Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sokratis K. Katsikas
@inproceedings{DBLP:conf/icissp/LienBK24, author = {Eirik Lien and Karl Magnus Gr{\o}nning Bergh and Sokratis K. Katsikas}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {187--194}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012414900003648}, doi = {10.5220/0012414900003648}, timestamp = {Tue, 02 Apr 2024 14:37:52 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LienBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisa/2023, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-99-9614-8}, doi = {10.1007/978-981-99-9614-8}, isbn = {978-981-99-9613-1}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2023w1, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Pantaleone Nespoli and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14398}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54204-6}, doi = {10.1007/978-3-031-54204-6}, isbn = {978-3-031-54203-9}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2023w1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2023w2, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54129-2}, doi = {10.1007/978-3-031-54129-2}, isbn = {978-3-031-54128-5}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2023w2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ElZawawyKCK23, author = {Mohamed A. El{-}Zawawy and Pallavi Kaliyar and Mauro Conti and Sokratis K. Katsikas}, title = {Honey-list based authentication protocol for industrial IoT swarms}, journal = {Comput. Commun.}, volume = {211}, pages = {239--253}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.09.012}, doi = {10.1016/J.COMCOM.2023.09.012}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ElZawawyKCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OfteK23, author = {H{\aa}vard Jakobsen Ofte and Sokratis K. Katsikas}, title = {Understanding situation awareness in SOCs, a systematic literature review}, journal = {Comput. Secur.}, volume = {126}, pages = {103069}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103069}, doi = {10.1016/J.COSE.2022.103069}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OfteK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KampourakisGK23, author = {Vyron Kampourakis and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {A systematic literature review on wireless security testbeds in the cyber-physical realm}, journal = {Comput. Secur.}, volume = {133}, pages = {103383}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103383}, doi = {10.1016/J.COSE.2023.103383}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KampourakisGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/ChaudharyGK23, author = {Sunil Chaudhary and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises}, journal = {Comput. Sci. Rev.}, volume = {50}, pages = {100592}, year = {2023}, url = {https://doi.org/10.1016/j.cosrev.2023.100592}, doi = {10.1016/J.COSREV.2023.100592}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/ChaudharyGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KavallieratosK23, author = {Georgios Kavallieratos and Sokratis K. Katsikas}, title = {An exploratory analysis of the last frontier: {A} systematic literature review of cybersecurity in space}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100640}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100640}, doi = {10.1016/J.IJCIP.2023.100640}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KavallieratosK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AkbarzadehK23, author = {Aida Akbarzadeh and Sokratis K. Katsikas}, title = {Dependency-based security risk assessment for cyber-physical systems}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {3}, pages = {563--578}, year = {2023}, url = {https://doi.org/10.1007/s10207-022-00608-4}, doi = {10.1007/S10207-022-00608-4}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AkbarzadehK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MengKCC23, author = {Weizhi Meng and Sokratis K. Katsikas and Jiageng Chen and Chao Chen}, title = {Editorial for special issue on security and trust on networked systems}, journal = {Int. J. Netw. Manag.}, volume = {33}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/nem.2229}, doi = {10.1002/NEM.2229}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MengKCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KannelonningK23, author = {Kristian Kannel{\o}nning and Sokratis K. Katsikas}, title = {A systematic literature review of how cybersecurity-related behavior has been assessed}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {463--477}, year = {2023}, url = {https://doi.org/10.1108/ICS-08-2022-0139}, doi = {10.1108/ICS-08-2022-0139}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/KannelonningK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AmroGK23, author = {Ahmed Amro and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {Assessing Cyber Risk in Cyber-Physical Systems Using the ATT{\&}CK Framework}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {22:1--22:33}, year = {2023}, url = {https://doi.org/10.1145/3571733}, doi = {10.1145/3571733}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AmroGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/VatnKK23, author = {Karl Jonatan Due Vatn and Georgios Kavallieratos and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Pantaleone Nespoli and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Threat Analysis in Dairy Farming 4.0}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14398}, pages = {46--63}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54204-6\_3}, doi = {10.1007/978-3-031-54204-6\_3}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/VatnKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/KannelonningK23, author = {Kristian Kannel{\o}nning and Sokratis K. Katsikas}, editor = {Steven Furnell and Nathan L. Clarke}, title = {Cybersecurity-Related Behavior of Personnel in the Norwegian Industry}, booktitle = {Human Aspects of Information Security and Assurance - 17th {IFIP} {WG} 11.12 International Symposium, {HAISA} 2023, Kent, UK, July 4-6, 2023, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {674}, pages = {249--258}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38530-8\_20}, doi = {10.1007/978-3-031-38530-8\_20}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/KannelonningK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NygardK23, author = {Arne Roar Nyg{\aa}rd and Sokratis K. Katsikas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {610--616}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012046000003555}, doi = {10.5220/0012046000003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NygardK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022w, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Christos Kalloniatis and John Mylopoulos and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge and Massimiliano Albanese and Basel Katt and Sandeep Pirbhulal and Ankur Shukla}, title = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS 2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE 2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13785}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-25460-4}, doi = {10.1007/978-3-031-25460-4}, isbn = {978-3-031-25459-8}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2022w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2022, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-25538-0}, doi = {10.1007/978-3-031-25538-0}, isbn = {978-3-031-25537-3}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-05047, author = {Vassilis Papaspirou and Leandros A. Maglaras and Ioanna Kantzavelou and Naghmeh Moradpoor and Sokratis K. Katsikas}, title = {A Blockchain-based two Factor Honeytoken Authentication System}, journal = {CoRR}, volume = {abs/2307.05047}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.05047}, doi = {10.48550/ARXIV.2307.05047}, eprinttype = {arXiv}, eprint = {2307.05047}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-05047.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChowdhuryKG22, author = {Nabin Chowdhury and Sokratis K. Katsikas and Vasileios Gkioulos}, title = {Modeling effective cybersecurity training frameworks: {A} delphi method-based study}, journal = {Comput. Secur.}, volume = {113}, pages = {102551}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102551}, doi = {10.1016/J.COSE.2021.102551}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChowdhuryKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GallagherPCPMK22, author = {Michael Gallagher and Nikolaos Pitropakis and Christos Chrysoulas and Pavlos Papadopoulos and Alexios Mylonas and Sokratis K. Katsikas}, title = {Investigating machine learning attacks on financial time series models}, journal = {Comput. Secur.}, volume = {123}, pages = {102933}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102933}, doi = {10.1016/J.COSE.2022.102933}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GallagherPCPMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/ChaudharyGK22, author = {Sunil Chaudhary and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {Developing metrics to assess the effectiveness of cybersecurity awareness program}, journal = {J. Cybersecur.}, volume = {8}, number = {1}, year = {2022}, url = {https://doi.org/10.1093/cybsec/tyac006}, doi = {10.1093/CYBSEC/TYAC006}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/ChaudharyGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/AmroOGK22, author = {Ahmed Amro and Aybars Oruc and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {Navigation Data Anomaly Analysis and Detection}, journal = {Inf.}, volume = {13}, number = {3}, pages = {104}, year = {2022}, url = {https://doi.org/10.3390/info13030104}, doi = {10.3390/INFO13030104}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/AmroOGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/KantzavelouMTK22, author = {Ioanna Kantzavelou and Leandros A. Maglaras and Panagiotis F. Tzikopoulos and Sokratis K. Katsikas}, title = {A multiplayer game model to detect insiders in wireless sensor networks}, journal = {PeerJ Comput. Sci.}, volume = {8}, pages = {e791}, year = {2022}, url = {https://doi.org/10.7717/peerj-cs.791}, doi = {10.7717/PEERJ-CS.791}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/KantzavelouMTK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NygardK22, author = {Arne Roar Nyg{\aa}rd and Sokratis K. Katsikas}, title = {SoK: Combating threats in the digital supply chain}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {128:1--128:8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544421}, doi = {10.1145/3538969.3544421}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NygardK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AkbarzadehK22, author = {Aida Akbarzadeh and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Christos Kalloniatis and John Mylopoulos and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge and Massimiliano Albanese and Basel Katt and Sandeep Pirbhulal and Ankur Shukla}, title = {Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies}, booktitle = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS 2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE 2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13785}, pages = {5--25}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25460-4\_1}, doi = {10.1007/978-3-031-25460-4\_1}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AkbarzadehK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/TeglasyKL22, author = {B{\'{a}}lint Z. T{\'{e}}gl{\'{a}}sy and Sokratis K. Katsikas and Mary Ann Lundteigen}, title = {Standardized cyber security risk assessment for unmanned offshore facilities}, booktitle = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, pages = {33--40}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489.3527302}, doi = {10.1145/3524489.3527302}, timestamp = {Thu, 22 Dec 2022 13:53:49 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/TeglasyKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Katsikas22, author = {Sokratis K. Katsikas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Cyber Security When {IT} Meets {OT}}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2022}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Katsikas22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NygardSK22, author = {Arne Roar Nyg{\aa}rd and Arvind Sharma and Sokratis K. Katsikas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {461--468}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011384300003283}, doi = {10.5220/0011384300003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NygardSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisa/2021, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-93956-4}, doi = {10.1007/978-3-030-93956-4}, isbn = {978-3-030-93955-7}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2021cicps, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Nora Cuppens and John Mylopoulos and Christos Kalloniatis and Weizhi Meng and Steven Furnell and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge}, title = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13106}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95484-0}, doi = {10.1007/978-3-030-95484-0}, isbn = {978-3-030-95483-3}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2021cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2022, editor = {Sokratis K. Katsikas and Steven Furnell}, title = {Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13582}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17926-6}, doi = {10.1007/978-3-031-17926-6}, isbn = {978-3-031-17925-9}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-01952, author = {B{\'{a}}lint Z. T{\'{e}}gl{\'{a}}sy and Emil Wengle and John R. Potter and Sokratis K. Katsikas}, title = {Authentication of Underwater Assets}, journal = {CoRR}, volume = {abs/2209.01952}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.01952}, doi = {10.48550/ARXIV.2209.01952}, eprinttype = {arXiv}, eprint = {2209.01952}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-01952.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07666, author = {B{\'{a}}lint Z. T{\'{e}}gl{\'{a}}sy and Sokratis K. Katsikas}, title = {A Location-Based Global Authorization Method for Underwater Security}, journal = {CoRR}, volume = {abs/2210.07666}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07666}, doi = {10.48550/ARXIV.2210.07666}, eprinttype = {arXiv}, eprint = {2210.07666}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07666.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/digital/RadoglouGrammatikisSDSLESPBRSPM21, author = {Panagiotis I. Radoglou{-}Grammatikis and Panagiotis G. Sarigiannidis and Christos Dalamagkas and Yannis Spyridis and Thomas Lagkas and Georgios Efstathopoulos and Achilleas Sesis and Ignacio Labrador Pav{\'{o}}n and Rub{\'{e}}n Trapero Burgos and Rodrigo Diaz Rodriguez and Antonios Sarigiannidis and Dimitrios Papamartzivanos and Sofia{-}Anna Menesidou and Giannis Ledakis and Achilleas Pasias and Thanasis Kotsiopoulos and Anastasios Drosou and Orestis Mavropoulos and Alba Colet{-}Subirachs and Pol Paradell Sola and Jos{\'{e}} Luis Dom{\'{\i}}nguez{-}Garc{\'{\i}}a and Marisa Escalante and Alberto Molinuevo Mart{\'{\i}}n and Benito Caracuel and Francisco Ramos and Vasileios Gkioulos and Sokratis K. Katsikas and Hans Christian Bolstad and Dan{-}Eric Archer and Nikola Paunovic and Ramon Gallart{-}Fernandez and Theodoros Rokkas and Alicia Arce}, title = {SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture}, journal = {Digit.}, volume = {1}, number = {4}, pages = {173--187}, year = {2021}, url = {https://doi.org/10.3390/digital1040013}, doi = {10.3390/DIGITAL1040013}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/digital/RadoglouGrammatikisSDSLESPBRSPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/GoudosisK21, author = {Athanasios K. Goudosis and Sokratis K. Katsikas}, title = {{ARIBC:} Online Reporting Based on Identity-Based Cryptography}, journal = {Future Internet}, volume = {13}, number = {2}, pages = {53}, year = {2021}, url = {https://doi.org/10.3390/fi13020053}, doi = {10.3390/FI13020053}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/GoudosisK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PirbhulalGK21, author = {Sandeep Pirbhulal and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {A Systematic Literature Review on {RAMS} analysis for critical infrastructures protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100427}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100427}, doi = {10.1016/J.IJCIP.2021.100427}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/PirbhulalGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AkbarzadehK21, author = {Aida Akbarzadeh and Sokratis K. Katsikas}, title = {Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems}, journal = {Sensors}, volume = {21}, number = {5}, pages = {1685}, year = {2021}, url = {https://doi.org/10.3390/s21051685}, doi = {10.3390/S21051685}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AkbarzadehK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KavallieratosSK21, author = {Georgios Kavallieratos and Georgios P. Spathoulas and Sokratis K. Katsikas}, title = {Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems}, journal = {Sensors}, volume = {21}, number = {5}, pages = {1691}, year = {2021}, url = {https://doi.org/10.3390/s21051691}, doi = {10.3390/S21051691}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KavallieratosSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SpathoulasKKB21, author = {Georgios P. Spathoulas and Georgios Kavallieratos and Sokratis K. Katsikas and Alessio Baiocco}, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Nora Cuppens and John Mylopoulos and Christos Kalloniatis and Weizhi Meng and Steven Furnell and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge}, title = {Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical Systems}, booktitle = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13106}, pages = {74--90}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95484-0\_5}, doi = {10.1007/978-3-030-95484-0\_5}, timestamp = {Wed, 09 Nov 2022 13:58:44 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SpathoulasKKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etaa/MsgnaKG21, author = {Mehari Msgna and Sokratis K. Katsikas and Vasileios Gkioulos}, editor = {Andrea Saracino and Paolo Mori}, title = {{WYK:} Mobile Device Authentication Using the User's Address Book}, booktitle = {Emerging Technologies for Authorization and Authentication - 4th International Workshop, {ETAA} 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13136}, pages = {1--16}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93747-8\_1}, doi = {10.1007/978-3-030-93747-8\_1}, timestamp = {Wed, 19 Jan 2022 09:36:11 +0100}, biburl = {https://dblp.org/rec/conf/etaa/MsgnaKG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2021, editor = {Joseph K. Liu and Sokratis K. Katsikas and Weizhi Meng and Willy Susilo and Rolly Intan}, title = {Information Security - 24th International Conference, {ISC} 2021, Virtual Event, November 10-12, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13118}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91356-4}, doi = {10.1007/978-3-030-91356-4}, isbn = {978-3-030-91355-7}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/PapadopoulosPBL20, author = {Pavlos Papadopoulos and Nikolaos Pitropakis and William J. Buchanan and Owen Lo and Sokratis K. Katsikas}, title = {Privacy-Preserving Passive {DNS}}, journal = {Comput.}, volume = {9}, number = {3}, pages = {64}, year = {2020}, url = {https://doi.org/10.3390/computers9030064}, doi = {10.3390/COMPUTERS9030064}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/PapadopoulosPBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KavallieratosKG20, author = {Georgios Kavallieratos and Sokratis K. Katsikas and Vasileios Gkioulos}, title = {SafeSec Tropos: Joint security and safety requirements elicitation}, journal = {Comput. Stand. Interfaces}, volume = {70}, pages = {103429}, year = {2020}, url = {https://doi.org/10.1016/j.csi.2020.103429}, doi = {10.1016/J.CSI.2020.103429}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KavallieratosKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KavallieratosKG20, author = {Georgios Kavallieratos and Sokratis K. Katsikas and Vasileios Gkioulos}, title = {Cybersecurity and Safety Co-Engineering of Cyberphysical Systems - {A} Comprehensive Survey}, journal = {Future Internet}, volume = {12}, number = {4}, pages = {65}, year = {2020}, url = {https://doi.org/10.3390/fi12040065}, doi = {10.3390/FI12040065}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/KavallieratosKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KatsikasG20, author = {Sokratis K. Katsikas and Vasileios Gkioulos}, title = {Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things}, journal = {Sensors}, volume = {20}, number = {14}, pages = {3846}, year = {2020}, url = {https://doi.org/10.3390/s20143846}, doi = {10.3390/S20143846}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KatsikasG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/StamatellisPPKB20, author = {Charalampos S. Stamatellis and Pavlos Papadopoulos and Nikolaos Pitropakis and Sokratis K. Katsikas and William J. Buchanan}, title = {A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric}, journal = {Sensors}, volume = {20}, number = {22}, pages = {6587}, year = {2020}, url = {https://doi.org/10.3390/s20226587}, doi = {10.3390/S20226587}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/StamatellisPPKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/KavallieratosDK20, author = {Georgios Kavallieratos and Vasiliki Diamantopoulou and Sokratis K. Katsikas}, title = {Shipping 4.0: Security Requirements for the Cyber-Enabled Ship}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {10}, pages = {6617--6625}, year = {2020}, url = {https://doi.org/10.1109/TII.2020.2976840}, doi = {10.1109/TII.2020.2976840}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/KavallieratosDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aciids/KavallieratosKG20, author = {Georgios Kavallieratos and Sokratis K. Katsikas and Vasileios Gkioulos}, editor = {Ngoc Thanh Nguyen and Kietikul Jearanaitanakij and Ali Selamat and Bogdan Trawinski and Suphamit Chittayasothorn}, title = {Modelling Shipping 4.0: {A} Reference Architecture for the Cyber-Enabled Ship}, booktitle = {Intelligent Information and Database Systems - 12th Asian Conference, {ACIIDS} 2020, Phuket, Thailand, March 23-26, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12034}, pages = {202--217}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-42058-1\_17}, doi = {10.1007/978-3-030-42058-1\_17}, timestamp = {Thu, 16 Mar 2023 20:00:29 +0100}, biburl = {https://dblp.org/rec/conf/aciids/KavallieratosKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KavallieratosK20, author = {Georgios Kavallieratos and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Weizhi Meng and Steven Furnell}, title = {Attack Path Analysis for Cyber Physical Systems}, booktitle = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12501}, pages = {19--33}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64330-0\_2}, doi = {10.1007/978-3-030-64330-0\_2}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KavallieratosK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Katsikas20, author = {Sokratis K. Katsikas}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2020}, timestamp = {Tue, 14 Apr 2020 10:48:30 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Katsikas20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/AkbarzadehK20, author = {Aida Akbarzadeh and Sokratis K. Katsikas}, title = {Identifying Critical Components in Large Scale Cyber Physical Systems}, booktitle = {{ICSE} '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020}, pages = {230--236}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3387940.3391473}, doi = {10.1145/3387940.3391473}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/AkbarzadehK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020asiacpss, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Proceedings of the 6th {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384941}, doi = {10.1145/3384941}, isbn = {978-1-4503-7608-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020asiacpss.