BibTeX records: Sokratis K. Katsikas

download as .bib file

@inproceedings{DBLP:conf/icissp/LienBK24,
  author       = {Eirik Lien and
                  Karl Magnus Gr{\o}nning Bergh and
                  Sokratis K. Katsikas},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Perceptions of Cyber Security Risk of the Norwegian Advanced Metering
                  Infrastructure},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {187--194},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012414900003648},
  doi          = {10.5220/0012414900003648},
  timestamp    = {Tue, 02 Apr 2024 14:37:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LienBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisa/2023,
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-99-9614-8},
  doi          = {10.1007/978-981-99-9614-8},
  isbn         = {978-981-99-9613-1},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2023w1,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Pantaleone Nespoli and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14398},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54204-6},
  doi          = {10.1007/978-3-031-54204-6},
  isbn         = {978-3-031-54203-9},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2023w1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2023w2,
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54129-2},
  doi          = {10.1007/978-3-031-54129-2},
  isbn         = {978-3-031-54128-5},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2023w2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ElZawawyKCK23,
  author       = {Mohamed A. El{-}Zawawy and
                  Pallavi Kaliyar and
                  Mauro Conti and
                  Sokratis K. Katsikas},
  title        = {Honey-list based authentication protocol for industrial IoT swarms},
  journal      = {Comput. Commun.},
  volume       = {211},
  pages        = {239--253},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.09.012},
  doi          = {10.1016/J.COMCOM.2023.09.012},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ElZawawyKCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OfteK23,
  author       = {H{\aa}vard Jakobsen Ofte and
                  Sokratis K. Katsikas},
  title        = {Understanding situation awareness in SOCs, a systematic literature
                  review},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103069},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103069},
  doi          = {10.1016/J.COSE.2022.103069},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OfteK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KampourakisGK23,
  author       = {Vyron Kampourakis and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {A systematic literature review on wireless security testbeds in the
                  cyber-physical realm},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103383},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103383},
  doi          = {10.1016/J.COSE.2023.103383},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KampourakisGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/ChaudharyGK23,
  author       = {Sunil Chaudhary and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {A quest for research and knowledge gaps in cybersecurity awareness
                  for small and medium-sized enterprises},
  journal      = {Comput. Sci. Rev.},
  volume       = {50},
  pages        = {100592},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cosrev.2023.100592},
  doi          = {10.1016/J.COSREV.2023.100592},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/ChaudharyGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KavallieratosK23,
  author       = {Georgios Kavallieratos and
                  Sokratis K. Katsikas},
  title        = {An exploratory analysis of the last frontier: {A} systematic literature
                  review of cybersecurity in space},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100640},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100640},
  doi          = {10.1016/J.IJCIP.2023.100640},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KavallieratosK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AkbarzadehK23,
  author       = {Aida Akbarzadeh and
                  Sokratis K. Katsikas},
  title        = {Dependency-based security risk assessment for cyber-physical systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {3},
  pages        = {563--578},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-022-00608-4},
  doi          = {10.1007/S10207-022-00608-4},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AkbarzadehK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MengKCC23,
  author       = {Weizhi Meng and
                  Sokratis K. Katsikas and
                  Jiageng Chen and
                  Chao Chen},
  title        = {Editorial for special issue on security and trust on networked systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2229},
  doi          = {10.1002/NEM.2229},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MengKCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KannelonningK23,
  author       = {Kristian Kannel{\o}nning and
                  Sokratis K. Katsikas},
  title        = {A systematic literature review of how cybersecurity-related behavior
                  has been assessed},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {463--477},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-08-2022-0139},
  doi          = {10.1108/ICS-08-2022-0139},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/KannelonningK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AmroGK23,
  author       = {Ahmed Amro and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {Assessing Cyber Risk in Cyber-Physical Systems Using the ATT{\&}CK
                  Framework},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {22:1--22:33},
  year         = {2023},
  url          = {https://doi.org/10.1145/3571733},
  doi          = {10.1145/3571733},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AmroGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/VatnKK23,
  author       = {Karl Jonatan Due Vatn and
                  Georgios Kavallieratos and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Pantaleone Nespoli and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Threat Analysis in Dairy Farming 4.0},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14398},
  pages        = {46--63},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54204-6\_3},
  doi          = {10.1007/978-3-031-54204-6\_3},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/VatnKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/KannelonningK23,
  author       = {Kristian Kannel{\o}nning and
                  Sokratis K. Katsikas},
  editor       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {Cybersecurity-Related Behavior of Personnel in the Norwegian Industry},
  booktitle    = {Human Aspects of Information Security and Assurance - 17th {IFIP}
                  {WG} 11.12 International Symposium, {HAISA} 2023, Kent, UK, July 4-6,
                  2023, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {674},
  pages        = {249--258},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38530-8\_20},
  doi          = {10.1007/978-3-031-38530-8\_20},
  timestamp    = {Mon, 07 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/KannelonningK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NygardK23,
  author       = {Arne Roar Nyg{\aa}rd and
                  Sokratis K. Katsikas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Leveraging Hardware Reverse Engineering to Improve the Cyber Security
                  and Resilience of the Smart Grid},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {610--616},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012046000003555},
  doi          = {10.5220/0012046000003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NygardK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022w,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge and
                  Massimiliano Albanese and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla},
  title        = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS
                  2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE
                  2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September
                  26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13785},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25460-4},
  doi          = {10.1007/978-3-031-25460-4},
  isbn         = {978-3-031-25459-8},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2022w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2022,
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25538-0},
  doi          = {10.1007/978-3-031-25538-0},
  isbn         = {978-3-031-25537-3},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-05047,
  author       = {Vassilis Papaspirou and
                  Leandros A. Maglaras and
                  Ioanna Kantzavelou and
                  Naghmeh Moradpoor and
                  Sokratis K. Katsikas},
  title        = {A Blockchain-based two Factor Honeytoken Authentication System},
  journal      = {CoRR},
  volume       = {abs/2307.05047},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.05047},
  doi          = {10.48550/ARXIV.2307.05047},
  eprinttype    = {arXiv},
  eprint       = {2307.05047},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-05047.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChowdhuryKG22,
  author       = {Nabin Chowdhury and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  title        = {Modeling effective cybersecurity training frameworks: {A} delphi method-based
                  study},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102551},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102551},
  doi          = {10.1016/J.COSE.2021.102551},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChowdhuryKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GallagherPCPMK22,
  author       = {Michael Gallagher and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas and
                  Pavlos Papadopoulos and
                  Alexios Mylonas and
                  Sokratis K. Katsikas},
  title        = {Investigating machine learning attacks on financial time series models},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102933},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102933},
  doi          = {10.1016/J.COSE.2022.102933},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GallagherPCPMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/ChaudharyGK22,
  author       = {Sunil Chaudhary and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {Developing metrics to assess the effectiveness of cybersecurity awareness
                  program},
  journal      = {J. Cybersecur.},
  volume       = {8},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1093/cybsec/tyac006},
  doi          = {10.1093/CYBSEC/TYAC006},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/ChaudharyGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/AmroOGK22,
  author       = {Ahmed Amro and
                  Aybars Oruc and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {Navigation Data Anomaly Analysis and Detection},
  journal      = {Inf.},
  volume       = {13},
  number       = {3},
  pages        = {104},
  year         = {2022},
  url          = {https://doi.org/10.3390/info13030104},
  doi          = {10.3390/INFO13030104},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/AmroOGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/KantzavelouMTK22,
  author       = {Ioanna Kantzavelou and
                  Leandros A. Maglaras and
                  Panagiotis F. Tzikopoulos and
                  Sokratis K. Katsikas},
  title        = {A multiplayer game model to detect insiders in wireless sensor networks},
  journal      = {PeerJ Comput. Sci.},
  volume       = {8},
  pages        = {e791},
  year         = {2022},
  url          = {https://doi.org/10.7717/peerj-cs.791},
  doi          = {10.7717/PEERJ-CS.791},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/KantzavelouMTK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NygardK22,
  author       = {Arne Roar Nyg{\aa}rd and
                  Sokratis K. Katsikas},
  title        = {SoK: Combating threats in the digital supply chain},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {128:1--128:8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544421},
  doi          = {10.1145/3538969.3544421},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NygardK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AkbarzadehK22,
  author       = {Aida Akbarzadeh and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge and
                  Massimiliano Albanese and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla},
  title        = {Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies},
  booktitle    = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS
                  2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE
                  2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September
                  26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13785},
  pages        = {5--25},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25460-4\_1},
  doi          = {10.1007/978-3-031-25460-4\_1},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AkbarzadehK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/TeglasyKL22,
  author       = {B{\'{a}}lint Z. T{\'{e}}gl{\'{a}}sy and
                  Sokratis K. Katsikas and
                  Mary Ann Lundteigen},
  title        = {Standardized cyber security risk assessment for unmanned offshore
                  facilities},
  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489.3527302},
  doi          = {10.1145/3524489.3527302},
  timestamp    = {Thu, 22 Dec 2022 13:53:49 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/TeglasyKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Katsikas22,
  author       = {Sokratis K. Katsikas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Cyber Security When {IT} Meets {OT}},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Katsikas22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NygardSK22,
  author       = {Arne Roar Nyg{\aa}rd and
                  Arvind Sharma and
                  Sokratis K. Katsikas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Reverse Engineering for Thwarting Digital Supply Chain Attacks in
                  Critical Infrastructures: Ethical Considerations},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {461--468},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011384300003283},
  doi          = {10.5220/0011384300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NygardSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisa/2021,
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-93956-4},
  doi          = {10.1007/978-3-030-93956-4},
  isbn         = {978-3-030-93955-7},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2021cicps,
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Nora Cuppens and
