| 2008 |
| 48 | | Stig Fr. Mjølsnes,
Sjouke Mauw,
Sokratis K. Katsikas:
Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings
Springer 2008 |
| 47 | | Steven Furnell,
Sokratis K. Katsikas,
Antonio Lioy:
Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings
Springer 2008 |
| 46 | EE | Athanassios N. Yannacopoulos,
Costas Lambrinoudakis,
Stefanos Gritzalis,
Stylianos Z. Xanthopoulos,
Sokratis K. Katsikas:
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
ESORICS 2008: 207-222 |
| 45 | EE | Stylianos Sp. Pappas,
Nicholas Harkiolakis,
Panagiotis Karampelas,
Lambros Ekonomou,
Sokratis K. Katsikas:
A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory.
Panhellenic Conference on Informatics 2008: 222-226 |
| 44 | EE | Emmanuel S. Michailidis,
Sokratis K. Katsikas,
Efstratios Georgopoulos:
Intrusion Detection Using Evolutionary Neural Networks.
Panhellenic Conference on Informatics 2008: 8-12 |
| 43 | EE | Ioanna Kantzavelou,
Sokratis K. Katsikas:
A Generic Intrusion Detection Game Model in IT Security.
TrustBus 2008: 151-162 |
| 42 | EE | Theodoros Balopoulos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Specifying and implementing privacy-preserving cryptographic protocols.
Int. J. Inf. Sec. 7(6): 395-420 (2008) |
| 41 | EE | Stylianos Sp. Pappas,
Lambros Ekonomou,
Panagiotis Karampelas,
Sokratis K. Katsikas,
P. Liatsis:
Modeling of the grounding resistance variation using ARMA models.
Simulation Modelling Practice and Theory 16(5): 560-570 (2008) |
| 2007 |
| 40 | EE | Günther Pernul,
Marco Casassa Mont,
Eduardo B. Fernández,
Sokratis K. Katsikas,
Alfred Kobsa,
Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
TrustBus 2007: 2 |
| 39 | EE | Petros Belsis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation.
Electr. Notes Theor. Comput. Sci. 179: 75-86 (2007) |
| 38 | EE | Stefanos Gritzalis,
Athanassios N. Yannacopoulos,
Costas Lambrinoudakis,
P. Hatzopoulos,
Sokratis K. Katsikas:
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec. 6(4): 197-211 (2007) |
| 2006 |
| 37 | | Sokratis K. Katsikas,
Javier Lopez,
Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Springer 2006 |
| 36 | EE | Georgia Frantzeskou,
Efstathios Stamatatos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Source Code Author Identification Based on N-gram Author Profiles.
AIAI 2006: 508-515 |
| 35 | EE | Petros Belsis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Optimized Multi-Domain Secure Interoperation using Soft Constraints.
AIAI 2006: 78-85 |
| 34 | EE | Georgia Frantzeskou,
Efstathios Stamatatos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Effective identification of source code authors using byte-level information.
ICSE 2006: 893-896 |
| 33 | EE | Theodoros Balopoulos,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development.
TrustBus 2006: 62-70 |
| 32 | EE | Stylianos Sp. Pappas,
Assimakis K. Leros,
Sokratis K. Katsikas:
Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory.
Digital Signal Processing 16(6): 782-795 (2006) |
| 2005 |
| 31 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings
Springer 2005 |
| 30 | EE | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, Privacy and Security in E-Business: Requirements and Solutions.
Panhellenic Conference on Informatics 2005: 548-558 |
| 29 | EE | Stylianos Sp. Pappas,
Assimakis K. Leros,
Sokratis K. Katsikas:
Multivariate AR Model Order Estimation with Unknown Process Order.
Panhellenic Conference on Informatics 2005: 787-797 |
| 28 | EE | Theodoros Balopoulos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Specifying electronic voting protocols in typed MSR.
WPES 2005: 35-39 |
| 27 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Editorial.
Comput. Syst. Sci. Eng. 20(6): (2005) |
| 26 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng. 20(6): (2005) |
| 2004 |
| 25 | | Sokratis K. Katsikas,
Stefanos Gritzalis,
Javier Lopez:
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings
Springer 2004 |
| 24 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings
Springer 2004 |
| 23 | | Sokratis K. Katsikas:
Doctoral Programme on Information and Communication Systems Security at the University of the Aegean.
