aggeliki and Kokolakis, Spyros and Karyda, Maria and Kiountouzis, Evangelos},
    journal={Information Management \& Computer Security},
    year={2008},
    publisher={Emerald Group Publishing Limited}
    }

2007

  • Magkos, E., Kotzanikolaou, P., & Douligeris, C.. (2007). Towards secure online elections: models, primitives and open issues. Electronic government, an international journal, 4(3), 249–268.
    [Bibtex]
    @article{magkos2007towards,
    title={Towards secure online elections: models, primitives and open issues},
    author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Douligeris, Christos},
    journal={Electronic Government, an International Journal},
    volume={4},
    number={3},
    pages={249--268},
    year={2007},
    publisher={Inderscience Publishers}
    }
  • Avlonitis, M., Magkos, E., Stefanidakis, M., & Chrissikopoulos, V.. (2007). A spatial stochastic model for worm propagation: scale effects. Journal in computer virology, 3(2), 87–92.
    [Bibtex]
    @article{avlonitis2007spatial,
    title={A spatial stochastic model for worm propagation: scale effects},
    author={Avlonitis, Markos and Magkos, Emmanouil and Stefanidakis, Michalis and Chrissikopoulos, Vassilis},
    journal={Journal in Computer Virology},
    volume={3},
    number={2},
    pages={87--92},
    year={2007},
    publisher={Springer-Verlag}
    }
  • Ntantogian, C., & Xenakis, C.. (2007). Reducing authentication traffic in 3g-wlan integrated networks. Paper presented at the 2007 ieee 18th international symposium on personal, indoor and mobile radio communications.
    [Bibtex]
    @inproceedings{ntantogian2007reducing,
    title={Reducing authentication traffic in 3G-WLAN integrated networks},
    author={Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications},
    pages={1--5},
    year={2007},
    organization={IEEE}
    }
  • Xenakis, C., & Ntantogian, C.. (2007). Security architectures for b3g mobile networks. Telecommunication systems, 35(3), 123–139.
    [Bibtex]
    @article{xenakis2007security,
    title={Security architectures for B3G mobile networks},
    author={Xenakis, Christos and Ntantogian, Christoforos},
    journal={Telecommunication Systems},
    volume={35},
    number={3},
    pages={123--139},
    year={2007},
    publisher={Springer US}
    }
  • Ntantogian, C., Xenakis, C., & Stavrakakis, I.. (2007). Efficient authentication for users autonomy in next generation all-ip networks. Paper presented at the 2007 2nd bio-inspired models of network, information and computing systems.
    [Bibtex]
    @inproceedings{ntantogian2007efficient,
    title={Efficient authentication for users autonomy in next generation all-ip networks},
    author={Ntantogian, Christoforos and Xenakis, Christos and Stavrakakis, Ioannis},
    booktitle={2007 2nd Bio-Inspired Models of Network, Information and Computing Systems},
    pages={295--300},
    year={2007},
    organization={IEEE}
    }
  • Ntantogian, C., & Xenakis, C.. (2007). A security binding for efficient authentication in 3g-wlan heterogeneous networks. Paper presented at the Phd poster presented in the 6th annual mediterranean ad hoc networking workshop (med-hoc-net 2007), corfu, greece.
    [Bibtex]
    @inproceedings{ntantogian2007security,
    title={A Security Binding for Efficient Authentication in 3G-WLAN Heterogeneous Networks},
    author={Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={PhD poster presented in the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece},
    year={2007}
    }
  • Ntantogian, C., & Xenakis, C.. (2007). A security protocol for mutual authentication and mobile vpn deployment in b3g networks. Paper presented at the 2007 ieee 18th international symposium on personal, indoor and mobile radio communications.
    [Bibtex]
    @inproceedings{ntantogian2007security,
    title={A security protocol for mutual authentication and mobile VPN deployment in B3G networks},
    author={Ntantogian, Christoforos and Xenakis, Christos},
    booktitle={2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications},
    pages={1--5},
    year={2007},
    organization={IEEE}
    }
  • Tsohou, A., Theoharidou, M., Kokolakis, S., & Gritzalis, D.. (2007). Addressing cultural dissimilarity in the information security management outsourcing relationship. Paper presented at the International conference on trust, privacy and security in digital business.
    [Bibtex]
    @inproceedings{tsohou2007addressing,
    title={Addressing cultural dissimilarity in the information security management outsourcing relationship},
    author={Tsohou, Aggeliki and Theoharidou, Marianthi and Kokolakis, Spyros and Gritzalis, Dimitris},
    booktitle={International Conference on Trust, Privacy and Security in Digital Business},
    pages={24--33},
    year={2007},
    organization={Springer, Berlin, Heidelberg}
    }
  • Tsohou, A., Theoharidou, M., Kokolakis, S., & Gritzalis, D.. (2007). Session 1-secure and trusted virtual organisations-addressing cultural dissimilarity in the information security management outsourcing relationship. Lecture notes in computer science, 4657, 24–33.
    [Bibtex]
    @article{tsohou2007session,
    title={Session 1-Secure and Trusted Virtual Organisations-Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship},
    author={Tsohou, Aggeliki and Theoharidou, Marianthi and Kokolakis, Spyros and Gritzalis, Dimitris},
    journal={Lecture Notes in Computer Science},
    volume={4657},
    pages={24--33},
    year={2007},
    publisher={Berlin: Springer-Verlag, 1973-}
    }

