2008 |
48 | | Stig Fr. Mjølsnes,
Sjouke Mauw,
Sokratis K. Katsikas:
Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings
Springer 2008 |
47 | | Steven Furnell,
Sokratis K. Katsikas,
Antonio Lioy:
Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings
Springer 2008 |
46 | EE | Athanassios N. Yannacopoulos,
Costas Lambrinoudakis,
Stefanos Gritzalis,
Stylianos Z. Xanthopoulos,
Sokratis K. Katsikas:
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
ESORICS 2008: 207-222 |
45 | EE | Stylianos Sp. Pappas,
Nicholas Harkiolakis,
Panagiotis Karampelas,
Lambros Ekonomou,
Sokratis K. Katsikas:
A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory.
Panhellenic Conference on Informatics 2008: 222-226 |
44 | EE | Emmanuel S. Michailidis,
Sokratis K. Katsikas,
Efstratios Georgopoulos:
Intrusion Detection Using Evolutionary Neural Networks.
Panhellenic Conference on Informatics 2008: 8-12 |
43 | EE | Ioanna Kantzavelou,
Sokratis K. Katsikas:
A Generic Intrusion Detection Game Model in IT Security.
TrustBus 2008: 151-162 |
42 | EE | Theodoros Balopoulos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Specifying and implementing privacy-preserving cryptographic protocols.
Int. J. Inf. Sec. 7(6): 395-420 (2008) |
41 | EE | Stylianos Sp. Pappas,
Lambros Ekonomou,
Panagiotis Karampelas,
Sokratis K. Katsikas,
P. Liatsis:
Modeling of the grounding resistance variation using ARMA models.
Simulation Modelling Practice and Theory 16(5): 560-570 (2008) |
2007 |
40 | EE | Günther Pernul,
Marco Casassa Mont,
Eduardo B. Fernández,
Sokratis K. Katsikas,
Alfred Kobsa,
Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
TrustBus 2007: 2 |
39 | EE | Petros Belsis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation.
Electr. Notes Theor. Comput. Sci. 179: 75-86 (2007) |
38 | EE | Stefanos Gritzalis,
Athanassios N. Yannacopoulos,
Costas Lambrinoudakis,
P. Hatzopoulos,
Sokratis K. Katsikas:
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec. 6(4): 197-211 (2007) |
2006 |
37 | | Sokratis K. Katsikas,
Javier Lopez,
Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Springer 2006 |
36 | EE | Georgia Frantzeskou,
Efstathios Stamatatos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Source Code Author Identification Based on N-gram Author Profiles.
AIAI 2006: 508-515 |
35 | EE | Petros Belsis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Optimized Multi-Domain Secure Interoperation using Soft Constraints.
AIAI 2006: 78-85 |
34 | EE | Georgia Frantzeskou,
Efstathios Stamatatos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Effective identification of source code authors using byte-level information.
ICSE 2006: 893-896 |
33 | EE | Theodoros Balopoulos,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development.
TrustBus 2006: 62-70 |
32 | EE | Stylianos Sp. Pappas,
Assimakis K. Leros,
Sokratis K. Katsikas:
Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory.
Digital Signal Processing 16(6): 782-795 (2006) |
2005 |
31 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings
Springer 2005 |
30 | EE | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, Privacy and Security in E-Business: Requirements and Solutions.
Panhellenic Conference on Informatics 2005: 548-558 |
29 | EE | Stylianos Sp. Pappas,
Assimakis K. Leros,
Sokratis K. Katsikas:
Multivariate AR Model Order Estimation with Unknown Process Order.
Panhellenic Conference on Informatics 2005: 787-797 |
28 | EE | Theodoros Balopoulos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Specifying electronic voting protocols in typed MSR.
WPES 2005: 35-39 |
27 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Editorial.
Comput. Syst. Sci. Eng. 20(6): (2005) |
26 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng. 20(6): (2005) |
2004 |
25 | | Sokratis K. Katsikas,
Stefanos Gritzalis,
Javier Lopez:
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings
Springer 2004 |
24 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings
Springer 2004 |
23 | | Sokratis K. Katsikas:
Doctoral Programme on Information and Communication Systems Security at the University of the Aegean.