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/edemocracy/2019, editor = {Sokratis K. Katsikas and Vasilios Zorkadis}, title = {E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age - 8th International Conference, e-Democracy 2019, Athens, Greece, December 12-13, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1111}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-37545-4}, doi = {10.1007/978-3-030-37545-4}, isbn = {978-3-030-37544-7}, timestamp = {Tue, 17 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edemocracy/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-42048-2}, doi = {10.1007/978-3-030-42048-2}, isbn = {978-3-030-42047-5}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2019cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Weizhi Meng and Steven Furnell}, title = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12501}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64330-0}, doi = {10.1007/978-3-030-64330-0}, isbn = {978-3-030-64329-4}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2020cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-06430, author = {Pavlos Papadopoulos and Nikolaos Pitropakis and William J. Buchanan and Owen Lo and Sokratis K. Katsikas}, title = {Privacy Preserving Passive {DNS}}, journal = {CoRR}, volume = {abs/2008.06430}, year = {2020}, url = {https://arxiv.org/abs/2008.06430}, eprinttype = {arXiv}, eprint = {2008.06430}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-06430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-09260, author = {Charalampos S. Stamatellis and Pavlos Papadopoulos and Nikolaos Pitropakis and Sokratis K. Katsikas and William J. Buchanan}, title = {A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric}, journal = {CoRR}, volume = {abs/2011.09260}, year = {2020}, url = {https://arxiv.org/abs/2011.09260}, eprinttype = {arXiv}, eprint = {2011.09260}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-09260.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KavallieratosCK19, author = {Georgios Kavallieratos and Nabin Chowdhury and Sokratis K. Katsikas and Vasileios Gkioulos and Stephen D. Wolthusen}, title = {Threat Analysis for Smart Homes}, journal = {Future Internet}, volume = {11}, number = {10}, pages = {207}, year = {2019}, url = {https://doi.org/10.3390/fi11100207}, doi = {10.3390/FI11100207}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/KavallieratosCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AnastopoulosK19, author = {Vasileios Anastopoulos and Sokratis K. Katsikas}, title = {A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {19}, pages = {e2}, year = {2019}, url = {https://doi.org/10.4108/eai.25-1-2019.159347}, doi = {10.4108/EAI.25-1-2019.159347}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AnastopoulosK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/KavallieratosKG19, author = {Georgios Kavallieratos and Sokratis K. Katsikas and Vasileios Gkioulos}, title = {Towards a Cyber-Physical Range}, booktitle = {Proceedings of the 5th {ACM} on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2019, Auckland, New Zealand, 8 July 2019}, pages = {25--34}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327961.3329532}, doi = {10.1145/3327961.3329532}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpss/KavallieratosKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/AssenzaCFGGHHIK19, author = {Giacomo Assenza and Valerio Cozzani and Francesco Flammini and Nadezhda Gotcheva and Tommy Gustafsson and Anders Hansson and Jouko Heikkil{\"{a}} and Matteo Iaiani and Sokratis K. Katsikas and Minna Nissil{\"{a}} and Gabriele Oliva and Eleni Richter and Maaike Roelofs and Mehdi Saman Azari and Roberto Setola and Wouter Stejin and Alessandro Tugnoli and Dolf Vanderbeek and Lars Westerdahl and Marja Yl{\"{o}}nen and Heather Young}, editor = {Simin Nadjm{-}Tehrani}, title = {White Paper on Industry Experiences in Critical Information Infrastructure Security: {A} Special Session at {CRITIS} 2019}, booktitle = {Critical Information Infrastructures Security - 14th International Conference, {CRITIS} 2019, Link{\"{o}}ping, Sweden, September 23-25, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11777}, pages = {197--207}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37670-3\_18}, doi = {10.1007/978-3-030-37670-3\_18}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/AssenzaCFGGHHIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcoss/KavallieratosGK19, author = {Georgios Kavallieratos and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {Threat Analysis in Dynamic Environments: The Case of the Smart Home}, booktitle = {15th International Conference on Distributed Computing in Sensor Systems, {DCOSS} 2019, Santorini, Greece, May 29-31, 2019}, pages = {234--240}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DCOSS.2019.00060}, doi = {10.1109/DCOSS.2019.00060}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dcoss/KavallieratosGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AmroGK19, author = {Ahmed Amro and Vasileios Gkioulos and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {69--85}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_5}, doi = {10.1007/978-3-030-42048-2\_5}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AmroGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seeda/SpathoulasEAMK19, author = {Georgios P. Spathoulas and Spyridon C. Evangelatos and Marios Anagnostopoulos and G. Mema and Sokratis K. Katsikas}, title = {Detection of abnormal behavior in smart-home environments}, booktitle = {4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, {SEEDA-CECNSM} 2019, Piraeus, Greece, September 20-22, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SEEDA-CECNSM.2019.8908352}, doi = {10.1109/SEEDA-CECNSM.2019.8908352}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seeda/SpathoulasEAMK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/MalamasDKBK19, author = {Vangelis Malamas and Thomas K. Dasaklis and Panayiotis Kotzanikolaou and Mike Burmester and Sokratis K. Katsikas}, editor = {Carl K. Chang and Peter Chen and Michael Goul and Katsunori Oyama and Stephan Reiff{-}Marganiec and Yanchun Sun and Shangguang Wang and Zhongjie Wang}, title = {A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain}, booktitle = {2019 {IEEE} World Congress on Services, {SERVICES} 2019, Milan, Italy, July 8-13, 2019}, pages = {35--40}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SERVICES.2019.00021}, doi = {10.1109/SERVICES.2019.00021}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/services/MalamasDKBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SpathoulasK19, author = {Georgios P. Spathoulas and Sokratis K. Katsikas}, editor = {Cristina Alcaraz}, title = {Towards a Secure Industrial Internet of Things}, booktitle = {Security and Privacy Trends in the Industrial Internet of Things}, pages = {29--45}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12330-7\_2}, doi = {10.1007/978-3-030-12330-7\_2}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SpathoulasK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12786-2}, doi = {10.1007/978-3-030-12786-2}, isbn = {978-3-030-12785-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2019, editor = {Stefanos Gritzalis and Edgar R. Weippl and Sokratis K. Katsikas and Gabriele Anderst{-}Kotsis and A Min Tjoa and Ismail Khalil}, title = {Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11711}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27813-7}, doi = {10.1007/978-3-030-27813-7}, isbn = {978-3-030-27812-0}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MichotaK18, author = {Alexandra K. Michota and Sokratis K. Katsikas}, title = {Towards improving existing online social networks' privacy policies}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {209--229}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013220}, doi = {10.1504/IJIPSI.2018.10013220}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MichotaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KavallieratosKG18, author = {Georgios Kavallieratos and Sokratis K. Katsikas and Vasileios Gkioulos}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {Cyber-Attacks Against the Autonomous Ship}, booktitle = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, pages = {20--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12786-2\_2}, doi = {10.1007/978-3-030-12786-2\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KavallieratosKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocybersec/CollenNAKGSGVTG18, author = {Anastasija Collen and Niels A. Nijdam and Javier Augusto{-}Gonzalez and Sokratis K. Katsikas and Konstantinos M. Giannoutakis and Georgios P. Spathoulas and Erol Gelenbe and Konstantinos Votis and Dimitrios Tzovaras and Navid Ghavami and Melanie Volkamer and Piroska Haller and Alvaro S{\'{a}}nchez and Miltiadis Dimas}, editor = {Erol Gelenbe and Paolo Campegiani and Tadeusz Czach{\'{o}}rski and Sokratis K. Katsikas and Ioannis Komnios and Luigi Romano and Dimitrios Tzovaras}, title = {{GHOST} - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control}, booktitle = {Security in Computer and Information Sciences - First International {ISCIS} Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {821}, pages = {68--78}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95189-8\_7}, doi = {10.1007/978-3-319-95189-8\_7}, timestamp = {Tue, 26 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocybersec/CollenNAKGSGVTG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocybersec/KouzinopoulosSG18, author = {Charalampos S. Kouzinopoulos and Georgios P. Spathoulas and Konstantinos M. Giannoutakis and Konstantinos Votis and Pankaj Pandey and Dimitrios Tzovaras and Sokratis K. Katsikas and Anastasija Collen and Niels A. Nijdam}, editor = {Erol Gelenbe and Paolo Campegiani and Tadeusz Czach{\'{o}}rski and Sokratis K. Katsikas and Ioannis Komnios and Luigi Romano and Dimitrios Tzovaras}, title = {Using Blockchains to Strengthen the Security of Internet of Things}, booktitle = {Security in Computer and Information Sciences - First International {ISCIS} Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {821}, pages = {90--100}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95189-8\_9}, doi = {10.1007/978-3-319-95189-8\_9}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocybersec/KouzinopoulosSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inista/KouzinopoulosGV18, author = {Charalampos S. Kouzinopoulos and Konstantinos M. Giannoutakis and Konstantinos Votis and Dimitrios Tzovaras and Anastasija Collen and Niels A. Nijdam and Dimitri Konstantas and Georgios P. Spathoulas and Pankaj Pandey and Sokratis K. Katsikas}, title = {Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust}, booktitle = {2018 Innovations in Intelligent Systems and Applications, {INISTA} 2018, Thessaloniki, Greece, July 3-5, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INISTA.2018.8466268}, doi = {10.1109/INISTA.2018.8466268}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/inista/KouzinopoulosGV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inista/SpathoulasCPNKK18, author = {Georgios P. Spathoulas and Anastasija Collen and Pankaj Pandey and Niels A. Nijdam and Sokratis K. Katsikas and Charalampos S. Kouzinopoulos and Maher Ben Moussa and Konstantinos M. Giannoutakis and Konstantinos Votis and Dimitrios Tzovaras}, title = {Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in {GHOST} Smart Contracts}, booktitle = {2018 Innovations in Intelligent Systems and Applications, {INISTA} 2018, Thessaloniki, Greece, July 3-5, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INISTA.2018.8466327}, doi = {10.1109/INISTA.2018.8466327}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/inista/SpathoulasCPNKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inista/TsolakisMVITPKK18, author = {Apostolos C. Tsolakis and Ioannis Moschos and Konstantinos Votis and Dimosthenis Ioannidis and Dimitrios Tzovaras and Pankaj Pandey and Sokratis K. Katsikas and Evangelos Kotsakis and Ra{\'{u}}l Garc{\'{\i}}a{-}Castro}, title = {A Secured