2006

  • Stathopoulos, V., Kotzanikolaou, P., & Magkos, E.. (2006). A framework for secure and verifiable logging in public communication networks. Paper presented at the Critis’06 – 1st international workshop on critical information infrastructures security.
    [Bibtex]
    @inproceedings{stathopoulos2006framework,
    title={A framework for secure and verifiable logging in public communication networks},
    author={Stathopoulos, Vassilios and Kotzanikolaou, Panayiotis and Magkos, Emmanouil},
    booktitle={CRITIS'06 - 1st International Workshop on Critical Information Infrastructures Security},
    pages={273--284},
    year={2006},
    organization={Springer LNCS 434}
    }
  • Magkos, E., Kotzanikolaou, P., Vergados, D. D., & Stefanidakis, M.. (2006). An asymmetric key establishment protocol for multiphase self-organized sensor networks. Paper presented at the 12th european wireless conference – enabling technologies for wireless multimedia communications (ew 2006).
    [Bibtex]
    @inproceedings{magkos2006asymmetric,
    title={An asymmetric key establishment protocol for multiphase self-organized sensor networks},
    author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Vergados, Dimitris D and Stefanidakis, Michalis},
    booktitle={12th European Wireless Conference - Enabling Technologies for Wireless Multimedia Communications (EW 2006)},
    pages={1--6},
    year={2006},
    organization={IEEE}
    }
  • Ntantogian, C., Xenakis, C., & Merakos, L.. (2006). An enhanced eap-sim authentication scheme for securing wlan. 15th ist mobile & wireless communications, mykonos, greece.
    [Bibtex]
    @article{ntantogian2006enhanced,
    title={An enhanced EAP-SIM authentication scheme for securing WLAN},
    author={Ntantogian, Christoforos and Xenakis, Christos and Merakos, Lazaros},
    journal={15th IST Mobile \& Wireless Communications, Mykonos, Greece},
    year={2006}
    }
  • Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.. (2006). Formulating information systems risk management strategies through cultural theory. Information management & computer security.
    [Bibtex]
    @article{tsohou2006formulating,
    title={Formulating information systems risk management strategies through cultural theory},
    author={Tsohou, Aggeliki and Karyda, Maria and Kokolakis, Spyros and Kiountouzis, Evangelos},
    journal={Information Management \& Computer Security},
    year={2006},
    publisher={Emerald Group Publishing Limited}
    }