                  John Mylopoulos and
                  Christos Kalloniatis and
                  Weizhi Meng and
                  Steven Furnell and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge},
  title        = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS,
                  SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt,
                  Germany, October 4-8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13106},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95484-0},
  doi          = {10.1007/978-3-030-95484-0},
  isbn         = {978-3-030-95483-3},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2021cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2022,
  editor       = {Sokratis K. Katsikas and
                  Steven Furnell},
  title        = {Trust, Privacy and Security in Digital Business - 19th International
                  Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13582},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17926-6},
  doi          = {10.1007/978-3-031-17926-6},
  isbn         = {978-3-031-17925-9},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-01952,
  author       = {B{\'{a}}lint Z. T{\'{e}}gl{\'{a}}sy and
                  Emil Wengle and
                  John R. Potter and
                  Sokratis K. Katsikas},
  title        = {Authentication of Underwater Assets},
  journal      = {CoRR},
  volume       = {abs/2209.01952},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.01952},
  doi          = {10.48550/ARXIV.2209.01952},
  eprinttype    = {arXiv},
  eprint       = {2209.01952},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-01952.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07666,
  author       = {B{\'{a}}lint Z. T{\'{e}}gl{\'{a}}sy and
                  Sokratis K. Katsikas},
  title        = {A Location-Based Global Authorization Method for Underwater Security},
  journal      = {CoRR},
  volume       = {abs/2210.07666},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.07666},
  doi          = {10.48550/ARXIV.2210.07666},
  eprinttype    = {arXiv},
  eprint       = {2210.07666},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-07666.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/digital/RadoglouGrammatikisSDSLESPBRSPM21,
  author       = {Panagiotis I. Radoglou{-}Grammatikis and
                  Panagiotis G. Sarigiannidis and
                  Christos Dalamagkas and
                  Yannis Spyridis and
                  Thomas Lagkas and
                  Georgios Efstathopoulos and
                  Achilleas Sesis and
                  Ignacio Labrador Pav{\'{o}}n and
                  Rub{\'{e}}n Trapero Burgos and
                  Rodrigo Diaz Rodriguez and
                  Antonios Sarigiannidis and
                  Dimitrios Papamartzivanos and
                  Sofia{-}Anna Menesidou and
                  Giannis Ledakis and
                  Achilleas Pasias and
                  Thanasis Kotsiopoulos and
                  Anastasios Drosou and
                  Orestis Mavropoulos and
                  Alba Colet{-}Subirachs and
                  Pol Paradell Sola and
                  Jos{\'{e}} Luis Dom{\'{\i}}nguez{-}Garc{\'{\i}}a and
                  Marisa Escalante and
                  Alberto Molinuevo Mart{\'{\i}}n and
                  Benito Caracuel and
                  Francisco Ramos and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas and
                  Hans Christian Bolstad and
                  Dan{-}Eric Archer and
                  Nikola Paunovic and
                  Ramon Gallart{-}Fernandez and
                  Theodoros Rokkas and
                  Alicia Arce},
  title        = {SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture},
  journal      = {Digit.},
  volume       = {1},
  number       = {4},
  pages        = {173--187},
  year         = {2021},
  url          = {https://doi.org/10.3390/digital1040013},
  doi          = {10.3390/DIGITAL1040013},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/digital/RadoglouGrammatikisSDSLESPBRSPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/GoudosisK21,
  author       = {Athanasios K. Goudosis and
                  Sokratis K. Katsikas},
  title        = {{ARIBC:} Online Reporting Based on Identity-Based Cryptography},
  journal      = {Future Internet},
  volume       = {13},
  number       = {2},
  pages        = {53},
  year         = {2021},
  url          = {https://doi.org/10.3390/fi13020053},
  doi          = {10.3390/FI13020053},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/GoudosisK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PirbhulalGK21,
  author       = {Sandeep Pirbhulal and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {A Systematic Literature Review on {RAMS} analysis for critical infrastructures
                  protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100427},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100427},
  doi          = {10.1016/J.IJCIP.2021.100427},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/PirbhulalGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AkbarzadehK21,
  author       = {Aida Akbarzadeh and
                  Sokratis K. Katsikas},
  title        = {Identifying and Analyzing Dependencies in and among Complex Cyber
                  Physical Systems},
  journal      = {Sensors},
  volume       = {21},
  number       = {5},
  pages        = {1685},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21051685},
  doi          = {10.3390/S21051685},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AkbarzadehK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KavallieratosSK21,
  author       = {Georgios Kavallieratos and
                  Georgios P. Spathoulas and
                  Sokratis K. Katsikas},
  title        = {Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls
                  for Complex Cyberphysical Systems},
  journal      = {Sensors},
  volume       = {21},
  number       = {5},
  pages        = {1691},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21051691},
  doi          = {10.3390/S21051691},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KavallieratosSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SpathoulasKKB21,
  author       = {Georgios P. Spathoulas and
                  Georgios Kavallieratos and
                  Sokratis K. Katsikas and
                  Alessio Baiocco},
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Nora Cuppens and
                  John Mylopoulos and
                  Christos Kalloniatis and
                  Weizhi Meng and
                  Steven Furnell and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge},
  title        = {Attack Path Analysis and Cost-Efficient Selection of Cybersecurity
                  Controls for Complex Cyberphysical Systems},
  booktitle    = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS,
                  SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt,
                  Germany, October 4-8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13106},
  pages        = {74--90},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95484-0\_5},
  doi          = {10.1007/978-3-030-95484-0\_5},
  timestamp    = {Wed, 09 Nov 2022 13:58:44 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SpathoulasKKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etaa/MsgnaKG21,
  author       = {Mehari Msgna and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  editor       = {Andrea Saracino and
                  Paolo Mori},
  title        = {{WYK:} Mobile Device Authentication Using the User's Address Book},
  booktitle    = {Emerging Technologies for Authorization and Authentication - 4th International
                  Workshop, {ETAA} 2021, Darmstadt, Germany, October 8, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13136},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93747-8\_1},
  doi          = {10.1007/978-3-030-93747-8\_1},
  timestamp    = {Wed, 19 Jan 2022 09:36:11 +0100},
  biburl       = {https://dblp.org/rec/conf/etaa/MsgnaKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2021,
  editor       = {Joseph K. Liu and
                  Sokratis K. Katsikas and
                  Weizhi Meng and
                  Willy Susilo and
                  Rolly Intan},
  title        = {Information Security - 24th International Conference, {ISC} 2021,
                  Virtual Event, November 10-12, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13118},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91356-4},
  doi          = {10.1007/978-3-030-91356-4},
  isbn         = {978-3-030-91355-7},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/PapadopoulosPBL20,
  author       = {Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  William J. Buchanan and
                  Owen Lo and
                  Sokratis K. Katsikas},
  title        = {Privacy-Preserving Passive {DNS}},
  journal      = {Comput.},
  volume       = {9},
  number       = {3},
  pages        = {64},
  year         = {2020},
  url          = {https://doi.org/10.3390/computers9030064},
  doi          = {10.3390/COMPUTERS9030064},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/PapadopoulosPBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/KavallieratosKG20,
  author       = {Georgios Kavallieratos and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  title        = {SafeSec Tropos: Joint security and safety requirements elicitation},
  journal      = {Comput. Stand. Interfaces},
  volume       = {70},
  pages        = {103429},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.csi.2020.103429},
  doi          = {10.1016/J.CSI.2020.103429},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KavallieratosKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KavallieratosKG20,
  author       = {Georgios Kavallieratos and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  title        = {Cybersecurity and Safety Co-Engineering of Cyberphysical Systems -
                  {A} Comprehensive Survey},
  journal      = {Future Internet},
  volume       = {12},
  number       = {4},
  pages        = {65},
  year         = {2020},
  url          = {https://doi.org/10.3390/fi12040065},
  doi          = {10.3390/FI12040065},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/KavallieratosKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KatsikasG20,
  author       = {Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  title        = {Security, Privacy, and Trustworthiness of Sensor Networks and Internet
                  of Things},
  journal      = {Sensors},
  volume       = {20},
  number       = {14},
  pages        = {3846},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20143846},
  doi          = {10.3390/S20143846},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KatsikasG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/StamatellisPPKB20,
  author       = {Charalampos S. Stamatellis and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Sokratis K. Katsikas and
                  William J. Buchanan},
  title        = {A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric},
  journal      = {Sensors},
  volume       = {20},
  number       = {22},
  pages        = {6587},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20226587},
  doi          = {10.3390/S20226587},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/StamatellisPPKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/KavallieratosDK20,
  author       = {Georgios Kavallieratos and
                  Vasiliki Diamantopoulou and
                  Sokratis K. Katsikas},
  title        = {Shipping 4.0: Security Requirements for the Cyber-Enabled Ship},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {10},
  pages        = {6617--6625},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2020.2976840},
  doi          = {10.1109/TII.2020.2976840},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/KavallieratosDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/KavallieratosKG20,
  author       = {Georgios Kavallieratos and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  editor       = {Ngoc Thanh Nguyen and
                  Kietikul Jearanaitanakij and
                  Ali Selamat and
                  Bogdan Trawinski and
                  Suphamit Chittayasothorn},
  title        = {Modelling Shipping 4.0: {A} Reference Architecture for the Cyber-Enabled
                  Ship},
  booktitle    = {Intelligent Information and Database Systems - 12th Asian Conference,
                  {ACIIDS} 2020, Phuket, Thailand, March 23-26, 2020, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12034},
  pages        = {202--217},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-42058-1\_17},
  doi          = {10.1007/978-3-030-42058-1\_17},
  timestamp    = {Thu, 16 Mar 2023 20:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/aciids/KavallieratosKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KavallieratosK20,
  author       = {Georgios Kavallieratos and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Weizhi Meng and
                  Steven Furnell},
  title        = {Attack Path Analysis for Cyber Physical Systems},
  booktitle    = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS,
                  SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12501},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64330-0\_2},
  doi          = {10.1007/978-3-030-64330-0\_2},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KavallieratosK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Katsikas20,
  author       = {Sokratis K. Katsikas},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Leveraging Blockchain Technology to Enhance Security and Privacy in
                  the Internet of Things},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  timestamp    = {Tue, 14 Apr 2020 10:48:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Katsikas20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AkbarzadehK20,
  author       = {Aida Akbarzadeh and
                  Sokratis K. Katsikas},
  title        = {Identifying Critical Components in Large Scale Cyber Physical Systems},
  booktitle    = {{ICSE} '20: 42nd International Conference on Software Engineering,
                  Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020},
  pages        = {230--236},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3387940.3391473},
  doi          = {10.1145/3387940.3391473},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/AkbarzadehK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020asiacpss,
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Proceedings of the 6th {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384941},
  doi          = {10.1145/3384941},
  isbn         = {978-1-4503-7608-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020asiacpss.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edemocracy/2019,
  editor       = {Sokratis K. Katsikas and
                  Vasilios Zorkadis},
  title        = {E-Democracy - Safeguarding Democracy and Human Rights in the Digital
                  Age - 8th International Conference, e-Democracy 2019, Athens, Greece,