and Trusted Demand Response system based on Blockchain technologies}, booktitle = {2018 Innovations in Intelligent Systems and Applications, {INISTA} 2018, Thessaloniki, Greece, July 3-5, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INISTA.2018.8466303}, doi = {10.1109/INISTA.2018.8466303}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/inista/TsolakisMVITPKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/AnastopoulosK18, author = {Vasileios Anastopoulos and Sokratis K. Katsikas}, editor = {Nikitas N. Karanikolas and Basilis Mamalis and John Kontos and Grammati E. Pantziou and Stefanos Gritzalis and Christos Douligeris}, title = {Design of a dynamic log management infrastructure using risk and affiliation network analysis}, booktitle = {Proceedings of the 22nd Pan-Hellenic Conference on Informatics, {PCI} 2018, Athens, Greece, November 29 - December 01, 2018}, pages = {52--57}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3291533.3291570}, doi = {10.1145/3291533.3291570}, timestamp = {Wed, 09 Jan 2019 11:35:09 +0100}, biburl = {https://dblp.org/rec/conf/pci/AnastopoulosK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2017cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-72817-9}, doi = {10.1007/978-3-319-72817-9}, isbn = {978-3-319-72816-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2017cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocybersec/2018, editor = {Erol Gelenbe and Paolo Campegiani and Tadeusz Czach{\'{o}}rski and Sokratis K. Katsikas and Ioannis Komnios and Luigi Romano and Dimitrios Tzovaras}, title = {Security in Computer and Information Sciences - First International {ISCIS} Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {821}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95189-8}, doi = {10.1007/978-3-319-95189-8}, isbn = {978-3-319-95188-1}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocybersec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2018, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3}, doi = {10.1007/978-3-030-01141-3}, isbn = {978-3-030-01140-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PatelAPBJK17, author = {Ahmed Patel and Hitham Alhussian and Jens Myrup Pedersen and Bouchaib Bounabat and Joaquim Celestino J{\'{u}}nior and Sokratis K. Katsikas}, title = {A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems}, journal = {Comput. Secur.}, volume = {64}, pages = {92--109}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.07.002}, doi = {10.1016/J.COSE.2016.07.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PatelAPBJK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OppligerPK17, author = {Rolf Oppliger and G{\"{u}}nther Pernul and Sokratis K. Katsikas}, title = {New Frontiers: Assessing and Managing Security Risks}, journal = {Computer}, volume = {50}, number = {4}, pages = {48--51}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.93}, doi = {10.1109/MC.2017.93}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OppligerPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/GkioulosWK17, author = {Vasileios Gkioulos and Gaute Wangen and Sokratis K. Katsikas}, title = {User Modelling Validation over the Security Awareness of Digital Natives}, journal = {Future Internet}, volume = {9}, number = {3}, pages = {32}, year = {2017}, url = {https://doi.org/10.3390/fi9030032}, doi = {10.3390/FI9030032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/GkioulosWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/GkioulosWKKK17, author = {Vasileios Gkioulos and Gaute Wangen and Sokratis K. Katsikas and George K. Karagiannidis and Panayiotis Kotzanikolaou}, title = {Security Awareness of the Digital Natives}, journal = {Inf.}, volume = {8}, number = {2}, pages = {42}, year = {2017}, url = {https://doi.org/10.3390/info8020042}, doi = {10.3390/INFO8020042}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/GkioulosWKKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnastopoulosK17, author = {Vasileios Anastopoulos and Sokratis K. Katsikas}, title = {A structured methodology for deploying log management in WANs}, journal = {J. Inf. Secur. Appl.}, volume = {34}, pages = {120--132}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.02.004}, doi = {10.1016/J.JISA.2017.02.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AnastopoulosK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Katsikas17, author = {Sokratis K. Katsikas}, editor = {Jianying Zhou and Ernesto Damiani}, title = {Cyber Security of the Autonomous Ship}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {55--56}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055186.3055191}, doi = {10.1145/3055186.3055191}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Katsikas17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/MichotaK17, author = {Alexandra K. Michota and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Vasilios Zorkadis}, title = {Default {OSN} Privacy Settings: Privacy Risks}, booktitle = {E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services - 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {792}, pages = {64--78}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71117-1\_5}, doi = {10.1007/978-3-319-71117-1\_5}, timestamp = {Mon, 30 Jul 2018 16:44:51 +0200}, biburl = {https://dblp.org/rec/conf/edemocracy/MichotaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/edemocracy/2017, editor = {Sokratis K. Katsikas and Vasilios Zorkadis}, title = {E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services - 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {792}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71117-1}, doi = {10.1007/978-3-319-71117-1}, isbn = {978-3-319-71116-4}, timestamp = {Mon, 30 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edemocracy/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2016cybericps, editor = {Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas}, title = {Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10166}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61437-3}, doi = {10.1007/978-3-319-61437-3}, isbn = {978-3-319-61436-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2016cybericps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AnastopoulosK16, author = {Vasileios Anastopoulos and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Steven Furnell}, title = {Design of a Log Management Infrastructure Using Meta-Network Analysis}, booktitle = {Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9830}, pages = {97--110}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44341-6\_7}, doi = {10.1007/978-3-319-44341-6\_7}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/AnastopoulosK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2015cyberics, editor = {Adrien B{\'{e}}cue and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas and Costas Lambrinoudakis}, title = {Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9588}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40385-4}, doi = {10.1007/978-3-319-40385-4}, isbn = {978-3-319-40384-7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2015cyberics.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2016-1, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4}, doi = {10.1007/978-3-319-45744-4}, isbn = {978-3-319-45743-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2016-2, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3}, doi = {10.1007/978-3-319-45741-3}, isbn = {978-3-319-45740-6}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2016, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Steven Furnell}, title = {Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9830}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44341-6}, doi = {10.1007/978-3-319-44341-6}, isbn = {978-3-319-44340-9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/MichotaK15, author = {Alexandra K. Michota and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Alexander B. Sideridis}, title = {Tagged Data Breaches in Online Social Networks}, booktitle = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms - 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings}, series = {Communications in Computer and Information Science}, volume = {570}, pages = {95--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27164-4\_7}, doi = {10.1007/978-3-319-27164-4\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edemocracy/MichotaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/MichotaK15, author = {Alexandra K. Michota and Sokratis K. Katsikas}, editor = {Nikitas N. Karanikolas and Demosthenes Akoumianakis and Mara Nikolaidou and Dimitrios D. Vergados and Michalis Xenos and George M. Giaglis and Stefanos Gritzalis and Lazaros F. Merakos and Panagiotis Tsanakas and Cleo Sgouropoulou}, title = {Designing a seamless privacy policy for social networks}, booktitle = {Proceedings of the 19th Panhellenic Conference on Informatics, {PCI} 2015, Athens, Greece, October 1-3, 2015}, pages = {139--143}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2801948.2801998}, doi = {10.1145/2801948.2801998}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/MichotaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/DarraSK15, author = {Eleni Darra and Christina Skouloudi and Sokratis K. Katsikas}, editor = {Nikitas N. Karanikolas and Demosthenes Akoumianakis and Mara Nikolaidou and Dimitrios D. Vergados and Michalis Xenos and George M. Giaglis and Stefanos Gritzalis and Lazaros F. Merakos and Panagiotis Tsanakas and Cleo Sgouropoulou}, title = {A simulation platform for evaluating DoS attacks in wireless sensor networks}, booktitle = {Proceedings of the 19th Panhellenic Conference on Informatics, {PCI} 2015, Athens, Greece, October 1-3, 2015}, pages = {144--149}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2801948.2801949}, doi = {10.1145/2801948.2801949}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/DarraSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/edemocracy/2015, editor = {Sokratis K. Katsikas and Alexander B. Sideridis}, title = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms - 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings}, series = {Communications in Computer and Information Science}, volume = {570}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27164-4}, doi = {10.1007/978-3-319-27164-4}, isbn = {978-3-319-27163-7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edemocracy/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalt/Katsikas14, author = {Sokratis K. Katsikas}, title = {National Policy on Technology Supported Education in Greece}, booktitle = {{IEEE} 14th International Conference on Advanced Learning Technologies, {ICALT} 2014, Athens, Greece, July 7-10, 2014}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICALT.2014.8}, doi = {10.1109/ICALT.2014.