International Information Security Workshops 2004: 153-158 |
| 2003 |
| 22 | | Dimitris Gritzalis,
Sabrina De Capitani di Vimercati,
Pierangela Samarati,
Sokratis K. Katsikas:
Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece
Kluwer 2003 |
| 21 | EE | Costas Lambrinoudakis,
Spyros Kokolakis,
Maria Karyda,
Vassilis Tsoumas,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Electronic Voting Systems: Security Implications of the Administrative Workflow.
DEXA Workshops 2003: 467-471 |
| 20 | EE | Sokratis K. Katsikas,
Ahmed Patel:
Special issue: securing computer communications with Public Key Infrastructure.
Computer Communications 26(16): 1813-1814 (2003) |
| 2002 |
| 19 | EE | Costas Lambrinoudakis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Building a Reliable e-Voting System: Functional Requirements and Legal Constraints.
DEXA Workshops 2002: 435 |
| 18 | | L. Mitrou,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Revisiting Legal and Regulatory Requirements for Secure E-Voting.
SEC 2002: 469-480 |
| 2001 |
| 17 | | Dimitrios Lekkas,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Towards an ISO-9000 compliant certification service provider.
HERCMA 2001: 390-397 |
| 2000 |
| 16 | EE | John Iliadis,
Diomidis Spinellis,
Dimitris Gritzalis,
Bart Preneel,
Sokratis K. Katsikas:
Evaluating certificate status information mechanisms.
ACM Conference on Computer and Communications Security 2000: 1-8 |
| 15 | | Sokratis K. Katsikas:
A Postgraduate Programme on Information and Communication Systems Security.
SEC 2000: 49-58 |
| 14 | | Stefanos Gritzalis,
Sokratis K. Katsikas,
Dimitrios Lekkas,
Konstantinos Moulinos,
Eleni Polydoro:
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture.
Computers & Security 19(8): 731-746 (2000) |
| 1999 |
| 13 | EE | Diomidis Spinellis,
Stefanos Gritzalis,
John Iliadis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW.
Computers & Security 18(7): 627-639 (1999) |
| 1998 |
| 12 | | Theodore K. Apostolopoulos,
Victoria C. Daskalou,
Sokratis K. Katsikas,
K. D. Moulinos:
Enforcing Security Policies in Large Scale Communication Networks.
SRDS 1998: 393-397 |
| 1997 |
| 11 | | Ioanna Kantzavelou,
Sokratis K. Katsikas:
An attack detection system for secure computer systems - outline of the solution.
SEC 1997: 123-135 |
| 1996 |
| 10 | | Sokratis K. Katsikas,
Dimitris Gritzalis:
Information Systems Security, Facing the information society of the 21st Century
Chapman & Hall 1996 |
| 9 | | Sokratis K. Katsikas,
Dimitris Gritzalis,
Paul G. Spirakis:
Attack Modelling in Open Network Environments.
Communications and Multimedia Security 1996: 268-277 |
| 8 | | Sokratis K. Katsikas,
N. Theodoropoulos:
Defending Networks: The Expert System Components of SECURENET.
Communications and Multimedia Security 1996: 291-302 |
| 7 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas:
Towards a formal system-to-system authentication protocol.
Computer Communications 19(12): 954-961 (1996) |
| 6 | EE | Sokratis K. Katsikas,
Thomas Spyrou,
Dimitris Gritzalis,
John Darzentas:
Model for network behaviour under viral attack.
Computer Communications 19(2): 124-132 (1996) |
| 1995 |
| 5 | EE | Anastasia Doumas,
Konstantinos Mavroudakis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Design of a neural network for recognition and classification of computer viruses.
Computers & Security 14(5): 435-448 (1995) |
| 1994 |
| 4 | | Dimitris Androutsopoulos,
Per Kaijser,
Sokratis K. Katsikas,
Kåre Presttun,
Don Salmon,
Paul G. Spirakis:
Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME.
IS&N 1994: 61-72 |
| 1992 |
| 3 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas,
J. Keklikoglou,
A. Tomaras:
Determining access rights for medical information systems.
Computers & Security 11(2): 149-161 (1992) |
| 2 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas,
Stefanos Gritzalis:
A zero knowledge probabilistic login protocol.
Computers & Security 11(8): 733-745 (1992) |
| 1991 |
| 1 | EE | Dimitris Gritzalis,
A. Tomaras,
Sokratis K. Katsikas,
J. Keklikoglou:
Data security in medical information systems: The Greek case.
Computers & Security 10(2): 141-159 (1991) |