                  December 12-13, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1111},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-37545-4},
  doi          = {10.1007/978-3-030-37545-4},
  isbn         = {978-3-030-37544-7},
  timestamp    = {Tue, 17 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edemocracy/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-42048-2},
  doi          = {10.1007/978-3-030-42048-2},
  isbn         = {978-3-030-42047-5},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2019cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2020cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Weizhi Meng and
                  Steven Furnell},
  title        = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS,
                  SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12501},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64330-0},
  doi          = {10.1007/978-3-030-64330-0},
  isbn         = {978-3-030-64329-4},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2020cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-06430,
  author       = {Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  William J. Buchanan and
                  Owen Lo and
                  Sokratis K. Katsikas},
  title        = {Privacy Preserving Passive {DNS}},
  journal      = {CoRR},
  volume       = {abs/2008.06430},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.06430},
  eprinttype    = {arXiv},
  eprint       = {2008.06430},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-06430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09260,
  author       = {Charalampos S. Stamatellis and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Sokratis K. Katsikas and
                  William J. Buchanan},
  title        = {A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric},
  journal      = {CoRR},
  volume       = {abs/2011.09260},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.09260},
  eprinttype    = {arXiv},
  eprint       = {2011.09260},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-09260.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KavallieratosCK19,
  author       = {Georgios Kavallieratos and
                  Nabin Chowdhury and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos and
                  Stephen D. Wolthusen},
  title        = {Threat Analysis for Smart Homes},
  journal      = {Future Internet},
  volume       = {11},
  number       = {10},
  pages        = {207},
  year         = {2019},
  url          = {https://doi.org/10.3390/fi11100207},
  doi          = {10.3390/FI11100207},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/KavallieratosCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AnastopoulosK19,
  author       = {Vasileios Anastopoulos and
                  Sokratis K. Katsikas},
  title        = {A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {19},
  pages        = {e2},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.25-1-2019.159347},
  doi          = {10.4108/EAI.25-1-2019.159347},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AnastopoulosK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/KavallieratosKG19,
  author       = {Georgios Kavallieratos and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  title        = {Towards a Cyber-Physical Range},
  booktitle    = {Proceedings of the 5th {ACM} on Cyber-Physical System Security Workshop,
                  CPSS@AsiaCCS 2019, Auckland, New Zealand, 8 July 2019},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327961.3329532},
  doi          = {10.1145/3327961.3329532},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/KavallieratosKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/AssenzaCFGGHHIK19,
  author       = {Giacomo Assenza and
                  Valerio Cozzani and
                  Francesco Flammini and
                  Nadezhda Gotcheva and
                  Tommy Gustafsson and
                  Anders Hansson and
                  Jouko Heikkil{\"{a}} and
                  Matteo Iaiani and
                  Sokratis K. Katsikas and
                  Minna Nissil{\"{a}} and
                  Gabriele Oliva and
                  Eleni Richter and
                  Maaike Roelofs and
                  Mehdi Saman Azari and
                  Roberto Setola and
                  Wouter Stejin and
                  Alessandro Tugnoli and
                  Dolf Vanderbeek and
                  Lars Westerdahl and
                  Marja Yl{\"{o}}nen and
                  Heather Young},
  editor       = {Simin Nadjm{-}Tehrani},
  title        = {White Paper on Industry Experiences in Critical Information Infrastructure
                  Security: {A} Special Session at {CRITIS} 2019},
  booktitle    = {Critical Information Infrastructures Security - 14th International
                  Conference, {CRITIS} 2019, Link{\"{o}}ping, Sweden, September
                  23-25, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11777},
  pages        = {197--207},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37670-3\_18},
  doi          = {10.1007/978-3-030-37670-3\_18},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/critis/AssenzaCFGGHHIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/KavallieratosGK19,
  author       = {Georgios Kavallieratos and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {Threat Analysis in Dynamic Environments: The Case of the Smart Home},
  booktitle    = {15th International Conference on Distributed Computing in Sensor Systems,
                  {DCOSS} 2019, Santorini, Greece, May 29-31, 2019},
  pages        = {234--240},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DCOSS.2019.00060},
  doi          = {10.1109/DCOSS.2019.00060},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dcoss/KavallieratosGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AmroGK19,
  author       = {Ahmed Amro and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Connect and Protect: Requirements for Maritime Autonomous Surface
                  Ship in Urban Passenger Transportation},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  pages        = {69--85},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42048-2\_5},
  doi          = {10.1007/978-3-030-42048-2\_5},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AmroGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seeda/SpathoulasEAMK19,
  author       = {Georgios P. Spathoulas and
                  Spyridon C. Evangelatos and
                  Marios Anagnostopoulos and
                  G. Mema and
                  Sokratis K. Katsikas},
  title        = {Detection of abnormal behavior in smart-home environments},
  booktitle    = {4th South-East Europe Design Automation, Computer Engineering, Computer
                  Networks and Social Media Conference, {SEEDA-CECNSM} 2019, Piraeus,
                  Greece, September 20-22, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SEEDA-CECNSM.2019.8908352},
  doi          = {10.1109/SEEDA-CECNSM.2019.8908352},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seeda/SpathoulasEAMK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/MalamasDKBK19,
  author       = {Vangelis Malamas and
                  Thomas K. Dasaklis and
                  Panayiotis Kotzanikolaou and
                  Mike Burmester and
                  Sokratis K. Katsikas},
  editor       = {Carl K. Chang and
                  Peter Chen and
                  Michael Goul and
                  Katsunori Oyama and
                  Stephan Reiff{-}Marganiec and
                  Yanchun Sun and
                  Shangguang Wang and
                  Zhongjie Wang},
  title        = {A Forensics-by-Design Management Framework for Medical Devices Based
                  on Blockchain},
  booktitle    = {2019 {IEEE} World Congress on Services, {SERVICES} 2019, Milan, Italy,
                  July 8-13, 2019},
  pages        = {35--40},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SERVICES.2019.00021},
  doi          = {10.1109/SERVICES.2019.00021},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/services/MalamasDKBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SpathoulasK19,
  author       = {Georgios P. Spathoulas and
                  Sokratis K. Katsikas},
  editor       = {Cristina Alcaraz},
  title        = {Towards a Secure Industrial Internet of Things},
  booktitle    = {Security and Privacy Trends in the Industrial Internet of Things},
  pages        = {29--45},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12330-7\_2},
  doi          = {10.1007/978-3-030-12330-7\_2},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SpathoulasK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  John Mylopoulos and
                  Christos Kalloniatis},
  title        = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS
                  2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11387},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12786-2},
  doi          = {10.1007/978-3-030-12786-2},
  isbn         = {978-3-030-12785-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2018cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2019,
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Sokratis K. Katsikas and
                  Gabriele Anderst{-}Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Trust, Privacy and Security in Digital Business - 16th International
                  Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11711},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27813-7},
  doi          = {10.1007/978-3-030-27813-7},
  isbn         = {978-3-030-27812-0},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MichotaK18,
  author       = {Alexandra K. Michota and
                  Sokratis K. Katsikas},
  title        = {Towards improving existing online social networks' privacy policies},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {209--229},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013220},
  doi          = {10.1504/IJIPSI.2018.10013220},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MichotaK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KavallieratosKG18,
  author       = {Georgios Kavallieratos and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  John Mylopoulos and
                  Christos Kalloniatis},
  title        = {Cyber-Attacks Against the Autonomous Ship},
  booktitle    = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS
                  2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11387},
  pages        = {20--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12786-2\_2},
  doi          = {10.1007/978-3-030-12786-2\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KavallieratosKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocybersec/CollenNAKGSGVTG18,
  author       = {Anastasija Collen and
                  Niels A. Nijdam and
                  Javier Augusto{-}Gonzalez and
                  Sokratis K. Katsikas and
                  Konstantinos M. Giannoutakis and
                  Georgios P. Spathoulas and
                  Erol Gelenbe and
                  Konstantinos Votis and
                  Dimitrios Tzovaras and
                  Navid Ghavami and
                  Melanie Volkamer and
                  Piroska Haller and
                  Alvaro S{\'{a}}nchez and
                  Miltiadis Dimas},
  editor       = {Erol Gelenbe and
                  Paolo Campegiani and
                  Tadeusz Czach{\'{o}}rski and
                  Sokratis K. Katsikas and
                  Ioannis Komnios and
                  Luigi Romano and
                  Dimitrios Tzovaras},
  title        = {{GHOST} - Safe-Guarding Home IoT Environments with Personalised Real-Time
                  Risk Control},
  booktitle    = {Security in Computer and Information Sciences - First International
                  {ISCIS} Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February
                  26-27, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {821},
  pages        = {68--78},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95189-8\_7},
  doi          = {10.1007/978-3-319-95189-8\_7},
  timestamp    = {Tue, 26 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocybersec/CollenNAKGSGVTG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocybersec/KouzinopoulosSG18,
  author       = {Charalampos S. Kouzinopoulos and
                  Georgios P. Spathoulas and
                  Konstantinos M. Giannoutakis and
                  Konstantinos Votis and
                  Pankaj Pandey and
                  Dimitrios Tzovaras and
                  Sokratis K. Katsikas and
                  Anastasija Collen and
                  Niels A. Nijdam},
  editor       = {Erol Gelenbe and
                  Paolo Campegiani and
                  Tadeusz Czach{\'{o}}rski and
                  Sokratis K. Katsikas and
                  Ioannis Komnios and
                  Luigi Romano and
                  Dimitrios Tzovaras},
  title        = {Using Blockchains to Strengthen the Security of Internet of Things},
  booktitle    = {Security in Computer and Information Sciences - First International
                  {ISCIS} Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February
                  26-27, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {821},
  pages        = {90--100},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95189-8\_9},
  doi          = {10.1007/978-3-319-95189-8\_9},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocybersec/KouzinopoulosSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inista/KouzinopoulosGV18,
  author       = {Charalampos S. Kouzinopoulos and
                  Konstantinos M. Giannoutakis and
                  Konstantinos Votis and
                  Dimitrios Tzovaras and
                  Anastasija Collen and
                  Niels A. Nijdam and
                  Dimitri Konstantas and
                  Georgios P. Spathoulas and
                  Pankaj Pandey and
                  Sokratis K. Katsikas},
  title        = {Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain
                  to promote user trust},
  booktitle    = {2018 Innovations in Intelligent Systems and Applications, {INISTA}
                  2018, Thessaloniki, Greece, July 3-5, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INISTA.2018.8466268},
  doi          = {10.1109/INISTA.2018.8466268},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/inista/KouzinopoulosGV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inista/SpathoulasCPNKK18,
  author       = {Georgios P. Spathoulas and
                  Anastasija Collen and
                  Pankaj Pandey and
                  Niels A. Nijdam and
                  Sokratis K. Katsikas and
                  Charalampos S. Kouzinopoulos and
                  Maher Ben Moussa and
                  Konstantinos M. Giannoutakis and
                  Konstantinos Votis and
                  Dimitrios Tzovaras},
  title        = {Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in
                  {GHOST} Smart Contracts},
  booktitle    = {2018 Innovations in Intelligent Systems and Applications, {INISTA}