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalt/Katsikas14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/AnastopoulosK14, author = {Vasileios Anastopoulos and Sokratis K. Katsikas}, title = {A methodology for building a log management infrastructure}, booktitle = {2014 {IEEE} International Symposium on Signal Processing and Information Technology, {ISSPIT} 2014, Noida, India, December 15-17, 2014}, pages = {301--306}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISSPIT.2014.7300604}, doi = {10.1109/ISSPIT.2014.7300604}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/AnastopoulosK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/MichotaK14, author = {Alexandra K. Michota and Sokratis K. Katsikas}, editor = {Mohamad Badra and Omar Alfandi}, title = {Compliance of the Facebook Data Use Policy with the Principles of {ISO} 29100: 2011}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814012}, doi = {10.1109/NTMS.2014.6814012}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/MichotaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/KoutsourelisK14, author = {Dimitrios Koutsourelis and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Michael Hatzopoulos and Theodoros Apostolopoulos and Dimosthenis Anagnostopoulos and Elias Carayiannis and Theodora A. Varvarigou and Mara Nikolaidou}, title = {Designing and developing a free Data Loss Prevention system}, booktitle = {18th Panhellenic Conference on Informatics, {PCI} '14, Athens, Greece, October 2-4, 2014}, pages = {14:1--14:5}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2645791.2645833}, doi = {10.1145/2645791.2645833}, timestamp = {Tue, 06 Nov 2018 11:06:43 +0100}, biburl = {https://dblp.org/rec/conf/pci/KoutsourelisK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/TasiopoulosK14, author = {Vasilis G. Tasiopoulos and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Michael Hatzopoulos and Theodoros Apostolopoulos and Dimosthenis Anagnostopoulos and Elias Carayiannis and Theodora A. Varvarigou and Mara Nikolaidou}, title = {Bypassing Antivirus Detection with Encryption}, booktitle = {18th Panhellenic Conference on Informatics, {PCI} '14, Athens, Greece, October 2-4, 2014}, pages = {16:1--16:2}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2645791.2645857}, doi = {10.1145/2645791.2645857}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/TasiopoulosK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/MichotaK14, author = {Alexandra K. Michota and Sokratis K. Katsikas}, editor = {Boualem Benatallah and Azer Bestavros and Barbara Catania and Armin Haller and Yannis Manolopoulos and Athena Vakali and Yanchun Zhang}, title = {Compliance of the LinkedIn Privacy Policy with the Principles of the {ISO} 29100: 2011 Standard}, booktitle = {Web Information Systems Engineering - {WISE} 2014 Workshops - 15th International Workshops {IWCSN} 2014, Org2 2014, {PCS} 2014, and {QUAT} 2014, Thessaloniki, Greece, October 12-14, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9051}, pages = {72--83}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-20370-6\_6}, doi = {10.1007/978-3-319-20370-6\_6}, timestamp = {Sun, 02 Jun 2019 21:10:49 +0200}, biburl = {https://dblp.org/rec/conf/wise/MichotaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2013, editor = {Sokratis K. Katsikas and Isaac Agudo}, title = {Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8341}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-53997-8}, doi = {10.1007/978-3-642-53997-8}, isbn = {978-3-642-53996-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pci/2014, editor = {Sokratis K. Katsikas and Michael Hatzopoulos and Theodoros Apostolopoulos and Dimosthenis Anagnostopoulos and Elias Carayiannis and Theodora A. Varvarigou and Mara Nikolaidou}, title = {18th Panhellenic Conference on Informatics, {PCI} '14, Athens, Greece, October 2-4, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2645791}, doi = {10.1145/2645791}, isbn = {978-1-4503-2897-5}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2014, editor = {Claudia Eckert and Sokratis K. Katsikas and G{\"{u}}nther Pernul}, title = {Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8647}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09770-1}, doi = {10.1007/978-3-319-09770-1}, isbn = {978-3-319-09769-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpathoulasK13, author = {Georgios P. Spathoulas and Sokratis K. Katsikas}, title = {Enhancing {IDS} performance through comprehensive alert post-processing}, journal = {Comput. Secur.}, volume = {37}, pages = {176--196}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.03.005}, doi = {10.1016/J.COSE.2013.03.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpathoulasK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/SpathoulasKC13, author = {Georgios P. Spathoulas and Sokratis K. Katsikas and Anastasios Charoulis}, editor = {Sokratis K. Katsikas and Isaac Agudo}, title = {A Test-Bed for Intrusion Detection Systems Results Post-processing}, booktitle = {Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8341}, pages = {170--183}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-53997-8\_11}, doi = {10.1007/978-3-642-53997-8\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/SpathoulasKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KantzavelouK13, author = {Ioanna Kantzavelou and Sokratis K. Katsikas}, editor = {Sokratis K. Katsikas and Isaac Agudo}, title = {Uncertainty in Intrusion Detection Signaling Games}, booktitle = {Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8341}, pages = {184--203}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-53997-8\_12}, doi = {10.1007/978-3-642-53997-8\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/KantzavelouK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iisa/DarraK13, author = {Eleni Darra and Sokratis K. Katsikas}, editor = {Nikolaos G. Bourbakis and George A. Tsihrintzis and Maria Virvou}, title = {Attack detection capabilities of intrusion detection systems for Wireless Sensor Networks}, booktitle = {4th International Conference on Information, Intelligence, Systems and Applications, {IISA} 2013, Piraeus, Greece, July 10-12, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IISA.2013.6623718}, doi = {10.1109/IISA.2013.6623718}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iisa/DarraK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/petra/KantzavelouTK13, author = {Ioanna Kantzavelou and Panagiotis F. Tzikopoulos and Sokratis K. Katsikas}, editor = {Fillia Makedon and Margrit Betke and Magy Seif El{-}Nasr and Ilias Maglogiannis}, title = {Detecting intrusive activities from insiders in a wireless sensor network using game theory}, booktitle = {The 6th International Conference on PErvasive Technologies Related to Assistive Environments, {PETRA} '13, Island of Rhodes, Greece, May 29-31, 2013}, pages = {15:1--15:8}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2504335.2504350}, doi = {10.1145/2504335.2504350}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/petra/KantzavelouTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AggelinosK13, author = {George Aggelinos and Sokratis K. Katsikas}, editor = {Steven Furnell and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {The Security of Information Systems in Greek Hospitals}, booktitle = {Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8058}, pages = {112--123}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40343-9\_10}, doi = {10.1007/978-3-642-40343-9\_10}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/AggelinosK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/med/Katsikas13, author = {Sokratis K. Katsikas}, editor = {Borko Furht and Ankur Agarwal}, title = {Security of the Electronic Medical Record}, booktitle = {Handbook of Medical and Healthcare Technologies}, pages = {401--416}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-8495-0\_18}, doi = {10.1007/978-1-4614-8495-0\_18}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/med/Katsikas13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/AggelinosK12, author = {George Aggelinos and Sokratis K. Katsikas}, title = {Disaster Recovery Analysis and Management Method {(DRAMM):} An {IT} Management Tool}, booktitle = {16th Panhellenic Conference on Informatics, {PCI} 2012, Piraeus, Greece, October 5-7, 2012}, pages = {99--104}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PCi.2012.56}, doi = {10.1109/PCI.2012.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/AggelinosK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2012, editor = {Simone Fischer{-}H{\"{u}}bner and Sokratis K. Katsikas and Gerald Quirchmayr}, title = {Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7449}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32287-7}, doi = {10.1007/978-3-642-32287-7}, isbn = {978-3-642-32286-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AggelinosK11, author = {George Aggelinos and Sokratis K. Katsikas}, title = {Enhancing {SSADM} with Disaster Recovery Plan activities}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {4}, pages = {248--261}, year = {2011}, url = {https://doi.org/10.1108/09685221111173067}, doi = {10.1108/09685221111173067}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AggelinosK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/DarraNXK11, author = {Eleni Darra and Christoforos Ntantogian and Christos Xenakis and Sokratis K. Katsikas}, editor = {Steven Furnell and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks}, booktitle = {Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6863}, pages = {138--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22890-2\_12}, doi = {10.1007/978-3-642-22890-2\_12}, timestamp = {Mon, 03 Jan 2022 22:15:13 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/DarraNXK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpathoulasK10, author = {Georgios P. Spathoulas and Sokratis K. Katsikas}, title = {Reducing false positives in intrusion detection systems}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {35--44}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.008}, doi = {10.1016/J.COSE.2009.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpathoulasK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KantzavelouK10, author = {Ioanna Kantzavelou and Sokratis K. Katsikas}, title = {A game-based intrusion detection mechanism to confront internal attackers}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {859--874}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.06.002}, doi = {10.1016/J.COSE.2010.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KantzavelouK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2010, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2010}, isbn = {978-989-8425-18-8}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2010, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Miguel Soriano}, title = {Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6264}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15152-1}, doi = {10.1007/978-3-642-15152-1}, isbn = {978-3-642-15151-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisK09, author = {Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Editorial}, journal = {Comput. Secur.}, volume = {28}, number = {5}, pages = {247}, year = {2009}, url = {https://doi.org/10.1016/S0167-4048(09)00038-8}, doi = {10.1016/S0167-4048(09)00038-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ems/KostisGGK09, author = {Theodoros G. Kostis and Athanasios K. Goudosis and Konstantinos G. Galanis and Sokratis K. Katsikas}, editor = {David Al{-}Dabass and Sokratis K. Katsikas and Ioannis Koukos and Richard N. Zobel}, title = {Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues}, booktitle = {{EMS} 2009, Third UKSim European Symposium on Computer Modeling and Simulation, 25-27 November 2009, Athens, Greece}, pages = {130--135}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/EMS.2009.23}, doi = {10.1109/EMS.2009.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ems/KostisGGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcis/AggelinosK09, author = {George Aggelinos and Sokratis K. Katsikas}, editor = {Angeliki Poulymenakou and Nancy Pouloudi and Katerina Pramatari}, title = {Integrating Disaster Recovery Plan Activities Into The System Development Life Cycle}, booktitle = {The 4th Mediterranean Conference on Information Systems, {MCIS} 2009, Athens University of Economics and Business, AUEB, Athens, Greece, 25-27 September 2009}, pages = {76}, publisher = {Athens University of Economics and Business / AISeL}, year = {2009}, url = {http://aisel.aisnet.org/mcis2009/76}, timestamp = {Tue, 19 Nov 2013 18:10:36 +0100}, biburl = {https://dblp.org/rec/conf/mcis/AggelinosK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ems/2009, editor = {David Al{-}Dabass and Sokratis K. Katsikas and Ioannis Koukos and Richard N. Zobel}, title = {{EMS} 2009, Third UKSim European Symposium on Computer Modeling and Simulation, 25-27 November 2009, Athens, Greece}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5358680/proceeding}, isbn = {978-0-7695-3886-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ems/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BalopoulosGK08, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, title = {Specifying and implementing privacy-preserving cryptographic protocols}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {395--420}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0057-y}, doi = {10.1007/S10207-008-0057-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BalopoulosGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmic/PappasMK08, author = {Stylianos Sp. Pappas and Vassilios C. Moussas and Sokratis K. Katsikas}, title = {Application of the multi-model partitioning theory for simultaneous order and parameter estimation of multivariate {ARMA} models}, journal = {Int. J. Model. Identif. Control.