2005

  • Kotzanikolaou, P., & Magkos, E.. (2005). Hybrid key establishment for multiphase self-organized sensor networks. Paper presented at the Sixth ieee international symposium on a world of wireless mobile and multimedia networks (wowmom 2005), 2005.
    [Bibtex]
    @inproceedings{kotzanikolaou2005hybrid,
    title={Hybrid key establishment for multiphase self-organized sensor networks},
    author={Kotzanikolaou, Panayiotis and Magkos, Emmanouil},
    booktitle={Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), 2005},
    pages={581--587},
    year={2005},
    organization={IEEE}
    }
  • Christopoulou, E., & Kameas, A.. (2005). Gas ontology: an ontology for collaboration among ubiquitous computing devices. International journal of human-computer studies, 62(5), 664–685.
    [Bibtex]
    @article{christopoulou2005gas,
    title={GAS Ontology: an ontology for collaboration among ubiquitous computing devices},
    author={Christopoulou, Eleni and Kameas, Achilles},
    journal={International Journal of Human-Computer Studies},
    volume={62},
    number={5},
    pages={664--685},
    year={2005},
    publisher={Academic Press}
    }
  • Christopoulou, E., Goumopoulos, C., & Kameas, A.. (2005). An ontology-based context management and reasoning process for ubicomp applications. Paper presented at the Proceedings of the 2005 joint conference on smart objects and ambient intelligence: innovative context-aware services: usages and technologies.
    [Bibtex]
    @inproceedings{christopoulou2005ontology,
    title={An ontology-based context management and reasoning process for UbiComp applications},
    author={Christopoulou, Eleni and Goumopoulos, Christos and Kameas, Achilles},
    booktitle={Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies},
    pages={265--270},
    year={2005}
    }
  • Drosos, N., Christopoulou, E., & Kameas, A.. (2005). Middleware for building ubiquitous computing applications using distributed objects. Paper presented at the Panhellenic conference on informatics.
    [Bibtex]
    @inproceedings{drosos2005middleware,
    title={Middleware for building ubiquitous computing applications using distributed objects},
    author={Drosos, Nicolas and Christopoulou, Eleni and Kameas, Achilles},
    booktitle={Panhellenic Conference on Informatics},
    pages={256--266},
    year={2005},
    organization={Springer, Berlin, Heidelberg}
    }

2004

  • Burmester, M., Magkos, E., & Chrissikopoulos, V.. (2004). Uncoercible e-bidding games. Electronic commerce research, 4(1), 113–125.
    [Bibtex]
    @article{burmester2004uncoercible,
    title={Uncoercible e-bidding games},
    author={Burmester, Mike and Magkos, Emmanouil and Chrissikopoulos, Vassilios},
    journal={Electronic Commerce Research},
    volume={4},
    number={1},
    pages={113--125},
    year={2004},
    publisher={Kluwer Academic Publishers}
    }
  • Christopoulou, E., Goumopoulos, C., Zaharakis, I., & Kameas, A.. (2004). An ontology-based conceptual model for composing context-aware applications. Research academic computer technology institute.
    [Bibtex]
    @article{christopoulou2004ontology,
    title={An ontology-based conceptual model for composing context-aware applications},
    author={Christopoulou, Eleni and Goumopoulos, Christos and Zaharakis, Ioannis and Kameas, Achilles},
    journal={Research Academic Computer Technology Institute},
    year={2004},
    publisher={Citeseer}
    }
  • Goumopoulos, C., Christopoulou, E., Drossos, N., & Kameas, A.. (2004). The plants system: enabling mixed societies of communicating plants and artefacts. Paper presented at the European symposium on ambient intelligence.
    [Bibtex]
    @inproceedings{goumopoulos2004plants,
    title={The PLANTS system: enabling mixed societies of communicating plants and artefacts},
    author={Goumopoulos, Christos and Christopoulou, Eleni and Drossos, Nikos and Kameas, Achilles},
    booktitle={European Symposium on Ambient Intelligence},
    pages={184--195},
    year={2004},
    organization={Springer, Berlin, Heidelberg}
    }
  • Christopoulou, E., & Kameas, A.. (2004). Using ontologies to address key issues in ubiquitous computing systems. Paper presented at the European symposium on ambient intelligence.
    [Bibtex]
    @inproceedings{christopoulou2004using,
    title={Using ontologies to address key issues in ubiquitous computing systems},
    author={Christopoulou, Eleni and Kameas, Achilles},
    booktitle={European Symposium on Ambient Intelligence},
    pages={13--24},
    year={2004},
    organization={Springer, Berlin, Heidelberg}
    }
  • Christopoulou, E., & Kameas, A.. (2004). Ontology-driven composition of service-oriented ubiquitous computing applications. Paper presented at the Third international conference on adaptive hypermedia and adaptive web-based systems (ah2004), eindhoven, the netherlands.
    [Bibtex]
    @inproceedings{christopoulou2004ontology,
    title={Ontology-driven composition of service-oriented ubiquitous computing applications},
    author={Christopoulou, Eleni and Kameas, Achilles},
    booktitle={Third International Conference on Adaptive Hypermedia and Adaptive Web-Based Systems (AH2004), Eindhoven, the Netherlands},
    pages={23--26},
    year={2004}
    }
  • Christopoulou, E., & Kameas, A.. (2004). Ubiquitous computing: software architectures, communication, and distribution-using ontologies to address key issues in ubiquitous computing systems. Lecture notes in computer science, 3295, 13–24.
    [Bibtex]
    @article{christopoulou2004ubiquitous,
    title={Ubiquitous Computing: Software Architectures, Communication, and Distribution-Using Ontologies to Address Key Issues in Ubiquitous Computing Systems},
    author={Christopoulou, Eleni and Kameas, Achilles},
    journal={Lecture Notes in Computer Science},
    volume={3295},
    pages={13--24},
    year={2004},
    publisher={Berlin: Springer-Verlag, 1973-}
    }