                  2018, Thessaloniki, Greece, July 3-5, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INISTA.2018.8466327},
  doi          = {10.1109/INISTA.2018.8466327},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/inista/SpathoulasCPNKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inista/TsolakisMVITPKK18,
  author       = {Apostolos C. Tsolakis and
                  Ioannis Moschos and
                  Konstantinos Votis and
                  Dimosthenis Ioannidis and
                  Dimitrios Tzovaras and
                  Pankaj Pandey and
                  Sokratis K. Katsikas and
                  Evangelos Kotsakis and
                  Ra{\'{u}}l Garc{\'{\i}}a{-}Castro},
  title        = {A Secured and Trusted Demand Response system based on Blockchain technologies},
  booktitle    = {2018 Innovations in Intelligent Systems and Applications, {INISTA}
                  2018, Thessaloniki, Greece, July 3-5, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INISTA.2018.8466303},
  doi          = {10.1109/INISTA.2018.8466303},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/inista/TsolakisMVITPKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/AnastopoulosK18,
  author       = {Vasileios Anastopoulos and
                  Sokratis K. Katsikas},
  editor       = {Nikitas N. Karanikolas and
                  Basilis Mamalis and
                  John Kontos and
                  Grammati E. Pantziou and
                  Stefanos Gritzalis and
                  Christos Douligeris},
  title        = {Design of a dynamic log management infrastructure using risk and affiliation
                  network analysis},
  booktitle    = {Proceedings of the 22nd Pan-Hellenic Conference on Informatics, {PCI}
                  2018, Athens, Greece, November 29 - December 01, 2018},
  pages        = {52--57},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3291533.3291570},
  doi          = {10.1145/3291533.3291570},
  timestamp    = {Wed, 09 Jan 2019 11:35:09 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/AnastopoulosK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-72817-9},
  doi          = {10.1007/978-3-319-72817-9},
  isbn         = {978-3-319-72816-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2017cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocybersec/2018,
  editor       = {Erol Gelenbe and
                  Paolo Campegiani and
                  Tadeusz Czach{\'{o}}rski and
                  Sokratis K. Katsikas and
                  Ioannis Komnios and
                  Luigi Romano and
                  Dimitrios Tzovaras},
  title        = {Security in Computer and Information Sciences - First International
                  {ISCIS} Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February
                  26-27, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {821},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95189-8},
  doi          = {10.1007/978-3-319-95189-8},
  isbn         = {978-3-319-95188-1},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocybersec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2018,
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3},
  doi          = {10.1007/978-3-030-01141-3},
  isbn         = {978-3-030-01140-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PatelAPBJK17,
  author       = {Ahmed Patel and
                  Hitham Alhussian and
                  Jens Myrup Pedersen and
                  Bouchaib Bounabat and
                  Joaquim Celestino J{\'{u}}nior and
                  Sokratis K. Katsikas},
  title        = {A nifty collaborative intrusion detection and prevention architecture
                  for Smart Grid ecosystems},
  journal      = {Comput. Secur.},
  volume       = {64},
  pages        = {92--109},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.07.002},
  doi          = {10.1016/J.COSE.2016.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PatelAPBJK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OppligerPK17,
  author       = {Rolf Oppliger and
                  G{\"{u}}nther Pernul and
                  Sokratis K. Katsikas},
  title        = {New Frontiers: Assessing and Managing Security Risks},
  journal      = {Computer},
  volume       = {50},
  number       = {4},
  pages        = {48--51},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.93},
  doi          = {10.1109/MC.2017.93},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/OppligerPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/GkioulosWK17,
  author       = {Vasileios Gkioulos and
                  Gaute Wangen and
                  Sokratis K. Katsikas},
  title        = {User Modelling Validation over the Security Awareness of Digital Natives},
  journal      = {Future Internet},
  volume       = {9},
  number       = {3},
  pages        = {32},
  year         = {2017},
  url          = {https://doi.org/10.3390/fi9030032},
  doi          = {10.3390/FI9030032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/GkioulosWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/GkioulosWKKK17,
  author       = {Vasileios Gkioulos and
                  Gaute Wangen and
                  Sokratis K. Katsikas and
                  George K. Karagiannidis and
                  Panayiotis Kotzanikolaou},
  title        = {Security Awareness of the Digital Natives},
  journal      = {Inf.},
  volume       = {8},
  number       = {2},
  pages        = {42},
  year         = {2017},
  url          = {https://doi.org/10.3390/info8020042},
  doi          = {10.3390/INFO8020042},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/GkioulosWKKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnastopoulosK17,
  author       = {Vasileios Anastopoulos and
                  Sokratis K. Katsikas},
  title        = {A structured methodology for deploying log management in WANs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {34},
  pages        = {120--132},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2017.02.004},
  doi          = {10.1016/J.JISA.2017.02.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AnastopoulosK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Katsikas17,
  author       = {Sokratis K. Katsikas},
  editor       = {Jianying Zhou and
                  Ernesto Damiani},
  title        = {Cyber Security of the Autonomous Ship},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  pages        = {55--56},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055186.3055191},
  doi          = {10.1145/3055186.3055191},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Katsikas17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/MichotaK17,
  author       = {Alexandra K. Michota and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Vasilios Zorkadis},
  title        = {Default {OSN} Privacy Settings: Privacy Risks},
  booktitle    = {E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government
                  Services - 7th International Conference, E-Democracy 2017, Athens,
                  Greece, December 14-15, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {792},
  pages        = {64--78},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71117-1\_5},
  doi          = {10.1007/978-3-319-71117-1\_5},
  timestamp    = {Mon, 30 Jul 2018 16:44:51 +0200},
  biburl       = {https://dblp.org/rec/conf/edemocracy/MichotaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edemocracy/2017,
  editor       = {Sokratis K. Katsikas and
                  Vasilios Zorkadis},
  title        = {E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government
                  Services - 7th International Conference, E-Democracy 2017, Athens,
                  Greece, December 14-15, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {792},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71117-1},
  doi          = {10.1007/978-3-319-71117-1},
  isbn         = {978-3-319-71116-4},
  timestamp    = {Mon, 30 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edemocracy/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016cybericps,
  editor       = {Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas},
  title        = {Security of Industrial Control Systems and Cyber-Physical Systems
                  - Second International Workshop, CyberICPS 2016, Heraklion, Crete,
                  Greece, September 26-30, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10166},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61437-3},
  doi          = {10.1007/978-3-319-61437-3},
  isbn         = {978-3-319-61436-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2016cybericps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AnastopoulosK16,
  author       = {Vasileios Anastopoulos and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Steven Furnell},
  title        = {Design of a Log Management Infrastructure Using Meta-Network Analysis},
  booktitle    = {Trust, Privacy and Security in Digital Business - 13th International
                  Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9830},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44341-6\_7},
  doi          = {10.1007/978-3-319-44341-6\_7},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/AnastopoulosK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015cyberics,
  editor       = {Adrien B{\'{e}}cue and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas and
                  Costas Lambrinoudakis},
  title        = {Security of Industrial Control Systems and Cyber Physical Systems
                  - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015,
                  Vienna, Austria, September 21-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9588},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40385-4},
  doi          = {10.1007/978-3-319-40385-4},
  isbn         = {978-3-319-40384-7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2015cyberics.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-1,
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4},
  doi          = {10.1007/978-3-319-45744-4},
  isbn         = {978-3-319-45743-7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-2,
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3},
  doi          = {10.1007/978-3-319-45741-3},
  isbn         = {978-3-319-45740-6},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2016,
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Steven Furnell},
  title        = {Trust, Privacy and Security in Digital Business - 13th International
                  Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9830},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44341-6},
  doi          = {10.1007/978-3-319-44341-6},
  isbn         = {978-3-319-44340-9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/MichotaK15,
  author       = {Alexandra K. Michota and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Alexander B. Sideridis},
  title        = {Tagged Data Breaches in Online Social Networks},
  booktitle    = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
                  - 6th International Conference, E-Democracy 2015, Athens, Greece,
                  December 10-11, 2015, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {570},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27164-4\_7},
  doi          = {10.1007/978-3-319-27164-4\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edemocracy/MichotaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/MichotaK15,
  author       = {Alexandra K. Michota and
                  Sokratis K. Katsikas},
  editor       = {Nikitas N. Karanikolas and
                  Demosthenes Akoumianakis and
                  Mara Nikolaidou and
                  Dimitrios D. Vergados and
                  Michalis Xenos and
                  George M. Giaglis and
                  Stefanos Gritzalis and
                  Lazaros F. Merakos and
                  Panagiotis Tsanakas and
                  Cleo Sgouropoulou},
  title        = {Designing a seamless privacy policy for social networks},
  booktitle    = {Proceedings of the 19th Panhellenic Conference on Informatics, {PCI}
                  2015, Athens, Greece, October 1-3, 2015},
  pages        = {139--143},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2801948.2801998},
  doi          = {10.1145/2801948.2801998},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/MichotaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/DarraSK15,
  author       = {Eleni Darra and
                  Christina Skouloudi and
                  Sokratis K. Katsikas},
  editor       = {Nikitas N. Karanikolas and
                  Demosthenes Akoumianakis and
                  Mara Nikolaidou and
                  Dimitrios D. Vergados and
                  Michalis Xenos and
                  George M. Giaglis and
                  Stefanos Gritzalis and
                  Lazaros F. Merakos and
                  Panagiotis Tsanakas and
                  Cleo Sgouropoulou},
  title        = {A simulation platform for evaluating DoS attacks in wireless sensor
                  networks},
  booktitle    = {Proceedings of the 19th Panhellenic Conference on Informatics, {PCI}
                  2015, Athens, Greece, October 1-3, 2015},
  pages        = {144--149},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2801948.2801949},
  doi          = {10.1145/2801948.2801949},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/DarraSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edemocracy/2015,
  editor       = {Sokratis K. Katsikas and
                  Alexander B. Sideridis},
  title        = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
                  - 6th International Conference, E-Democracy 2015, Athens, Greece,
                  December 10-11, 2015, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {570},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27164-4},
  doi          = {10.1007/978-3-319-27164-4},
  isbn         = {978-3-319-27163-7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edemocracy/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalt/Katsikas14,
  author       = {Sokratis K. Katsikas},
  title        = {National Policy on Technology Supported Education in Greece},
  booktitle    = {{IEEE} 14th International Conference on Advanced Learning Technologies,
                  {ICALT} 2014, Athens, Greece, July 7-10, 2014},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICALT.2014.8},
  doi          = {10.1109/ICALT.2014.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalt/Katsikas14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/AnastopoulosK14,
  author       = {Vasileios Anastopoulos and
                  Sokratis K. Katsikas},
  title        = {A methodology for building a log management infrastructure},
  booktitle    = {2014 {IEEE} International Symposium on Signal Processing and Information
                  Technology, {ISSPIT} 2014, Noida, India, December 15-17, 2014},
  pages        = {301--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSPIT.2014.7300604},
  doi          = {10.1109/ISSPIT.2014.7300604},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/AnastopoulosK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/MichotaK14,