}, volume = {4}, number = {3}, pages = {242--249}, year = {2008}, url = {https://doi.org/10.1504/IJMIC.2008.021161}, doi = {10.1504/IJMIC.2008.021161}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmic/PappasMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/PappasEKKL08, author = {Stylianos Sp. Pappas and Lambros Ekonomou and Panagiotis Karampelas and Sokratis K. Katsikas and Panos Liatsis}, title = {Modeling of the grounding resistance variation using {ARMA} models}, journal = {Simul. Model. Pract. Theory}, volume = {16}, number = {5}, pages = {560--570}, year = {2008}, url = {https://doi.org/10.1016/j.simpat.2008.02.009}, doi = {10.1016/J.SIMPAT.2008.02.009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpra/PappasEKKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YannacopoulosLGXK08, author = {Athanasios N. Yannacopoulos and Costas Lambrinoudakis and Stefanos Gritzalis and Stylianos Z. Xanthopoulos and Sokratis K. Katsikas}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for {ICT} Firms}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {207--222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_14}, doi = {10.1007/978-3-540-88313-5\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YannacopoulosLGXK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/MichailidisKG08, author = {Emmanuel S. Michailidis and Sokratis K. Katsikas and Efstratios F. Georgopoulos}, title = {Intrusion Detection Using Evolutionary Neural Networks}, booktitle = {Panhellenic Conference on Informatics, {PCI} 2008, August 28-30, 2008, Samos Island, Greece, Proceedings}, pages = {8--12}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PCI.2008.53}, doi = {10.1109/PCI.2008.53}, timestamp = {Sat, 30 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/MichailidisKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/PappasHKEK08, author = {Stylianos Sp. Pappas and Nicholas Harkiolakis and Panagiotis Karampelas and Lambros Ekonomou and Sokratis K. Katsikas}, title = {A New Algorithm for On-Line Multivariate {ARMA} Identification Using Multimodel Partitioning Theory}, booktitle = {Panhellenic Conference on Informatics, {PCI} 2008, August 28-30, 2008, Samos Island, Greece, Proceedings}, pages = {222--226}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PCI.2008.24}, doi = {10.1109/PCI.2008.24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/PappasHKEK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/KantzavelouK08, author = {Ioanna Kantzavelou and Sokratis K. Katsikas}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A Generic Intrusion Detection Game Model in {IT} Security}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {151--162}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_15}, doi = {10.1007/978-3-540-85735-8\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/KantzavelouK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2008, editor = {Stig Fr. Mj{\o}lsnes and Sjouke Mauw and Sokratis K. Katsikas}, title = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5057}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69485-4}, doi = {10.1007/978-3-540-69485-4}, isbn = {978-3-540-69484-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2008, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8}, doi = {10.1007/978-3-540-85735-8}, isbn = {978-3-540-85734-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GritzalisYLHK07, author = {Stefanos Gritzalis and Athanasios N. Yannacopoulos and Costas Lambrinoudakis and Petros Hatzopoulos and Sokratis K. Katsikas}, title = {A probabilistic model for optimal insurance contracts against security risks and privacy violation in {IT} outsourcing environments}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {4}, pages = {197--211}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0010-x}, doi = {10.1007/S10207-006-0010-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GritzalisYLHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PernulMFKKO07, author = {G{\"{u}}nther Pernul and Marco Casassa Mont and Eduardo B. Fern{\'{a}}ndez and Sokratis K. Katsikas and Alfred Kobsa and Rolf Oppliger}, editor = {Costas Lambrinoudakis and G{\"{u}}nther Pernul and A Min Tjoa}, title = {Panel Discussion: Managing Digital Identities - Challenges and Opportunities}, booktitle = {Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4657}, pages = {2}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74409-2\_2}, doi = {10.1007/978-3-540-74409-2\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/PernulMFKKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/PappasLK06, author = {Stylianos Sp. Pappas and Assimakis K. Leros and Sokratis K. Katsikas}, title = {Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory}, journal = {Digit. Signal Process.}, volume = {16}, number = {6}, pages = {782--795}, year = {2006}, url = {https://doi.org/10.1016/j.dsp.2006.06.006}, doi = {10.1016/J.DSP.2006.06.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/PappasLK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DelivasilisK06, author = {Dimitrios L. Delivasilis and Sokratis K. Katsikas}, title = {Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {1}, pages = {44--50}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n1/ijns-2006-v3-n1-p44-50.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DelivasilisK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/FrantzeskouSGK06, author = {Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Leon J. Osterweil and H. Dieter Rombach and Mary Lou Soffa}, title = {Effective identification of source code authors using byte-level information}, booktitle = {28th International Conference on Software Engineering {(ICSE} 2006), Shanghai, China, May 20-28, 2006}, pages = {893--896}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134285.1134445}, doi = {10.1145/1134285.1134445}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/FrantzeskouSGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/BelsisGK06, author = {Petros Belsis and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Ilias Maglogiannis and Kostas Karpouzis and Max Bramer}, title = {Optimized Multi-Domain Secure Interoperation using Soft Constraints}, booktitle = {Artificial Intelligence Applications and Innovations, 3rd {IFIP} Conference on Artificial Intelligence Applications and Innovations {(AIAI)} 2006, June 7-9, 2006, Athens, Greece}, series = {{IFIP}}, volume = {204}, pages = {78--85}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-34224-9\_10}, doi = {10.1007/0-387-34224-9\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/BelsisGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/FrantzeskouSGK06, author = {Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Ilias Maglogiannis and Kostas Karpouzis and Max Bramer}, title = {Source Code Author Identification Based on N-gram Author Profiles}, booktitle = {Artificial Intelligence Applications and Innovations, 3rd {IFIP} Conference on Artificial Intelligence Applications and Innovations {(AIAI)} 2006, June 7-9, 2006, Athens, Greece}, series = {{IFIP}}, volume = {204}, pages = {508--515}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-34224-9\_59}, doi = {10.1007/0-387-34224-9\_59}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/FrantzeskouSGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BalopoulosGKKGK06, author = {Theodoros Balopoulos and Lazaros Gymnopoulos and Maria Karyda and Spyros Kokolakis and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Simone Fischer{-}H{\"{u}}bner and Steven Furnell and Costas Lambrinoudakis}, title = {A Framework for Exploiting Security Expertise in Application Development}, booktitle = {Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4083}, pages = {62--70}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11824633\_7}, doi = {10.1007/11824633\_7}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/BalopoulosGKKGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BelsisGK07, author = {Petros Belsis and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {75--86}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.032}, doi = {10.1016/J.ENTCS.2006.08.032}, timestamp = {Tue, 24 Jan 2023 13:29:56 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BelsisGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2006, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810}, doi = {10.1007/11836810}, isbn = {3-540-38341-7}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BalopoulosGK05, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, title = {Specifying Privacy-Preserving Protocols in Typed {MSR}}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {5}, pages = {501--512}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2005.01.008}, doi = {10.1016/J.CSI.2005.01.008}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/BalopoulosGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LambrinoudakisGHYK05, author = {Costas Lambrinoudakis and Stefanos Gritzalis and Petros Hatzopoulos and Athanasios N. Yannacopoulos and Sokratis K. Katsikas}, title = {A formal model for pricing information systems insurance contracts}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {5}, pages = {521--532}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2005.01.010}, doi = {10.1016/J.CSI.2005.01.010}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LambrinoudakisGHYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/KatsikasLP05, author = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Editorial}, journal = {Comput. Syst. Sci. Eng.}, volume = {20}, number = {6}, year = {2005}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/KatsikasLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/KatsikasLP05a, author = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Trust, privacy and security in digital business}, journal = {Comput. Syst. Sci. Eng.}, volume = {20}, number = {6}, year = {2005}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/KatsikasLP05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/MoussasLKL05, author = {Vassilios C. Moussas and Spiridon D. Likothanassis and Sokratis K. Katsikas and Assimakis K. Leros}, title = {Adaptive on-line multiple source detection}, booktitle = {2005 {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} '05, Philadelphia, Pennsylvania, USA, March 18-23, 2005}, pages = {1029--1032}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICASSP.2005.1416187}, doi = {10.1109/ICASSP.2005.1416187}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/MoussasLKL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/KatsikasLP05, author = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, editor = {Panayiotis Bozanis and Elias N. Houstis}, title = {Trust, Privacy and Security in E-Business: Requirements and Solutions}, booktitle = {Advances in Informatics, 10th Panhellenic Conference on Informatics, {PCI} 2005, Volos, Greece, November 11-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3746}, pages = {548--558}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11573036\_52}, doi = {10.1007/11573036\_52}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/pci/KatsikasLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/PappasLK05, author = {Stylianos Sp. Pappas and Assimakis K. Leros and Sokratis K. Katsikas}, editor = {Panayiotis Bozanis and Elias N. Houstis}, title = {Multivariate {AR} Model Order Estimation with Unknown Process Order}, booktitle = {Advances in Informatics, 10th Panhellenic Conference on Informatics, {PCI} 2005, Volos, Greece, November 11-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3746}, pages = {787--797}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11573036\_75}, doi = {10.1007/11573036\_75}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/PappasLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BalopoulosGK05, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Specifying electronic voting protocols in typed {MSR}}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {35--39}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102207}, doi = {10.1145/1102199.1102207}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BalopoulosGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2005, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3592}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11537878}, doi = {10.1007/11537878}, isbn = {3-540-28224-6}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/BalopoulosGK04, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {David Chadwick and Bart Preneel}, title = {An Extension of Typed {MSR} for Specifying Esoteric Protocols and Their Dolev-Yao Intruder}, booktitle = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11} Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom}, series = {{IFIP}}, volume = {175}, pages = {209--221}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24486-7\_16}, doi = {10.1007/0-387-24486-7\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/BalopoulosGK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11/Katsikas04, author = {Sokratis K. Katsikas}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Doctoral Programme on Information and Communication Systems Security at the University of the Aegean}, booktitle = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, pages = {153--158}, publisher = {Kluwer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8145-6\_12}, doi = {10.1007/1-4020-8145-6\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11/Katsikas04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/KatsikasYGLH04, author = {Sokratis K. Katsikas and Athanasios N. Yannacopoulos and Stefanos Gritzalis and Costas Lambrinoudakis and Petros Hatzopoulos}, editor = {Paul Dowland and Steven Furnell and Bhavani Thuraisingham and Xiaoyang Sean Wang}, title = {How Much Should We Pay for Security? (Invited Paper)}, booktitle = {Security Management, Integrity, and Internal Control in Information Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}}, series = {{IFIP}}, volume = {193}, pages = {59--69}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-31167-X\_4}, doi = {10.1007/0-387-31167-X\_4}, timestamp = {Tue, 16 May 2023 22:42:09 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/KatsikasYGLH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2004, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98201}, doi = {10.1007/B98201}, isbn = {3-540-22216-2}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2004, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3184}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b99832}, doi = {10.1007/B99832}, isbn = {3-540-22919-1}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KatsikasP03, author = {Sokratis K. Katsikas and Ahmed Patel}, title = {Special issue: securing computer communications with Public Key Infrastructure}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1813--1814}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00076-8}, doi = {10.1016/S0140-3664(03)00076-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/KatsikasP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/LambrinoudakisKKTGK03, author = {Costas Lambrinoudakis and Spyros Kokolakis and Maria Karyda and Vassilis Tsoumas and Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Electronic Voting Systems: Security Implications of the Administrative Workflow}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {467--471}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232067}, doi = {10.1109/DEXA.2003.1232067}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/LambrinoudakisKKTGK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MitrouGKQ03, author = {Lilian Mitrou and Dimitris Gritzalis and Sokratis K. Katsikas and Gerald Quirchmayr}, editor = {Dimitris Gritzalis}, title = {Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {43--60}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_4}, doi = {10.1007/978-1-4615-0239-5\_4}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/MitrouGKQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2003, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, publisher = {Kluwer}, year = {2003}, isbn = {1-4020-7449-2}, timestamp = {Fri, 25 Apr 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/LekkasGK02, author = {Dimitrios Lekkas and Stefanos Gritzalis and Sokratis K. Katsikas}, title = {Quality assured trusted third parties for deploying secure internet-based healthcare applications}, journal = {Int. J. Medical Informatics}, volume = {65}, number = {2}, pages = {79--96}, year = {2002}, url = {https://doi.org/10.1016/S1386-5056(02)00006-0}, doi = {10.1016/S1386-5056(02)00006-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmi/LekkasGK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/LambrinoudakisGK02, author = {Costas Lambrinoudakis and Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Building a Reliable e-Voting System: Functional Requirements and Legal Constraints}, booktitle = {13th International Workshop on Database and Expert Systems Applications {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France}, pages = {435}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/DEXA.2002.1045934}, doi = {10.1109/DEXA.2002.1045934}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/LambrinoudakisGK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MitrouGK02, author = {Lilian Mitrou and Dimitris Gritzalis and Sokratis K. Katsikas}, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {Revisiting Legal and Regulatory Requirements for Secure E-Voting}, booktitle = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, pages = {469--480}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 06 Nov 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/MitrouGK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/RaptisSK01, author = {Konstantinos Raptis and Diomidis Spinellis and Sokratis K. Katsikas}, title = {Multi-technology distributed objects and their integration}, journal = {Comput. Stand. Interfaces}, volume = {23}, number = {3}, pages = {157--168}, year = {2001}, url = {https://doi.org/10.1016/S0920-5489(01)00070-8}, doi = {10.1016/S0920-5489(01)00070-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/RaptisSK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/KatsikasLBBF01, author = {Sokratis K. Katsikas and Spiridon D. Likothanassis and Grigorios N. Beligiannis and K. G. Berkeris and Dimitris Fotakis}, title = {Genetically determined variable structure multiple model estimation}, journal = {{IEEE} Trans. Signal Process.}, volume = {49}, number = {10}, pages = {2253--2261}, year = {2001}, url = {https://doi.org/10.1109/78.950781}, doi = {10.1109/78.950781}, timestamp = {Thu, 24 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/KatsikasLBBF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hercma/LekkasGK01, author = {Dimitrios Lekkas and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Elias A. Lipitakis}, title = {Towards an {ISO-9000} compliant certification service provider}, booktitle = {Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), Athens, Greece, September 20-22, 2001}, pages = {390--397}, publisher = {{LEA} Press, Athens, Hellas}, year = {2001}, timestamp = {Wed, 20 Jun 2018 09:48:24 +0200}, biburl = {https://dblp.org/rec/conf/hercma/LekkasGK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisKLMP00, author = {Stefanos Gritzalis and Sokratis K. Katsikas and Dimitrios Lekkas and Konstantinos Moulinos and Eleni Polydoro}, title = {Securing The Electronic Market: The {KEYSTONE} Public Key Infrastructure Architecture}, journal = {Comput. Secur.}, volume = {19}, number = {8}, pages = {731--746}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)08022-6}, doi = {10.1016/S0167-4048(00)08022-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisKLMP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/Katsikas00, author = {Sokratis K. Katsikas}, title = {Health care management and information systems security: awareness, training or education?}, journal = {Int. J. Medical Informatics}, volume = {60}, number = {2}, pages = {129--135}, year = {2000}, url = {https://doi.org/10.1016/S1386-5056(00)00112-X}, doi = {10.1016/S1386-5056(00)00112-X}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/Katsikas00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IliadisSGPK00, author = {John Iliadis and Diomidis Spinellis and Dimitris Gritzalis and Bart Preneel and Sokratis K. Katsikas}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Evaluating certificate status information mechanisms}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {1--8}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352603}, doi = {10.1145/352600.352603}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IliadisSGPK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Katsikas00, author = {Sokratis K. Katsikas}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {A Postgraduate Programme on Information and Communication Systems Security}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {49--58}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 26 Jul 2002 13:04:43 +0200}, biburl = {https://dblp.org/rec/conf/sec/Katsikas00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpinellisGIGK99, author = {Diomidis Spinellis and Stefanos Gritzalis and John Iliadis and Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Trusted third party services for deploying secure telemedical applications over the {WWW}}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {627--639}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82041-0}, doi = {10.1016/S0167-4048(99)82041-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpinellisGIGK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucc/LainiotisGK99, author = {Demetrios G. Lainiotis and Pavlos K. Giannakopoulos and Sokratis K. Katsikas}, title = {Passive target tracking with non Gaussian initial conditions}, booktitle = {5th European Control Conference, {ECC} 1999, Karlsruhe, Germany, August 31 - September 3, 1999}, pages = {1306--1309}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.23919/ECC.1999.7099491}, doi = {10.23919/ECC.1999.7099491}, timestamp = {Fri, 12 Mar 2021 16:09:40 +0100}, biburl = {https://dblp.org/rec/conf/eucc/LainiotisGK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/KatsikasSIB98, author = {Sokratis K. Katsikas and Diomidis D. Spinellis and John Iliadis and Bernd Blobel}, title = {Using trusted third parties for secure telemedical applications over the {WWW:} The {EUROMED-ETS} approach}, journal = {Int. J. Medical Informatics}, volume = {49}, number = {1}, pages = {59--68}, year = {1998}, url = {https://doi.org/10.1016/S1386-5056(98)00011-2}, doi = {10.1016/S1386-5056(98)00011-2}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/KatsikasSIB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npsc/LainiotisGK98, author = {Demetrios G. Lainiotis and Pavlos K. Giannakopoulos and Sokratis K. Katsikas}, title = {Estimation for Linear Systems with Non-Gaussian Initial State: Centralized and Decentralized Partitioning Algorithms}, journal = {Neural Parallel Sci. Comput.}, volume = {6}, number = {4}, pages = {479--499}, year = {1998}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npsc/LainiotisGK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/PlataniotisKLV98, author = {Konstantinos N. Plataniotis and Sokratis K. Katsikas and Demetrios G. Lainiotis and Anastasios N. Venetsanopoulos}, title = {Optimal seismic deconvolution: distributed algorithms}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {36}, number = {3}, pages = {779--792}, year = {1998}, url = {https://doi.org/10.1109/36.673671}, doi = {10.1109/36.673671}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgrs/PlataniotisKLV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medinfo/FurnellGKMSW98, author = {Steven Furnell and Dimitris Gritzalis and Sokratis K. Katsikas and Konstantinos Mavroudakis and Peter W. Sanders and Matthew J. Warren}, editor = {Branko Cesnik and Alexa Thorlichen McCray and Jean{-}Raoul Scherrer}, title = {Methods of Responding to Healthcare Security Incidents}, booktitle = {{MEDINFO} '98 - 9th World Congress on Medical Informatics, Seoul, South Korea, August 14-21, 1998}, series = {Studies in Health Technology and Informatics}, volume = {52}, pages = {1138--1142}, publisher = {{IOS} Press}, year = {1998}, url = {https://doi.org/10.3233/978-1-60750-896-0-1138}, doi = {10.3233/978-1-60750-896-0-1138}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/medinfo/FurnellGKMSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/ApostolopoulosDKM98, author = {Theodore K. Apostolopoulos and Victoria C. Daskalou and Sokratis K. Katsikas and K. D. Moulinos}, title = {Enforcing Security Policies in Large Scale Communication Networks}, booktitle = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS} 1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings}, pages = {393--397}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/RELDIS.1998.740529}, doi = {10.1109/RELDIS.1998.740529}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/ApostolopoulosDKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KantzavelouK97, author = {Ioanna Kantzavelou and Sokratis K. Katsikas}, editor = {Louise Yngstr{\"{o}}m and Jan Carlsen}, title = {An attack detection system for secure computer systems - outline of the solution}, booktitle = {Information Security in Research and Business, Proceedings of the {IFIP} {TC11} 13th International Conference on Information Security {(SEC} '97), 14-16 May 1997, Copenhagen, Denmark}, series = {{IFIP} Conference Proceedings}, volume = {92}, pages = {123--135}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Thu, 03 Jan 2002 12:08:24 +0100}, biburl = {https://dblp.org/rec/conf/sec/KantzavelouK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KatsikasSGD96, author = {Sokratis K. Katsikas and Thomas Spyrou and Dimitris Gritzalis and John Darzentas}, title = {Model for network behaviour under viral attack}, journal = {Comput. Commun.}, volume = {19}, number = {2}, pages = {124--132}, year = {1996}, url = {https://doi.org/10.1016/0140-3664(95)01033-5}, doi = {10.1016/0140-3664(95)01033-5}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/KatsikasSGD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/GritzalisK96, author = {Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Towards a formal system-to-system authentication protocol}, journal = {Comput. Commun.}, volume = {19}, number = {12}, pages = {954--961}, year = {1996}, url = {https://doi.org/10.1016/S0140-3664(96)01139-5}, doi = {10.1016/S0140-3664(96)01139-5}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/GritzalisK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/KatsikasGS96, author = {Sokratis K. Katsikas and Dimitris Gritzalis and Paul G. Spirakis}, editor = {Patrick Horster}, title = {Attack Modelling in Open Network Environments}, booktitle = {Communications and Multimedia Security II, Proceedings of the {IFIP} {TC6/TC11} International Conference on Communications and Multimedia Security at Essen, Germany, 23-24 September 1996}, series = {{IFIP} Conference Proceedings}, volume = {70}, pages = {268--277}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Mon, 14 Oct 2002 12:00:10 +0200}, biburl = {https://dblp.org/rec/conf/cms/KatsikasGS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/KatsikasT96, author = {Sokratis K. Katsikas and N. Theodoropoulos}, editor = {Patrick Horster}, title = {Defending Networks: The Expert System Components of {SECURENET}}, booktitle = {Communications and Multimedia Security II, Proceedings of the {IFIP} {TC6/TC11} International Conference on Communications and Multimedia Security at Essen, Germany, 23-24 September 1996}, series = {{IFIP} Conference Proceedings}, volume = {70}, pages = {291--302}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/KatsikasT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/KatsikasG96, author = {Sokratis K. Katsikas and Dimitris Gritzalis}, title = {High Level Security Policy Guidelines}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {57--81}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-57}, doi = {10.3233/978-1-60750-875-5-57}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/KatsikasG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Katsikas96, author = {Sokratis K. Katsikas}, editor = {Barry Barber and Alison Treacher and C. P. Louwerse}, title = {The {SEISMED} High Level Security Policy for Health Care}, booktitle = {Towards Security in Medical Telematics - Legal and Technical Aspects}, series = {Studies in Health Technology and Informatics}, volume = {27}, pages = {125--130}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-871-7-125}, doi = {10.3233/978-1-60750-871-7-125}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/Katsikas96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/1996, editor = {Sokratis K. Katsikas and Dimitris Gritzalis}, title = {Information Systems Security, Facing the information society of the 21st Century}, series = {{IFIP} Conference Proceedings}, volume = {54}, publisher = {Chapman {\&} Hall}, year = {1996}, isbn = {0-412-78120-4}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DoumasMGK95, author = {Anastasia Doumas and Konstantinos Mavroudakis and Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Design of a neural network for recognition and classification of computer viruses}, journal = {Comput. Secur.}, volume = {14}, number = {5}, pages = {435--448}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00008-V}, doi = {10.1016/0167-4048(95)00008-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DoumasMGK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npsc/LainiotisAK95, author = {Demetrios G. Lainiotis and Nicholas D. Assimakis and Sokratis K. Katsikas}, title = {Fast and numerically robust recursive algorithms for solving the discrete time Riccati equation: the case of nonsingular plant noise covariance matrix}, journal = {Neural Parallel Sci. Comput.}, volume = {3}, number = {4}, pages = {565--583}, year = {1995}, url = {http://dl.acm.org/citation.cfm?id=223159}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npsc/LainiotisAK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/KatsikasLL95, author = {Sokratis K. Katsikas and Assimakis K. Leros and Demetrios G. Lainiotis}, title = {Underwater tracking of a maneuvering target using time delay measurements}, journal = {Signal Process.}, volume = {41}, number = {1}, pages = {17--29}, year = {1995}, url = {https://doi.org/10.1016/0165-1684(94)00087-G}, doi = {10.1016/0165-1684(94)00087-G}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/KatsikasLL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/KatsikasLL94, author = {Sokratis K. Katsikas and Assimakis K. Leros and Demetrios G. Lainiotis}, title = {Passive tracking of a maneuvering target: an adaptive approach}, journal = {{IEEE} Trans. Signal Process.}, volume = {42}, number = {7}, pages = {1820--1825}, year = {1994}, url = {https://doi.org/10.1109/78.298290}, doi = {10.1109/78.298290}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/KatsikasLL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isn/AndroutsopoulosKKPSS94, author = {Dimitris Androutsopoulos and Per Kaijser and Sokratis K. Katsikas and K{\aa}re Presttun and Don Salmon and Paul G. Spirakis}, editor = {Hans{-}J{\"{u}}rgen Kugler and Alvin P. Mullery and Norbert Niebert}, title = {Surveillance and Protection in {IBC} Management: The Applicability of Two {RACE} Security Projects - SecureNet {II} and {SESAME}}, booktitle = {Towards a Pan-European Telecommunication Service Infrastructure - IS{\&}N'94, Second International Conference on Intelligence in Broadband Services and Networks, Aachen, Germany, September 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {851}, pages = {61--72}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0013398}, doi = {10.1007/BFB0013398}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/isn/AndroutsopoulosKKPSS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npsc/LainiotisAK93, author = {Demetrios G. Lainiotis and Nicholas D. Assimakis and Sokratis K. Katsikas}, title = {Fast and stable algorithm for computing the principal square root of a complex matrix}, journal = {Neural Parallel Sci. Comput.}, volume = {1}, pages = {467--476}, year = {1993}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npsc/LainiotisAK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npsc/LainiotisAK93a, author = {Demetrios G. Lainiotis and Nicholas D. Assimakis and Sokratis K. Katsikas}, title = {Time series prediction based on fractal theory and nonlinear estimation using a network with Gaussian kernel functions}, journal = {Neural Parallel Sci. Comput.}, volume = {1}, pages = {477--500}, year = {1993}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npsc/LainiotisAK93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisKKT92, author = {Dimitris Gritzalis and Sokratis K. Katsikas and J. Keklikoglou and A. Tomaras}, title = {Determining access rights for medical information systems}, journal = {Comput. Secur.}, volume = {11}, number = {2}, pages = {149--161}, year = {1992}, url = {https://doi.org/10.1016/0167-4048(92)90042-P}, doi = {10.1016/0167-4048(92)90042-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisKKT92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisKG92, author = {Dimitris Gritzalis and Sokratis K. Katsikas and Stefanos Gritzalis}, title = {A zero knowledge probabilistic login protocol}, journal = {Comput. Secur.}, volume = {11}, number = {8}, pages = {733--745}, year = {1992}, url = {https://doi.org/10.1016/0167-4048(92)90129-F}, doi = {10.1016/0167-4048(92)90129-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisKG92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisTKK91, author = {Dimitris Gritzalis and A. Tomaras and Sokratis K. Katsikas and J. Keklikoglou}, title = {Data security in medical information systems: The Greek case}, journal = {Comput. Secur.}, volume = {10}, number = {2}, pages = {141--159}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90008-2}, doi = {10.1016/0167-4048(91)90008-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisTKK91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/KatsikasLL91, author = {Sokratis K. Katsikas and Spiridon D. Likothanassis and Demetrios G. Lainiotis}, title = {On the parallel implementations of the linear Kalman and Lainiotis filters and their efficiency}, journal = {Signal Process.}, volume = {25}, number = {3}, pages = {289--305}, year = {1991}, url = {https://doi.org/10.1016/0165-1684(91)90115-Y}, doi = {10.1016/0165-1684(91)90115-Y}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/KatsikasLL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LainiotisGK91, author = {Demetrios G. Lainiotis and Pavlos K. Giannakopoulos and Sokratis K. Katsikas}, title = {Optimal state estimation for uncertain, time varying systems with non-Gaussian initial state}, booktitle = {1991 International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} '91, Toronto, Ontario, Canada, May 14-17, 1991}, pages = {1877--1880}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/ICASSP.1991.150736}, doi = {10.1109/ICASSP.1991.150736}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icassp/LainiotisGK91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/KatsikasLL90, author = {Sokratis K. Katsikas and Spiros Likothanassis and Demetrios G. Lainiotis}, title = {{AR} model identification with unknown process order}, journal = {{IEEE} Trans. Acoust. Speech Signal Process.}, volume = {38}, number = {5}, pages = {872--876}, year = {1990}, url = {https://doi.org/10.1109/29.56035}, doi = {10.1109/29.56035}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsp/KatsikasLL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/LainiotisKL88, author = {Demetrios G. Lainiotis and Sokratis K. Katsikas and Spiros D. Likothanassis}, title = {Adaptive deconvolution of seismic signals-performance, computational analysis, parallelism}, journal = {{IEEE} Trans. Acoust. Speech Signal Process.}, volume = {36}, number = {11}, pages = {1715--1734}, year = {1988}, url = {https://doi.org/10.1109/29.9009}, doi = {10.1109/29.9009}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsp/LainiotisKL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.