International Information Security Workshops 2004: 153-158 |
2003 |
22 | | Dimitris Gritzalis,
Sabrina De Capitani di Vimercati,
Pierangela Samarati,
Sokratis K. Katsikas:
Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece
Kluwer 2003 |
21 | EE | Costas Lambrinoudakis,
Spyros Kokolakis,
Maria Karyda,
Vassilis Tsoumas,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Electronic Voting Systems: Security Implications of the Administrative Workflow.
DEXA Workshops 2003: 467-471 |
20 | EE | Sokratis K. Katsikas,
Ahmed Patel:
Special issue: securing computer communications with Public Key Infrastructure.
Computer Communications 26(16): 1813-1814 (2003) |
2002 |
19 | EE | Costas Lambrinoudakis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Building a Reliable e-Voting System: Functional Requirements and Legal Constraints.
DEXA Workshops 2002: 435 |
18 | | L. Mitrou,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Revisiting Legal and Regulatory Requirements for Secure E-Voting.
SEC 2002: 469-480 |
2001 |
17 | | Dimitrios Lekkas,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Towards an ISO-9000 compliant certification service provider.
HERCMA 2001: 390-397 |
2000 |
16 | EE | John Iliadis,
Diomidis Spinellis,
Dimitris Gritzalis,
Bart Preneel,
Sokratis K. Katsikas:
Evaluating certificate status information mechanisms.
ACM Conference on Computer and Communications Security 2000: 1-8 |
15 | | Sokratis K. Katsikas:
A Postgraduate Programme on Information and Communication Systems Security.
SEC 2000: 49-58 |
14 | | Stefanos Gritzalis,
Sokratis K. Katsikas,
Dimitrios Lekkas,
Konstantinos Moulinos,
Eleni Polydoro:
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture.
Computers & Security 19(8): 731-746 (2000) |
1999 |
13 | EE | Diomidis Spinellis,
Stefanos Gritzalis,
John Iliadis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW.
Computers & Security 18(7): 627-639 (1999) |
1998 |
12 | | Theodore K. Apostolopoulos,
Victoria C. Daskalou,
Sokratis K. Katsikas,
K. D. Moulinos:
Enforcing Security Policies in Large Scale Communication Networks.
SRDS 1998: 393-397 |
1997 |
11 | | Ioanna Kantzavelou,
Sokratis K. Katsikas:
An attack detection system for secure computer systems - outline of the solution.
SEC 1997: 123-135 |
1996 |
10 | | Sokratis K. Katsikas,
Dimitris Gritzalis:
Information Systems Security, Facing the information society of the 21st Century
Chapman & Hall 1996 |
9 | | Sokratis K. Katsikas,
Dimitris Gritzalis,
Paul G. Spirakis:
Attack Modelling in Open Network Environments.
Communications and Multimedia Security 1996: 268-277 |
8 | | Sokratis K. Katsikas,
N. Theodoropoulos:
Defending Networks: The Expert System Components of SECURENET.
Communications and Multimedia Security 1996: 291-302 |
7 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas:
Towards a formal system-to-system authentication protocol.
Computer Communications 19(12): 954-961 (1996) |
6 | EE | Sokratis K. Katsikas,
Thomas Spyrou,
Dimitris Gritzalis,
John Darzentas:
Model for network behaviour under viral attack.
Computer Communications 19(2): 124-132 (1996) |
1995 |
5 | EE | Anastasia Doumas,
Konstantinos Mavroudakis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Design of a neural network for recognition and classification of computer viruses.
Computers & Security 14(5): 435-448 (1995) |
1994 |
4 | | Dimitris Androutsopoulos,
Per Kaijser,
Sokratis K. Katsikas,
Kåre Presttun,
Don Salmon,
Paul G. Spirakis:
Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME.
IS&N 1994: 61-72 |
1992 |
3 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas,
J. Keklikoglou,
A. Tomaras:
Determining access rights for medical information systems.
Computers & Security 11(2): 149-161 (1992) |
2 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas,
Stefanos Gritzalis:
A zero knowledge probabilistic login protocol.
Computers & Security 11(8): 733-745 (1992) |
1991 |
1 | EE | Dimitris Gritzalis,
A. Tomaras,
Sokratis K. Katsikas,
J. Keklikoglou:
Data security in medical information systems: The Greek case.
Computers & Security 10(2): 141-159 (1991) |