  author       = {Alexandra K. Michota and
                  Sokratis K. Katsikas},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {Compliance of the Facebook Data Use Policy with the Principles of
                  {ISO} 29100: 2011},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814012},
  doi          = {10.1109/NTMS.2014.6814012},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/MichotaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/KoutsourelisK14,
  author       = {Dimitrios Koutsourelis and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Michael Hatzopoulos and
                  Theodoros Apostolopoulos and
                  Dimosthenis Anagnostopoulos and
                  Elias Carayiannis and
                  Theodora A. Varvarigou and
                  Mara Nikolaidou},
  title        = {Designing and developing a free Data Loss Prevention system},
  booktitle    = {18th Panhellenic Conference on Informatics, {PCI} '14, Athens, Greece,
                  October 2-4, 2014},
  pages        = {14:1--14:5},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2645791.2645833},
  doi          = {10.1145/2645791.2645833},
  timestamp    = {Tue, 06 Nov 2018 11:06:43 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/KoutsourelisK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/TasiopoulosK14,
  author       = {Vasilis G. Tasiopoulos and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Michael Hatzopoulos and
                  Theodoros Apostolopoulos and
                  Dimosthenis Anagnostopoulos and
                  Elias Carayiannis and
                  Theodora A. Varvarigou and
                  Mara Nikolaidou},
  title        = {Bypassing Antivirus Detection with Encryption},
  booktitle    = {18th Panhellenic Conference on Informatics, {PCI} '14, Athens, Greece,
                  October 2-4, 2014},
  pages        = {16:1--16:2},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2645791.2645857},
  doi          = {10.1145/2645791.2645857},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/TasiopoulosK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/MichotaK14,
  author       = {Alexandra K. Michota and
                  Sokratis K. Katsikas},
  editor       = {Boualem Benatallah and
                  Azer Bestavros and
                  Barbara Catania and
                  Armin Haller and
                  Yannis Manolopoulos and
                  Athena Vakali and
                  Yanchun Zhang},
  title        = {Compliance of the LinkedIn Privacy Policy with the Principles of the
                  {ISO} 29100: 2011 Standard},
  booktitle    = {Web Information Systems Engineering - {WISE} 2014 Workshops - 15th
                  International Workshops {IWCSN} 2014, Org2 2014, {PCS} 2014, and {QUAT}
                  2014, Thessaloniki, Greece, October 12-14, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9051},
  pages        = {72--83},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-20370-6\_6},
  doi          = {10.1007/978-3-319-20370-6\_6},
  timestamp    = {Sun, 02 Jun 2019 21:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/MichotaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2013,
  editor       = {Sokratis K. Katsikas and
                  Isaac Agudo},
  title        = {Public Key Infrastructures, Services and Applications - 10th European
                  Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8341},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-53997-8},
  doi          = {10.1007/978-3-642-53997-8},
  isbn         = {978-3-642-53996-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pci/2014,
  editor       = {Sokratis K. Katsikas and
                  Michael Hatzopoulos and
                  Theodoros Apostolopoulos and
                  Dimosthenis Anagnostopoulos and
                  Elias Carayiannis and
                  Theodora A. Varvarigou and
                  Mara Nikolaidou},
  title        = {18th Panhellenic Conference on Informatics, {PCI} '14, Athens, Greece,
                  October 2-4, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2645791},
  doi          = {10.1145/2645791},
  isbn         = {978-1-4503-2897-5},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2014,
  editor       = {Claudia Eckert and
                  Sokratis K. Katsikas and
                  G{\"{u}}nther Pernul},
  title        = {Trust, Privacy, and Security in Digital Business - 11th International
                  Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8647},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09770-1},
  doi          = {10.1007/978-3-319-09770-1},
  isbn         = {978-3-319-09769-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpathoulasK13,
  author       = {Georgios P. Spathoulas and
                  Sokratis K. Katsikas},
  title        = {Enhancing {IDS} performance through comprehensive alert post-processing},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {176--196},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.03.005},
  doi          = {10.1016/J.COSE.2013.03.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpathoulasK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/SpathoulasKC13,
  author       = {Georgios P. Spathoulas and
                  Sokratis K. Katsikas and
                  Anastasios Charoulis},
  editor       = {Sokratis K. Katsikas and
                  Isaac Agudo},
  title        = {A Test-Bed for Intrusion Detection Systems Results Post-processing},
  booktitle    = {Public Key Infrastructures, Services and Applications - 10th European
                  Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8341},
  pages        = {170--183},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-53997-8\_11},
  doi          = {10.1007/978-3-642-53997-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/SpathoulasKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KantzavelouK13,
  author       = {Ioanna Kantzavelou and
                  Sokratis K. Katsikas},
  editor       = {Sokratis K. Katsikas and
                  Isaac Agudo},
  title        = {Uncertainty in Intrusion Detection Signaling Games},
  booktitle    = {Public Key Infrastructures, Services and Applications - 10th European
                  Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8341},
  pages        = {184--203},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-53997-8\_12},
  doi          = {10.1007/978-3-642-53997-8\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europki/KantzavelouK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iisa/DarraK13,
  author       = {Eleni Darra and
                  Sokratis K. Katsikas},
  editor       = {Nikolaos G. Bourbakis and
                  George A. Tsihrintzis and
                  Maria Virvou},
  title        = {Attack detection capabilities of intrusion detection systems for Wireless
                  Sensor Networks},
  booktitle    = {4th International Conference on Information, Intelligence, Systems
                  and Applications, {IISA} 2013, Piraeus, Greece, July 10-12, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IISA.2013.6623718},
  doi          = {10.1109/IISA.2013.6623718},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iisa/DarraK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/petra/KantzavelouTK13,
  author       = {Ioanna Kantzavelou and
                  Panagiotis F. Tzikopoulos and
                  Sokratis K. Katsikas},
  editor       = {Fillia Makedon and
                  Margrit Betke and
                  Magy Seif El{-}Nasr and
                  Ilias Maglogiannis},
  title        = {Detecting intrusive activities from insiders in a wireless sensor
                  network using game theory},
  booktitle    = {The 6th International Conference on PErvasive Technologies Related
                  to Assistive Environments, {PETRA} '13, Island of Rhodes, Greece,
                  May 29-31, 2013},
  pages        = {15:1--15:8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2504335.2504350},
  doi          = {10.1145/2504335.2504350},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/petra/KantzavelouTK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AggelinosK13,
  author       = {George Aggelinos and
                  Sokratis K. Katsikas},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {The Security of Information Systems in Greek Hospitals},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 10th International
                  Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8058},
  pages        = {112--123},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40343-9\_10},
  doi          = {10.1007/978-3-642-40343-9\_10},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/AggelinosK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/med/Katsikas13,
  author       = {Sokratis K. Katsikas},
  editor       = {Borko Furht and
                  Ankur Agarwal},
  title        = {Security of the Electronic Medical Record},
  booktitle    = {Handbook of Medical and Healthcare Technologies},
  pages        = {401--416},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-8495-0\_18},
  doi          = {10.1007/978-1-4614-8495-0\_18},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/med/Katsikas13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/AggelinosK12,
  author       = {George Aggelinos and
                  Sokratis K. Katsikas},
  title        = {Disaster Recovery Analysis and Management Method {(DRAMM):} An {IT}
                  Management Tool},
  booktitle    = {16th Panhellenic Conference on Informatics, {PCI} 2012, Piraeus, Greece,
                  October 5-7, 2012},
  pages        = {99--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PCi.2012.56},
  doi          = {10.1109/PCI.2012.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/AggelinosK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2012,
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Sokratis K. Katsikas and
                  Gerald Quirchmayr},
  title        = {Trust, Privacy and Security in Digital Business - 9th International
                  Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7449},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32287-7},
  doi          = {10.1007/978-3-642-32287-7},
  isbn         = {978-3-642-32286-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AggelinosK11,
  author       = {George Aggelinos and
                  Sokratis K. Katsikas},
  title        = {Enhancing {SSADM} with Disaster Recovery Plan activities},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {248--261},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111173067},
  doi          = {10.1108/09685221111173067},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AggelinosK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/DarraNXK11,
  author       = {Eleni Darra and
                  Christoforos Ntantogian and
                  Christos Xenakis and
                  Sokratis K. Katsikas},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {A Mobility and Energy-Aware Hierarchical Intrusion Detection System
                  for Mobile Ad Hoc Networks},
  booktitle    = {Trust, Privacy and Security in Digital Business - 8th International
                  Conference, TrustBus 2011, Toulouse, France, August 29 - September
                  2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6863},
  pages        = {138--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22890-2\_12},
  doi          = {10.1007/978-3-642-22890-2\_12},
  timestamp    = {Mon, 03 Jan 2022 22:15:13 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/DarraNXK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpathoulasK10,
  author       = {Georgios P. Spathoulas and
                  Sokratis K. Katsikas},
  title        = {Reducing false positives in intrusion detection systems},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {35--44},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.008},
  doi          = {10.1016/J.COSE.2009.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpathoulasK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KantzavelouK10,
  author       = {Ioanna Kantzavelou and
                  Sokratis K. Katsikas},
  title        = {A game-based intrusion detection mechanism to confront internal attackers},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {859--874},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.06.002},
  doi          = {10.1016/J.COSE.2010.06.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KantzavelouK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2010,
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {SciTePress},
  year         = {2010},
  isbn         = {978-989-8425-18-8},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2010,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Miguel Soriano},
  title        = {Trust, Privacy and Security in Digital Business, 7th International
                  Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6264},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15152-1},
  doi          = {10.1007/978-3-642-15152-1},
  isbn         = {978-3-642-15151-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisK09,
  author       = {Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {247},
  year         = {2009},
  url          = {https://doi.org/10.1016/S0167-4048(09)00038-8},
  doi          = {10.1016/S0167-4048(09)00038-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ems/KostisGGK09,
  author       = {Theodoros G. Kostis and
                  Athanasios K. Goudosis and
                  Konstantinos G. Galanis and
                  Sokratis K. Katsikas},
  editor       = {David Al{-}Dabass and
                  Sokratis K. Katsikas and
                  Ioannis Koukos and
                  Richard N. Zobel},
  title        = {Applying Simulator-Defined Radar Countermeasure Systems Techniques
                  to Computer Network Security Issues},
  booktitle    = {{EMS} 2009, Third UKSim European Symposium on Computer Modeling and
                  Simulation, 25-27 November 2009, Athens, Greece},
  pages        = {130--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/EMS.2009.23},
  doi          = {10.1109/EMS.2009.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ems/KostisGGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcis/AggelinosK09,
  author       = {George Aggelinos and
                  Sokratis K. Katsikas},
  editor       = {Angeliki Poulymenakou and
                  Nancy Pouloudi and
                  Katerina Pramatari},
  title        = {Integrating Disaster Recovery Plan Activities Into The System Development
                  Life Cycle},
  booktitle    = {The 4th Mediterranean Conference on Information Systems, {MCIS} 2009,
                  Athens University of Economics and Business, AUEB, Athens, Greece,
                  25-27 September 2009},
  pages        = {76},
  publisher    = {Athens University of Economics and Business / AISeL},
  year         = {2009},
  url          = {http://aisel.aisnet.org/mcis2009/76},
  timestamp    = {Tue, 19 Nov 2013 18:10:36 +0100},
  biburl       = {https://dblp.org/rec/conf/mcis/AggelinosK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ems/2009,