2003

  • Burmester, M., & Magkos, E.. (2003). Towards secure and practical e-elections in the new era. In Advances in information security – secure electronic voting (pp. 63–76). Kluwer academic publishers (springer).
    [Bibtex]
    @incollection{burmester2003towards,
    title={Towards secure and practical e-elections in the new era},
    author={Burmester, Mike and Magkos, Emmanouil},
    booktitle={Advances in Information Security - Secure Electronic Voting},
    pages={63--76},
    year={2003},
    publisher={Kluwer Academic Publishers (Springer)}
    }
  • Poulos, M., Magkos, E., Chrissikopoulos, V., & Alexandris, N.. (2003). Secure fingerprint verification based on image processing segmentation using computational geometry algorithms. Paper presented at the Sppra ‘2003 – iasted international conference on signal processing, pattern recognition, and applications.
    [Bibtex]
    @inproceedings{poulos2003secure,
    title={Secure fingerprint verification based on image processing segmentation using computational geometry algorithms},
    author={Poulos, M and Magkos, E and Chrissikopoulos, V and Alexandris, N},
    booktitle={SPPRA '2003 - IASTED International Conference on Signal Processing, Pattern Recognition, and Applications},
    year={2003}
    }
  • Poulos, M., Papavlasopoulos, S., Chrissicopoulos, V., & Magkos, E.. (2003). Fingerprint verification based on image processing segmentation using an onion algorithm of computational geometry. Paper presented at the Sixth international workshop on mathematical methods in scattering theory and biomedical engineering.
    [Bibtex]
    @inproceedings{poulos2003fingerprint,
    title={Fingerprint verification based on image processing segmentation using an onion algorithm of computational geometry},
    author={Poulos, M and Papavlasopoulos, S and Chrissicopoulos, V and Magkos, E},
    booktitle={Sixth International Workshop on Mathematical Methods in Scattering Theory and Biomedical Engineering},
    pages={550--559},
    year={2003},
    organization={World Scientific publications}
    }
  • Poulos, M., Alexandris, N., Belessioti, V., & Magkos, E.. (2003). Comparison between computational geometry and coherence methods applied to the eeg for medical diagnostic purposes. Proceedings of the 7th international multicoference on circuits, systems, communications and computers, 247–252.
    [Bibtex]
    @article{poulos2003comparison,
    title={Comparison between computational geometry and coherence methods applied to the EEG for medical diagnostic purposes},
    author={Poulos, M and Alexandris, N and Belessioti, V and Magkos, E},
    journal={Proceedings of the 7th International Multicoference on Circuits, Systems, Communications and Computers},
    pages={247--252},
    year={2003}
    }
  • Magkos, E., Chrissikopoulos, V., Alexandris, N., & Poulos, M.. (2003). Secure key recovery for archived and communicated data in the corporate intranet. Paper presented at the 7th international conference on circuits, systems, communications and computers.
    [Bibtex]
    @inproceedings{magkos2003secure,
    title={Secure Key Recovery for Archived and Communicated Data in the Corporate Intranet},
    author={Magkos, Emmanouil and Chrissikopoulos, Vassilios and Alexandris, Nikos and Poulos, Marios},
    booktitle={7th International Conference on Circuits, Systems, Communications and Computers},
    pages={7--10},
    year={2003}
    }
  • Christopoulou, E., Garofalakis, J. D., Makris, C., Panagis, Y., Psaras-Chatzigeorgiou, A., Sakkopoulos, E., & Tsakalidis, A. K.. (2003). Techniques and metrics for improving website structure. J. web eng., 2(1-2), 90–114.
    [Bibtex]
    @article{christopoulou2003techniques,
    title={Techniques and metrics for improving website structure},
    author={Christopoulou, Eleni and Garofalakis, John D and Makris, Christos and Panagis, Yannis and Psaras-Chatzigeorgiou, Athanasios and Sakkopoulos, Evangelos and Tsakalidis, Athanasios K.},
    journal={J. Web Eng.},
    volume={2},
    number={1-2},
    pages={90--114},
    year={2003}
    }

2002

  • Magkos, E., Burmester, M., & Chrissikopoulos, V.. (2002). Receipt-freeness in large-scale elections without untappable channels. Paper presented at the 1st ifip conference on e-commerce / e-business/ e-government.
    [Bibtex]
    @inproceedings{magkos2002receipt,
    title={Receipt-freeness in large-scale elections without untappable channels},
    author={Magkos, Emmanouil and Burmester, Mike and Chrissikopoulos, Vassilis},
    booktitle={1st IFIP Conference on E-Commerce / E-Business/ E-Government},
    pages={683--693},
    year={2002},
    organization={Kluwer Academic Publishers (Springer)}
    }
  • Burmester, M., Chrissikopoulos, V., Kotzanikolaou, P., & Magkos, E.. (2002). Strong forward security. Paper presented at the Ifip-sec ’01 conference.
    [Bibtex]
    @inproceedings{burmester2002strong,
    title={Strong forward security},
    author={Burmester, Mike and Chrissikopoulos, Vassilios and Kotzanikolaou, Panayiotis and Magkos, Emmanouil},
    booktitle={IFIP-SEC '01 Conference},
    pages={109--119},
    year={2002},
    organization={Kluwer Academic Publishers (Springer)}
    }
  • Magkos, E., & Chrissikopoulos, V.. (2002). Equitably fair internet voting. Journal of internet technology, 3(3), 187–193.
    [Bibtex]
    @article{magkos2002equitably,
    title={Equitably Fair Internet Voting},
    author={Magkos, Emmanouil and Chrissikopoulos, Vassilios},
    journal={Journal of Internet Technology},
    volume={3},
    number={3},
    pages={187--193},
    year={2002},
    publisher={Taiwan Academic Network}
    }
  • Magkos, E., Alexandris, N., & Chrissikopoulos, V.. (2002). A common security model for conducting e-auctions and e-elections. Paper presented at the 6th international conference on communications.
    [Bibtex]
    @inproceedings{magkos2002common,
    title={A Common Security Model for Conducting e-Auctions and e-Elections},
    author={Magkos, Emmanouil and Alexandris, Nikos and Chrissikopoulos, Vassilis},
    booktitle={6th International Conference on Communications},
    pages={463--467},
    year={2002}
    }
  • Christopoulou, E., Garofalakis, J., Makris, C., Panagis, Y., Sakkopoulos, E., & Tsakalidis, A.. (2002). Automating restructuring of web applications. Paper presented at the Acm hypertext.
    [Bibtex]
    @inproceedings{christopoulou2002automating,
    title={Automating restructuring of Web applications},
    author={Christopoulou, Eleni and Garofalakis, John and Makris, Christos and Panagis, Yannis and Sakkopoulos, Evangelos and Tsakalidis, Athanasios},
    booktitle={ACM Hypertext},
    pages={11--15},
    year={2002}
    }
  • Christopoulou, E., Markellou, P., Markellos, K., Sirmakessis, S., Rigou, M., & Tsakalidis, A.. (2002). Learncom–a system for setting up an electronic learning community. Paper presented at the The 3rd international conference on information communication technologies in education.
    [Bibtex]
    @inproceedings{christopoulou2002learncom,
    title={Learncom--A System for Setting Up an Electronic Learning Community},
    author={Christopoulou, Eleni and Markellou, Penelope and Markellos, Konstantinos and Sirmakessis, Spiros and Rigou, Maria and Tsakalidis, Athanasios},
    booktitle={The 3rd International Conference on Information Communication Technologies in Education},
    pages={191--199},
    year={2002}
    }

2001

  • Magkos, E., Kotzanikolaou, P., & Chrissikopoulos, V.. (2001). An asymmetric traceability scheme for copyright protection without trust assumptions. Paper presented at the Ec-web 2001 – 2nd international conference on electronic commerce and web technologies, 2001.
    [Bibtex]
    @inproceedings{magkos2001asymmetric,
    title={An asymmetric traceability scheme for copyright protection without trust assumptions},
    author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Chrissikopoulos, Vassilios},
    booktitle={EC-WEB 2001 - 2nd International Conference on Electronic Commerce and Web technologies, 2001},
    pages={186--195},
    year={2001},
    organization={Springer-Verlag LNCS 2115}
    }
  • Magkos, E., Chrissikopoulos, V., & Alexandris, N.. (2001). Software-based receipt-freeness in on-line elections. Paper presented at the Ifip tc11 wg11.4 1st annual working conference on network security.
    [Bibtex]
    @inproceedings{magkos2001software,
    title={Software-based Receipt-freeness in On-line Elections},
    author={Magkos, Emmanouil and Chrissikopoulos, Vassilios and Alexandris, Nikos},
    booktitle={IFIP TC11 WG11.4 1st Annual Working Conference on Network Security},
    pages={33--43},
    year={2001},
    organization={Kluwer Academic Publishers}
    }
  • Alexandris, N., Magkos, E., & Chrissikopoulos, V.. (2001). Software-based receipt-freeness in on-line elections. Paper presented at the Proceedings of the ifip tc11 wg11. 4 first annual working conference on network security: advances in network and distributed systems security.
    [Bibtex]
    @inproceedings{alexandris2001software,
    title={Software-Based Receipt-Freeness in On-Line Elections},
    author={Alexandris, Nikos and Magkos, Emmanouil and Chrissikopoulos, Vassilios},
    booktitle={Proceedings of the IFIP TC11 WG11. 4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security},
    pages={33--44},
    year={2001}
    }
  • Magkos, E., Kotzanikolaou, P., & Chrissikopoulos, V.. (2001). An asymmetric traceability scheme for copyright protection without trust. Paper presented at the Electronic commerce and web technologies:… international conference, ec-web…, proceedings.
    [Bibtex]
    @inproceedings{magkos2001asymmetric,
    title={An Asymmetric Traceability Scheme for Copyright Protection without Trust},
    author={Magkos, Emmanouil and Kotzanikolaou, Panayiotis and Chrissikopoulos, Vassilios},
    booktitle={Electronic Commerce and Web Technologies:... International Conference, EC-Web..., Proceedings},
    pages={186},
    year={2001},
    organization={Springer}
    }

2000

  • Magkos, E., Burmester, M., & Chrissikopoulos, V.. (2000). An equitably fair on-line auction scheme. Paper presented at the 1st international conference on electronic commerce and web technologies (ec-web 2000).
    [Bibtex]
    @inproceedings{magkos2000equitably,
    title={An equitably fair on-line auction scheme},
    author={Magkos, Emmanouil and Burmester, Mike and Chrissikopoulos, Vassilios},
    booktitle={1st International Conference on Electronic Commerce and Web technologies (EC-WEB 2000)},
    pages={72--84},
    year={2000},
    organization={Springer-Verlag, Berlin LNCS 1875}
    }
  • Burmester, M., & Magkos, E.. Uncoercible e-bidding gameз. .
    [Bibtex]
    @article{burmesteruncoercible,
    title={Uncoercible e-Bidding Gameз},
    author={Burmester, M and Magkos, E}
    }
  • Reggios, A., & Magkos, E.. Sociopolitical, ethical and technological factors in e-elections. .
    [Bibtex]
    @article{reggiossociopolitical,
    title={Sociopolitical, Ethical and Technological Factors in e-Elections},
    author={Reggios, A and Magkos, E}
    }
  • Ntantogian, C., & Xenakis, C.. Book chapter for handbook of research on wireless security security architectures for b3g mobile networks. .
    [Bibtex]
    @article{ntantogianbook,
    title={Book Chapter for Handbook of Research on Wireless Security Security Architectures for B3G Mobile Networks},
    author={Ntantogian, Christoforos and Xenakis, Christos}
    }
  • Ntantogian, C., Gkikakis, D., & Xenakis, C.. Pripay: a privacy preserving architecture for secure micropayments. .
    [Bibtex]
    @article{ntantogianpripay,
    title={PRIPAY: A Privacy Preserving Architecture for Secure Micropayments},
    author={Ntantogian, Christoforos and Gkikakis, Dimitris and Xenakis, Christos}
    }
  • Ntantogian, C.. Performance analysis and analytical modeling for the optimization of the users’ authentication procedure in 4g mobile networks. .
    [Bibtex]
    @article{ntantogianperformance,
    title={Performance Analysis and Analytical Modeling for the Optimization of the Users’ Authentication Procedure in 4G Mobile Networks},
    author={Ntantogian, Christoforos}
    }
  • Farao, A., Ntantogian, C., Istrate, C., Suciu, G., & Xenakis, C.. Sealedgrid: scalable, trusted, and interoperable platform for secured smart grid. .
    [Bibtex]
    @article{faraosealedgrid,
    title={SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID},
    author={Farao, Aristeidis and Ntantogian, Christoforos and Istrate, Cristiana and Suciu, George and Xenakis, Christos}
    }
  • Ntantogian, C., & Ribeiro, L. L.. Sandboxing the cyberspace for cybersecurity education and learning. .
    [Bibtex]
    @article{ntantogiansandboxing,
    title={Sandboxing the Cyberspace for Cybersecurity Education and Learning},
    author={Ntantogian, Christoforos and Ribeiro, Lu{\'\i}s L}
    }
  • Medeni, T. D., Balc{i}lar, E., Yenice, S., Kökdemir, {. E., Torun, Y., Dalbay, Ö., Osman, I. H., Anouze, A. L., Tsohou, A., Irani, Z., & others. Improving e-government services in turkey: exploitation of cees project results. Қазэу хабаршысы\guillemotright–\guillemotleftвестник казэу, 41.
    [Bibtex]
    @article{medeniimproving,
    title={IMPROVING E-GOVERNMENT SERVICES IN TURKEY: EXPLOITATION OF CEES PROJECT RESULTS},
    author={Medeni, Tun{\c{c}} D and Balc{\i}lar, Emrah and Yenice, Sami and K{\"o}kdemir, {\.I}brahim Edib and Torun, Yavuz and Dalbay, {\"O}zkan and Osman, Ibrahim H and Anouze, Abdel Latef and Tsohou, Aggeliki and Irani, Zahir and others},
    journal={ҚазЭУ хабаршысы{\guillemotright}--{\guillemotleft}Вестник КазЭУ},
    pages={41}
    }
  • Tsohou, A., Lee, H., Bataller, A., Forioso, I., Nedev, S., Unsal, H. O., Thuillier, B., & Massimino, M.. Deliverable d3.. .
    [Bibtex]
    @article{tsohoudeliverable,
    title={Deliverable D3.},
    author={Tsohou, Aggeliki and Lee, Habin and Bataller, Alfons and Forioso, Iskender and Nedev, Stoycho and Unsal, Huseyin Ozgur and Thuillier, Bruno and Massimino, Massimo}
    }
  • Lee, H., Aktas, E., Tsohou, A., & Kim, J. W.. Customer satisfaction from open source software services in the presence of commercially licensed software. .
    [Bibtex]
    @article{leecustomer,
    title={Customer Satisfaction from Open Source Software Services in the Presence of Commercially Licensed Software},
    author={Lee, Habin and Aktas, Emel and Tsohou, Aggeliki and Kim, Jong Woo}
    }
  • Karagiannis, S., Magkos, E., Chalavazis, G., & Nikiforos, M. N.. Analysis and evaluation of capture the flag challenges in secure mobile application development. .
    [Bibtex]
    @article{karagiannisanalysis,
    title={ANALYSIS AND EVALUATION OF CAPTURE THE FLAG CHALLENGES IN SECURE MOBILE APPLICATION DEVELOPMENT},
    author={Karagiannis, Stylianos and Magkos, Emmanouil and Chalavazis, George and Nikiforos, Maria Nefeli}
    }