2008 | ||
---|---|---|
48 | Stig Fr. Mjølsnes, Sjouke Mauw, Sokratis K. Katsikas: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings Springer 2008 | |
47 | Steven Furnell, Sokratis K. Katsikas, Antonio Lioy: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings Springer 2008 | |
46 | EE | Athanassios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas: Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ESORICS 2008: 207-222 |
45 | EE | Stylianos Sp. Pappas, Nicholas Harkiolakis, Panagiotis Karampelas, Lambros Ekonomou, Sokratis K. Katsikas: A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory. Panhellenic Conference on Informatics 2008: 222-226 |
44 | EE | Emmanuel S. Michailidis, Sokratis K. Katsikas, Efstratios Georgopoulos: Intrusion Detection Using Evolutionary Neural Networks. Panhellenic Conference on Informatics 2008: 8-12 |
43 | EE | Ioanna Kantzavelou, Sokratis K. Katsikas: A Generic Intrusion Detection Game Model in IT Security. TrustBus 2008: 151-162 |
42 | EE | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying and implementing privacy-preserving cryptographic protocols. Int. J. Inf. Sec. 7(6): 395-420 (2008) |
41 | EE | Stylianos Sp. Pappas, Lambros Ekonomou, Panagiotis Karampelas, Sokratis K. Katsikas, P. Liatsis: Modeling of the grounding resistance variation using ARMA models. Simulation Modelling Practice and Theory 16(5): 560-570 (2008) |
2007 | ||
40 | EE | Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger: Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 |
39 | EE | Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas: Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. Electr. Notes Theor. Comput. Sci. 179: 75-86 (2007) |
38 | EE | Stefanos Gritzalis, Athanassios N. Yannacopoulos, Costas Lambrinoudakis, P. Hatzopoulos, Sokratis K. Katsikas: A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Int. J. Inf. Sec. 6(4): 197-211 (2007) |
2006 | ||
37 | Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Springer 2006 | |
36 | EE | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas: Source Code Author Identification Based on N-gram Author Profiles. AIAI 2006: 508-515 |
35 | EE | Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas: Optimized Multi-Domain Secure Interoperation using Soft Constraints. AIAI 2006: 78-85 |
34 | EE | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas: Effective identification of source code authors using byte-level information. ICSE 2006: 893-896 |
33 | EE | Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas: A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70 |
32 | EE | Stylianos Sp. Pappas, Assimakis K. Leros, Sokratis K. Katsikas: Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory. Digital Signal Processing 16(6): 782-795 (2006) |
2005 | ||
31 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings Springer 2005 | |
30 | EE | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558 |
29 | EE | Stylianos Sp. Pappas, Assimakis K. Leros, Sokratis K. Katsikas: Multivariate AR Model Order Estimation with Unknown Process Order. Panhellenic Conference on Informatics 2005: 787-797 |
28 | EE | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying electronic voting protocols in typed MSR. WPES 2005: 35-39 |
27 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Editorial. Comput. Syst. Sci. Eng. 20(6): (2005) | |
26 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6): (2005) | |
2004 | ||
25 | Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings Springer 2004 | |
24 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings Springer 2004 | |
23 | Sokratis K. Katsikas: Doctoral Programme on Information and Communication Systems Security at the University of the Aegean. International Information Security Workshops 2004: 153-158 | |
2003 | ||
22 | Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas: Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece Kluwer 2003 | |
21 | EE | Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas: Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471 |
20 | EE | Sokratis K. Katsikas, Ahmed Patel: Special issue: securing computer communications with Public Key Infrastructure. Computer Communications 26(16): 1813-1814 (2003) |
2002 | ||
19 | EE | Costas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. DEXA Workshops 2002: 435 |
18 | L. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas: Revisiting Legal and Regulatory Requirements for Secure E-Voting. SEC 2002: 469-480 | |
2001 | ||
17 | Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas: Towards an ISO-9000 compliant certification service provider. HERCMA 2001: 390-397 | |
2000 | ||
16 | EE | John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas: Evaluating certificate status information mechanisms. ACM Conference on Computer and Communications Security 2000: 1-8 |
15 | Sokratis K. Katsikas: A Postgraduate Programme on Information and Communication Systems Security. SEC 2000: 49-58 | |
14 | Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro: Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. Computers & Security 19(8): 731-746 (2000) | |
1999 | ||
13 | EE | Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas: Trusted third party services for deploying secure telemedical applications over the WWW. Computers & Security 18(7): 627-639 (1999) |
1998 | ||
12 | Theodore K. Apostolopoulos, Victoria C. Daskalou, Sokratis K. Katsikas, K. D. Moulinos: Enforcing Security Policies in Large Scale Communication Networks. SRDS 1998: 393-397 | |
1997 | ||
11 | Ioanna Kantzavelou, Sokratis K. Katsikas: An attack detection system for secure computer systems - outline of the solution. SEC 1997: 123-135 | |
1996 | ||
10 | Sokratis K. Katsikas, Dimitris Gritzalis: Information Systems Security, Facing the information society of the 21st Century Chapman & Hall 1996 | |
9 | Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis: Attack Modelling in Open Network Environments. Communications and Multimedia Security 1996: 268-277 | |
8 | Sokratis K. Katsikas, N. Theodoropoulos: Defending Networks: The Expert System Components of SECURENET. Communications and Multimedia Security 1996: 291-302 | |
7 | EE | Dimitris Gritzalis, Sokratis K. Katsikas: Towards a formal system-to-system authentication protocol. Computer Communications 19(12): 954-961 (1996) |
6 | EE | Sokratis K. Katsikas, Thomas Spyrou, Dimitris Gritzalis, John Darzentas: Model for network behaviour under viral attack. Computer Communications 19(2): 124-132 (1996) |
1995 | ||
5 | EE | Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Design of a neural network for recognition and classification of computer viruses. Computers & Security 14(5): 435-448 (1995) |
1994 | ||
4 | Dimitris Androutsopoulos, Per Kaijser, Sokratis K. Katsikas, Kåre Presttun, Don Salmon, Paul G. Spirakis: Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME. IS&N 1994: 61-72 | |
1992 | ||
3 | EE | Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras: Determining access rights for medical information systems. Computers & Security 11(2): 149-161 (1992) |
2 | EE | Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis: A zero knowledge probabilistic login protocol. Computers & Security 11(8): 733-745 (1992) |
1991 | ||
1 | EE | Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou: Data security in medical information systems: The Greek case. Computers & Security 10(2): 141-159 (1991) |