  editor       = {David Al{-}Dabass and
                  Sokratis K. Katsikas and
                  Ioannis Koukos and
                  Richard N. Zobel},
  title        = {{EMS} 2009, Third UKSim European Symposium on Computer Modeling and
                  Simulation, 25-27 November 2009, Athens, Greece},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5358680/proceeding},
  isbn         = {978-0-7695-3886-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ems/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BalopoulosGK08,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Specifying and implementing privacy-preserving cryptographic protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {395--420},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0057-y},
  doi          = {10.1007/S10207-008-0057-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BalopoulosGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmic/PappasMK08,
  author       = {Stylianos Sp. Pappas and
                  Vassilios C. Moussas and
                  Sokratis K. Katsikas},
  title        = {Application of the multi-model partitioning theory for simultaneous
                  order and parameter estimation of multivariate {ARMA} models},
  journal      = {Int. J. Model. Identif. Control.},
  volume       = {4},
  number       = {3},
  pages        = {242--249},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJMIC.2008.021161},
  doi          = {10.1504/IJMIC.2008.021161},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmic/PappasMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/PappasEKKL08,
  author       = {Stylianos Sp. Pappas and
                  Lambros Ekonomou and
                  Panagiotis Karampelas and
                  Sokratis K. Katsikas and
                  Panos Liatsis},
  title        = {Modeling of the grounding resistance variation using {ARMA} models},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {16},
  number       = {5},
  pages        = {560--570},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.simpat.2008.02.009},
  doi          = {10.1016/J.SIMPAT.2008.02.009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/PappasEKKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YannacopoulosLGXK08,
  author       = {Athanasios N. Yannacopoulos and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis and
                  Stylianos Z. Xanthopoulos and
                  Sokratis K. Katsikas},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Modeling Privacy Insurance Contracts and Their Utilization in Risk
                  Management for {ICT} Firms},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_14},
  doi          = {10.1007/978-3-540-88313-5\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YannacopoulosLGXK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/MichailidisKG08,
  author       = {Emmanuel S. Michailidis and
                  Sokratis K. Katsikas and
                  Efstratios F. Georgopoulos},
  title        = {Intrusion Detection Using Evolutionary Neural Networks},
  booktitle    = {Panhellenic Conference on Informatics, {PCI} 2008, August 28-30, 2008,
                  Samos Island, Greece, Proceedings},
  pages        = {8--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PCI.2008.53},
  doi          = {10.1109/PCI.2008.53},
  timestamp    = {Sat, 30 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/MichailidisKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/PappasHKEK08,
  author       = {Stylianos Sp. Pappas and
                  Nicholas Harkiolakis and
                  Panagiotis Karampelas and
                  Lambros Ekonomou and
                  Sokratis K. Katsikas},
  title        = {A New Algorithm for On-Line Multivariate {ARMA} Identification Using
                  Multimodel Partitioning Theory},
  booktitle    = {Panhellenic Conference on Informatics, {PCI} 2008, August 28-30, 2008,
                  Samos Island, Greece, Proceedings},
  pages        = {222--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PCI.2008.24},
  doi          = {10.1109/PCI.2008.24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/PappasHKEK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KantzavelouK08,
  author       = {Ioanna Kantzavelou and
                  Sokratis K. Katsikas},
  editor       = {Steven Furnell and
                  Sokratis K. Katsikas and
                  Antonio Lioy},
  title        = {A Generic Intrusion Detection Game Model in {IT} Security},
  booktitle    = {Trust, Privacy and Security in Digital Business, 5th International
                  Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5185},
  pages        = {151--162},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85735-8\_15},
  doi          = {10.1007/978-3-540-85735-8\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/KantzavelouK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2008,
  editor       = {Stig Fr. Mj{\o}lsnes and
                  Sjouke Mauw and
                  Sokratis K. Katsikas},
  title        = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5057},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69485-4},
  doi          = {10.1007/978-3-540-69485-4},
  isbn         = {978-3-540-69484-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2008,
  editor       = {Steven Furnell and
                  Sokratis K. Katsikas and
                  Antonio Lioy},
  title        = {Trust, Privacy and Security in Digital Business, 5th International
                  Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5185},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85735-8},
  doi          = {10.1007/978-3-540-85735-8},
  isbn         = {978-3-540-85734-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GritzalisYLHK07,
  author       = {Stefanos Gritzalis and
                  Athanasios N. Yannacopoulos and
                  Costas Lambrinoudakis and
                  Petros Hatzopoulos and
                  Sokratis K. Katsikas},
  title        = {A probabilistic model for optimal insurance contracts against security
                  risks and privacy violation in {IT} outsourcing environments},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {4},
  pages        = {197--211},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0010-x},
  doi          = {10.1007/S10207-006-0010-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GritzalisYLHK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PernulMFKKO07,
  author       = {G{\"{u}}nther Pernul and
                  Marco Casassa Mont and
                  Eduardo B. Fern{\'{a}}ndez and
                  Sokratis K. Katsikas and
                  Alfred Kobsa and
                  Rolf Oppliger},
  editor       = {Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  title        = {Panel Discussion: Managing Digital Identities - Challenges and Opportunities},
  booktitle    = {Trust, Privacy and Security in Digital Business, 4th International
                  Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4657},
  pages        = {2},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74409-2\_2},
  doi          = {10.1007/978-3-540-74409-2\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/PernulMFKKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/PappasLK06,
  author       = {Stylianos Sp. Pappas and
                  Assimakis K. Leros and
                  Sokratis K. Katsikas},
  title        = {Joint order and parameter estimation of multivariate autoregressive
                  models using multi-model partitioning theory},
  journal      = {Digit. Signal Process.},
  volume       = {16},
  number       = {6},
  pages        = {782--795},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.dsp.2006.06.006},
  doi          = {10.1016/J.DSP.2006.06.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/PappasLK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DelivasilisK06,
  author       = {Dimitrios L. Delivasilis and
                  Sokratis K. Katsikas},
  title        = {Side Channel Analysis on Biometric-based Key Generation Algorithms
                  on Resource Constrained Devices},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {44--50},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n1/ijns-2006-v3-n1-p44-50.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DelivasilisK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/FrantzeskouSGK06,
  author       = {Georgia Frantzeskou and
                  Efstathios Stamatatos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Leon J. Osterweil and
                  H. Dieter Rombach and
                  Mary Lou Soffa},
  title        = {Effective identification of source code authors using byte-level information},
  booktitle    = {28th International Conference on Software Engineering {(ICSE} 2006),
                  Shanghai, China, May 20-28, 2006},
  pages        = {893--896},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134285.1134445},
  doi          = {10.1145/1134285.1134445},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/FrantzeskouSGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/BelsisGK06,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Ilias Maglogiannis and
                  Kostas Karpouzis and
                  Max Bramer},
  title        = {Optimized Multi-Domain Secure Interoperation using Soft Constraints},
  booktitle    = {Artificial Intelligence Applications and Innovations, 3rd {IFIP} Conference
                  on Artificial Intelligence Applications and Innovations {(AIAI)} 2006,
                  June 7-9, 2006, Athens, Greece},
  series       = {{IFIP}},
  volume       = {204},
  pages        = {78--85},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-34224-9\_10},
  doi          = {10.1007/0-387-34224-9\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/BelsisGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/FrantzeskouSGK06,
  author       = {Georgia Frantzeskou and
                  Efstathios Stamatatos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Ilias Maglogiannis and
                  Kostas Karpouzis and
                  Max Bramer},
  title        = {Source Code Author Identification Based on N-gram Author Profiles},
  booktitle    = {Artificial Intelligence Applications and Innovations, 3rd {IFIP} Conference
                  on Artificial Intelligence Applications and Innovations {(AIAI)} 2006,
                  June 7-9, 2006, Athens, Greece},
  series       = {{IFIP}},
  volume       = {204},
  pages        = {508--515},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-34224-9\_59},
  doi          = {10.1007/0-387-34224-9\_59},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/FrantzeskouSGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BalopoulosGKKGK06,
  author       = {Theodoros Balopoulos and
                  Lazaros Gymnopoulos and
                  Maria Karyda and
                  Spyros Kokolakis and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Steven Furnell and
                  Costas Lambrinoudakis},
  title        = {A Framework for Exploiting Security Expertise in Application Development},
  booktitle    = {Trust and Privacy in Digital Business, Third International Conference,
                  TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4083},
  pages        = {62--70},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11824633\_7},
  doi          = {10.1007/11824633\_7},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/BalopoulosGKKGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BelsisGK07,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {75--86},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.032},
  doi          = {10.1016/J.ENTCS.2006.08.032},
  timestamp    = {Tue, 24 Jan 2023 13:29:56 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BelsisGK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2006,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810},
  doi          = {10.1007/11836810},
  isbn         = {3-540-38341-7},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/BalopoulosGK05,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Specifying Privacy-Preserving Protocols in Typed {MSR}},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {5},
  pages        = {501--512},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2005.01.008},
  doi          = {10.1016/J.CSI.2005.01.008},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/BalopoulosGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LambrinoudakisGHYK05,
  author       = {Costas Lambrinoudakis and
                  Stefanos Gritzalis and
                  Petros Hatzopoulos and
                  Athanasios N. Yannacopoulos and
                  Sokratis K. Katsikas},
  title        = {A formal model for pricing information systems insurance contracts},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {5},
  pages        = {521--532},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2005.01.010},
  doi          = {10.1016/J.CSI.2005.01.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LambrinoudakisGHYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/KatsikasLP05,
  author       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Editorial},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {20},
  number       = {6},
  year         = {2005},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/KatsikasLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/KatsikasLP05a,
  author       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Trust, privacy and security in digital business},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {20},
  number       = {6},
  year         = {2005},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/KatsikasLP05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/MoussasLKL05,
  author       = {Vassilios C. Moussas and
                  Spiridon D. Likothanassis and
                  Sokratis K. Katsikas and
                  Assimakis K. Leros},
  title        = {Adaptive on-line multiple source detection},
  booktitle    = {2005 {IEEE} International Conference on Acoustics, Speech, and Signal
                  Processing, {ICASSP} '05, Philadelphia, Pennsylvania, USA, March 18-23,
                  2005},
  pages        = {1029--1032},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICASSP.2005.1416187},
  doi          = {10.1109/ICASSP.2005.1416187},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/MoussasLKL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/KatsikasLP05,
  author       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  editor       = {Panayiotis Bozanis and
                  Elias N. Houstis},
  title        = {Trust, Privacy and Security in E-Business: Requirements and Solutions},
  booktitle    = {Advances in Informatics, 10th Panhellenic Conference on Informatics,
                  {PCI} 2005, Volos, Greece, November 11-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3746},
  pages        = {548--558},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11573036\_52},
  doi          = {10.1007/11573036\_52},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/KatsikasLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/PappasLK05,
  author       = {Stylianos Sp. Pappas and
                  Assimakis K. Leros and
                  Sokratis K. Katsikas},
  editor       = {Panayiotis Bozanis and
                  Elias N. Houstis},
  title        = {Multivariate {AR} Model Order Estimation with Unknown Process Order},
  booktitle    = {Advances in Informatics, 10th Panhellenic Conference on Informatics,
                  {PCI} 2005, Volos, Greece, November 11-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3746},
  pages        = {787--797},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11573036\_75},
  doi          = {10.1007/11573036\_75},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/PappasLK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BalopoulosGK05,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Specifying electronic voting protocols in typed {MSR}},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {35--39},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102207},
  doi          = {10.1145/1102199.1102207},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BalopoulosGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2005,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Trust, Privacy and Security in Digital Business: Second International
                  Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3592},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11537878},
  doi          = {10.1007/11537878},
  isbn         = {3-540-28224-6},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/BalopoulosGK04,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {David Chadwick and
                  Bart Preneel},
  title        = {An Extension of Typed {MSR} for Specifying Esoteric Protocols and
                  Their Dolev-Yao Intruder},
  booktitle    = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11}
                  Conference on Communications and Multimedia Security, Sept. 15-18,
                  2004, Windermere, The Lake District, United Kingdom},
  series       = {{IFIP}},
  volume       = {175},
  pages        = {209--221},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24486-7\_16},
  doi          = {10.1007/0-387-24486-7\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/BalopoulosGK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11/Katsikas04,
  author       = {Sokratis K. Katsikas},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Doctoral Programme on Information and Communication Systems Security
                  at the University of the Aegean},
  booktitle    = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  pages        = {153--158},
  publisher    = {Kluwer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8145-6\_12},
  doi          = {10.1007/1-4020-8145-6\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11/Katsikas04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/KatsikasYGLH04,
  author       = {Sokratis K. Katsikas and
                  Athanasios N. Yannacopoulos and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis and
                  Petros Hatzopoulos},
  editor       = {Paul Dowland and
                  Steven Furnell and
                  Bhavani Thuraisingham and
                  Xiaoyang Sean Wang},
  title        = {How Much Should We Pay for Security? (Invited Paper)},
  booktitle    = {Security Management, Integrity, and Internal Control in Information
                  Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working
                  Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}},
  series       = {{IFIP}},
  volume       = {193},
  pages        = {59--69},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-31167-X\_4},
  doi          = {10.1007/0-387-31167-X\_4},
  timestamp    = {Tue, 16 May 2023 22:42:09 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/KatsikasYGLH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2004,
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98201},
  doi          = {10.1007/B98201},
  isbn         = {3-540-22216-2},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2004,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Trust and Privacy in Digital Business, First International Conference,
                  TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3184},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b99832},
  doi          = {10.1007/B99832},
  isbn         = {3-540-22919-1},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KatsikasP03,
  author       = {Sokratis K. Katsikas and
                  Ahmed Patel},
  title        = {Special issue: securing computer communications with Public Key Infrastructure},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {16},
  pages        = {1813--1814},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00076-8},
  doi          = {10.1016/S0140-3664(03)00076-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KatsikasP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/LambrinoudakisKKTGK03,
  author       = {Costas Lambrinoudakis and
                  Spyros Kokolakis and
                  Maria Karyda and
                  Vassilis Tsoumas and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Electronic Voting Systems: Security Implications of the Administrative
                  Workflow},
  booktitle    = {14th International Workshop on Database and Expert Systems Applications
                  (DEXA'03), September 1-5, 2003, Prague, Czech Republic},
  pages        = {467--471},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DEXA.2003.1232067},
  doi          = {10.1109/DEXA.2003.1232067},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/LambrinoudakisKKTGK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MitrouGKQ03,
  author       = {Lilian Mitrou and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas and
                  Gerald Quirchmayr},
  editor       = {Dimitris Gritzalis},
  title        = {Electronic Voting: Constitutional and Legal Requirements, and Their
                  Technical Implications},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {43--60},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_4},
  doi          = {10.1007/978-1-4615-0239-5\_4},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MitrouGKQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2003,
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  publisher    = {Kluwer},
  year         = {2003},
  isbn         = {1-4020-7449-2},
  timestamp    = {Fri, 25 Apr 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/LekkasGK02,
  author       = {Dimitrios Lekkas and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Quality assured trusted third parties for deploying secure internet-based
                  healthcare applications},
  journal      = {Int. J. Medical Informatics},
  volume       = {65},
  number       = {2},
  pages        = {79--96},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1386-5056(02)00006-0},
  doi          = {10.1016/S1386-5056(02)00006-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/LekkasGK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/LambrinoudakisGK02,
  author       = {Costas Lambrinoudakis and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Building a Reliable e-Voting System: Functional Requirements and Legal
                  Constraints},
  booktitle    = {13th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France},
  pages        = {435},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/DEXA.2002.1045934},
  doi          = {10.1109/DEXA.2002.1045934},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/LambrinoudakisGK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MitrouGK02,
  author       = {Lilian Mitrou and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Revisiting Legal and Regulatory Requirements for Secure E-Voting},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {469--480},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 06 Nov 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/MitrouGK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/RaptisSK01,
  author       = {Konstantinos Raptis and
                  Diomidis Spinellis and
                  Sokratis K. Katsikas},
  title        = {Multi-technology distributed objects and their integration},
  journal      = {Comput. Stand. Interfaces},
  volume       = {23},
  number       = {3},
  pages        = {157--168},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0920-5489(01)00070-8},
  doi          = {10.1016/S0920-5489(01)00070-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/RaptisSK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/KatsikasLBBF01,
  author       = {Sokratis K. Katsikas and
                  Spiridon D. Likothanassis and
                  Grigorios N. Beligiannis and
                  K. G. Berkeris and
                  Dimitris Fotakis},
  title        = {Genetically determined variable structure multiple model estimation},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {49},
  number       = {10},
  pages        = {2253--2261},
  year         = {2001},
  url          = {https://doi.org/10.1109/78.950781},
  doi          = {10.1109/78.950781},
  timestamp    = {Thu, 24 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/KatsikasLBBF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hercma/LekkasGK01,
  author       = {Dimitrios Lekkas and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Elias A. Lipitakis},
  title        = {Towards an {ISO-9000} compliant certification service provider},
  booktitle    = {Proceedings of the 5th Hellenic-European Conference on Computer Mathematics
                  and its Applications (HERCMA-01), Athens, Greece, September 20-22,
                  2001},
  pages        = {390--397},
  publisher    = {{LEA} Press, Athens, Hellas},
  year         = {2001},
  timestamp    = {Wed, 20 Jun 2018 09:48:24 +0200},
  biburl       = {https://dblp.org/rec/conf/hercma/LekkasGK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisKLMP00,
  author       = {Stefanos Gritzalis and
                  Sokratis K. Katsikas and
                  Dimitrios Lekkas and
                  Konstantinos Moulinos and
                  Eleni Polydoro},
  title        = {Securing The Electronic Market: The {KEYSTONE} Public Key Infrastructure
                  Architecture},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {8},
  pages        = {731--746},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)08022-6},
  doi          = {10.1016/S0167-4048(00)08022-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisKLMP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/Katsikas00,
  author       = {Sokratis K. Katsikas},
  title        = {Health care management and information systems security: awareness,
                  training or education?},
  journal      = {Int. J. Medical Informatics},
  volume       = {60},
  number       = {2},
  pages        = {129--135},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1386-5056(00)00112-X},
  doi          = {10.1016/S1386-5056(00)00112-X},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmi/Katsikas00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IliadisSGPK00,
  author       = {John Iliadis and
                  Diomidis Spinellis and
                  Dimitris Gritzalis and
                  Bart Preneel and
                  Sokratis K. Katsikas},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Evaluating certificate status information mechanisms},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352603},
  doi          = {10.1145/352600.352603},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IliadisSGPK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Katsikas00,
  author       = {Sokratis K. Katsikas},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {A Postgraduate Programme on Information and Communication Systems
                  Security},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {49--58},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Katsikas00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpinellisGIGK99,
  author       = {Diomidis Spinellis and
                  Stefanos Gritzalis and
                  John Iliadis and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Trusted third party services for deploying secure telemedical applications
                  over the {WWW}},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {627--639},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82041-0},
  doi          = {10.1016/S0167-4048(99)82041-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpinellisGIGK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucc/LainiotisGK99,
  author       = {Demetrios G. Lainiotis and
                  Pavlos K. Giannakopoulos and
                  Sokratis K. Katsikas},
  title        = {Passive target tracking with non Gaussian initial conditions},
  booktitle    = {5th European Control Conference, {ECC} 1999, Karlsruhe, Germany, August
                  31 - September 3, 1999},
  pages        = {1306--1309},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.23919/ECC.1999.7099491},
  doi          = {10.23919/ECC.1999.7099491},
  timestamp    = {Fri, 12 Mar 2021 16:09:40 +0100},
  biburl       = {https://dblp.org/rec/conf/eucc/LainiotisGK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/KatsikasSIB98,
  author       = {Sokratis K. Katsikas and
                  Diomidis D. Spinellis and
                  John Iliadis and
                  Bernd Blobel},
  title        = {Using trusted third parties for secure telemedical applications over
                  the {WWW:} The {EUROMED-ETS} approach},
  journal      = {Int. J. Medical Informatics},
  volume       = {49},
  number       = {1},
  pages        = {59--68},
  year         = {1998},
  url          = {https://doi.org/10.1016/S1386-5056(98)00011-2},
  doi          = {10.1016/S1386-5056(98)00011-2},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmi/KatsikasSIB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npsc/LainiotisGK98,
  author       = {Demetrios G. Lainiotis and
                  Pavlos K. Giannakopoulos and
                  Sokratis K. Katsikas},
  title        = {Estimation for Linear Systems with Non-Gaussian Initial State: Centralized
                  and Decentralized Partitioning Algorithms},
  journal      = {Neural Parallel Sci. Comput.},
  volume       = {6},
  number       = {4},
  pages        = {479--499},
  year         = {1998},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npsc/LainiotisGK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/PlataniotisKLV98,
  author       = {Konstantinos N. Plataniotis and
                  Sokratis K. Katsikas and
                  Demetrios G. Lainiotis and
                  Anastasios N. Venetsanopoulos},
  title        = {Optimal seismic deconvolution: distributed algorithms},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {36},
  number       = {3},
  pages        = {779--792},
  year         = {1998},
  url          = {https://doi.org/10.1109/36.673671},
  doi          = {10.1109/36.673671},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/PlataniotisKLV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medinfo/FurnellGKMSW98,
  author       = {Steven Furnell and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas and
                  Konstantinos Mavroudakis and
                  Peter W. Sanders and
                  Matthew J. Warren},
  editor       = {Branko Cesnik and
                  Alexa Thorlichen McCray and
                  Jean{-}Raoul Scherrer},
  title        = {Methods of Responding to Healthcare Security Incidents},
  booktitle    = {{MEDINFO} '98 - 9th World Congress on Medical Informatics, Seoul,
                  South Korea, August 14-21, 1998},
  series       = {Studies in Health Technology and Informatics},
  volume       = {52},
  pages        = {1138--1142},
  publisher    = {{IOS} Press},
  year         = {1998},
  url          = {https://doi.org/10.3233/978-1-60750-896-0-1138},
  doi          = {10.3233/978-1-60750-896-0-1138},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/medinfo/FurnellGKMSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/ApostolopoulosDKM98,
  author       = {Theodore K. Apostolopoulos and
                  Victoria C. Daskalou and
                  Sokratis K. Katsikas and
                  K. D. Moulinos},
  title        = {Enforcing Security Policies in Large Scale Communication Networks},
  booktitle    = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS}
                  1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings},
  pages        = {393--397},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/RELDIS.1998.740529},
  doi          = {10.1109/RELDIS.1998.740529},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/ApostolopoulosDKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KantzavelouK97,
  author       = {Ioanna Kantzavelou and
                  Sokratis K. Katsikas},
  editor       = {Louise Yngstr{\"{o}}m and
                  Jan Carlsen},
  title        = {An attack detection system for secure computer systems - outline of
                  the solution},
  booktitle    = {Information Security in Research and Business, Proceedings of the
                  {IFIP} {TC11} 13th International Conference on Information Security
                  {(SEC} '97), 14-16 May 1997, Copenhagen, Denmark},
  series       = {{IFIP} Conference Proceedings},
  volume       = {92},
  pages        = {123--135},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Thu, 03 Jan 2002 12:08:24 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/KantzavelouK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KatsikasSGD96,
  author       = {Sokratis K. Katsikas and
                  Thomas Spyrou and
                  Dimitris Gritzalis and
                  John Darzentas},
  title        = {Model for network behaviour under viral attack},
  journal      = {Comput. Commun.},
  volume       = {19},
  number       = {2},
  pages        = {124--132},
  year         = {1996},
  url          = {https://doi.org/10.1016/0140-3664(95)01033-5},
  doi          = {10.1016/0140-3664(95)01033-5},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KatsikasSGD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/GritzalisK96,
  author       = {Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Towards a formal system-to-system authentication protocol},
  journal      = {Comput. Commun.},
  volume       = {19},
  number       = {12},
  pages        = {954--961},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0140-3664(96)01139-5},
  doi          = {10.1016/S0140-3664(96)01139-5},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/GritzalisK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/KatsikasGS96,
  author       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis and
                  Paul G. Spirakis},
  editor       = {Patrick Horster},
  title        = {Attack Modelling in Open Network Environments},
  booktitle    = {Communications and Multimedia Security II, Proceedings of the {IFIP}
                  {TC6/TC11} International Conference on Communications and Multimedia
                  Security at Essen, Germany, 23-24 September 1996},
  series       = {{IFIP} Conference Proceedings},
  volume       = {70},
  pages        = {268--277},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Mon, 14 Oct 2002 12:00:10 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/KatsikasGS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/KatsikasT96,
  author       = {Sokratis K. Katsikas and
                  N. Theodoropoulos},
  editor       = {Patrick Horster},
  title        = {Defending Networks: The Expert System Components of {SECURENET}},
  booktitle    = {Communications and Multimedia Security II, Proceedings of the {IFIP}
                  {TC6/TC11} International Conference on Communications and Multimedia
                  Security at Essen, Germany, 23-24 September 1996},
  series       = {{IFIP} Conference Proceedings},
  volume       = {70},
  pages        = {291--302},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/KatsikasT96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/KatsikasG96,
  author       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis},
  title        = {High Level Security Policy Guidelines},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {57--81},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-57},
  doi          = {10.3233/978-1-60750-875-5-57},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/KatsikasG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Katsikas96,
  author       = {Sokratis K. Katsikas},
  editor       = {Barry Barber and
                  Alison Treacher and
                  C. P. Louwerse},
  title        = {The {SEISMED} High Level Security Policy for Health Care},
  booktitle    = {Towards Security in Medical Telematics - Legal and Technical Aspects},
  series       = {Studies in Health Technology and Informatics},
  volume       = {27},
  pages        = {125--130},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-871-7-125},
  doi          = {10.3233/978-1-60750-871-7-125},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Katsikas96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/1996,
  editor       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis},
  title        = {Information Systems Security, Facing the information society of the
                  21st Century},
  series       = {{IFIP} Conference Proceedings},
  volume       = {54},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  isbn         = {0-412-78120-4},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DoumasMGK95,
  author       = {Anastasia Doumas and
                  Konstantinos Mavroudakis and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Design of a neural network for recognition and classification of computer
                  viruses},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {435--448},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00008-V},
  doi          = {10.1016/0167-4048(95)00008-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DoumasMGK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npsc/LainiotisAK95,
  author       = {Demetrios G. Lainiotis and
                  Nicholas D. Assimakis and
                  Sokratis K. Katsikas},
  title        = {Fast and numerically robust recursive algorithms for solving the discrete
                  time Riccati equation: the case of nonsingular plant noise covariance
                  matrix},
  journal      = {Neural Parallel Sci. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {565--583},
  year         = {1995},
  url          = {http://dl.acm.org/citation.cfm?id=223159},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npsc/LainiotisAK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/KatsikasLL95,
  author       = {Sokratis K. Katsikas and
                  Assimakis K. Leros and
                  Demetrios G. Lainiotis},
  title        = {Underwater tracking of a maneuvering target using time delay measurements},
  journal      = {Signal Process.},
  volume       = {41},
  number       = {1},
  pages        = {17--29},
  year         = {1995},
  url          = {https://doi.org/10.1016/0165-1684(94)00087-G},
  doi          = {10.1016/0165-1684(94)00087-G},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/KatsikasLL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/KatsikasLL94,
  author       = {Sokratis K. Katsikas and
                  Assimakis K. Leros and
                  Demetrios G. Lainiotis},
  title        = {Passive tracking of a maneuvering target: an adaptive approach},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {42},
  number       = {7},
  pages        = {1820--1825},
  year         = {1994},
  url          = {https://doi.org/10.1109/78.298290},
  doi          = {10.1109/78.298290},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/KatsikasLL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isn/AndroutsopoulosKKPSS94,
  author       = {Dimitris Androutsopoulos and
                  Per Kaijser and
                  Sokratis K. Katsikas and
                  K{\aa}re Presttun and
                  Don Salmon and
                  Paul G. Spirakis},
  editor       = {Hans{-}J{\"{u}}rgen Kugler and
                  Alvin P. Mullery and
                  Norbert Niebert},
  title        = {Surveillance and Protection in {IBC} Management: The Applicability
                  of Two {RACE} Security Projects - SecureNet {II} and {SESAME}},
  booktitle    = {Towards a Pan-European Telecommunication Service Infrastructure -
                  IS{\&}N'94, Second International Conference on Intelligence in
                  Broadband Services and Networks, Aachen, Germany, September 7-9, 1994,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {851},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0013398},
  doi          = {10.1007/BFB0013398},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/isn/AndroutsopoulosKKPSS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npsc/LainiotisAK93,
  author       = {Demetrios G. Lainiotis and
                  Nicholas D. Assimakis and
                  Sokratis K. Katsikas},
  title        = {Fast and stable algorithm for computing the principal square root
                  of a complex matrix},
  journal      = {Neural Parallel Sci. Comput.},
  volume       = {1},
  pages        = {467--476},
  year         = {1993},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npsc/LainiotisAK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npsc/LainiotisAK93a,
  author       = {Demetrios G. Lainiotis and
                  Nicholas D. Assimakis and
                  Sokratis K. Katsikas},
  title        = {Time series prediction based on fractal theory and nonlinear estimation
                  using a network with Gaussian kernel functions},
  journal      = {Neural Parallel Sci. Comput.},
  volume       = {1},
  pages        = {477--500},
  year         = {1993},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npsc/LainiotisAK93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisKKT92,
  author       = {Dimitris Gritzalis and
                  Sokratis K. Katsikas and
                  J. Keklikoglou and
                  A. Tomaras},
  title        = {Determining access rights for medical information systems},
  journal      = {Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {149--161},
  year         = {1992},
  url          = {https://doi.org/10.1016/0167-4048(92)90042-P},
  doi          = {10.1016/0167-4048(92)90042-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisKKT92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisKG92,
  author       = {Dimitris Gritzalis and
                  Sokratis K. Katsikas and
                  Stefanos Gritzalis},
  title        = {A zero knowledge probabilistic login protocol},
  journal      = {Comput. Secur.},
  volume       = {11},
  number       = {8},
  pages        = {733--745},
  year         = {1992},
  url          = {https://doi.org/10.1016/0167-4048(92)90129-F},
  doi          = {10.1016/0167-4048(92)90129-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisKG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisTKK91,
  author       = {Dimitris Gritzalis and
                  A. Tomaras and
                  Sokratis K. Katsikas and
                  J. Keklikoglou},
  title        = {Data security in medical information systems: The Greek case},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {141--159},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90008-2},
  doi          = {10.1016/0167-4048(91)90008-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisTKK91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/KatsikasLL91,
  author       = {Sokratis K. Katsikas and
                  Spiridon D. Likothanassis and
                  Demetrios G. Lainiotis},
  title        = {On the parallel implementations of the linear Kalman and Lainiotis
                  filters and their efficiency},
  journal      = {Signal Process.},
  volume       = {25},
  number       = {3},
  pages        = {289--305},
  year         = {1991},
  url          = {https://doi.org/10.1016/0165-1684(91)90115-Y},
  doi          = {10.1016/0165-1684(91)90115-Y},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/KatsikasLL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/LainiotisGK91,
  author       = {Demetrios G. Lainiotis and
                  Pavlos K. Giannakopoulos and
                  Sokratis K. Katsikas},
  title        = {Optimal state estimation for uncertain, time varying systems with
                  non-Gaussian initial state},
  booktitle    = {1991 International Conference on Acoustics, Speech, and Signal Processing,
                  {ICASSP} '91, Toronto, Ontario, Canada, May 14-17, 1991},
  pages        = {1877--1880},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/ICASSP.1991.150736},
  doi          = {10.1109/ICASSP.1991.150736},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/LainiotisGK91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/KatsikasLL90,
  author       = {Sokratis K. Katsikas and
                  Spiros Likothanassis and
                  Demetrios G. Lainiotis},
  title        = {{AR} model identification with unknown process order},
  journal      = {{IEEE} Trans. Acoust. Speech Signal Process.},
  volume       = {38},
  number       = {5},
  pages        = {872--876},
  year         = {1990},
  url          = {https://doi.org/10.1109/29.56035},
  doi          = {10.1109/29.56035},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsp/KatsikasLL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/LainiotisKL88,
  author       = {Demetrios G. Lainiotis and
                  Sokratis K. Katsikas and
                  Spiros D. Likothanassis},
  title        = {Adaptive deconvolution of seismic signals-performance, computational
                  analysis, parallelism},
  journal      = {{IEEE} Trans. Acoust. Speech Signal Process.},
  volume       = {36},
  number       = {11},
  pages        = {1715--1734},
  year         = {1988},
  url          = {https://doi.org/10.1109/29.9009},
  doi          = {10.1109/29.9009},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsp/LainiotisKL88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics