Search Results - "Gritzalis, Stefanos"
-
1
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
Published in IEEE Communications surveys and tutorials (2016)“…Wi-Fi has become the de facto wireless technology for achieving short- to medium-range device connectivity. While early attempts to secure this technology have…”
Get full text
Journal Article -
2
Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities
Published in IEEE transactions on industrial informatics (01-08-2018)“…Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional technological sector (e.g., oil and gas industry). There are, however, a…”
Get full text
Journal Article -
3
New facets of mobile botnet: architecture and evaluation
Published in International journal of information security (01-10-2016)“…It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays,…”
Get full text
Journal Article -
4
Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media
Published in Future internet (01-09-2022)“…Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal…”
Get full text
Journal Article -
5
The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study
Published in Future internet (01-11-2022)“…Even though both internet-of-cloud services and biometric systems (BSs) are used worldwide, popular and expanded among public and private services, their…”
Get full text
Journal Article -
6
Hybrid trust and reputation management for sensor networks
Published in Wireless networks (01-07-2010)“…Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes…”
Get full text
Journal Article -
7
Attacks and Countermeasures on 802.16: Analysis and Assessment
Published in IEEE Communications surveys and tutorials (01-01-2013)“…The IEEE 802.16 technology, commonly referred to as WiMAX, gains momentum as an option for broadband wireless communication access. So far, several research…”
Get full text
Journal Article -
8
Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks
Published in Future internet (01-02-2021)“…Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services. Aiming at…”
Get full text
Journal Article -
9
Preserving Digital Privacy in e-Participation Environments: Towards GDPR Compliance
Published in Information (Basel) (01-02-2020)“…The application of the General Data Protection Regulation (GDPR) 2016/679/EC, the Regulation for the protection of personal data, is a challenge and must be…”
Get full text
Journal Article -
10
PPDM-TAN: A Privacy-Preserving Multi-Party Classifier
Published in Computation (01-01-2021)“…Distributed medical, financial, or social databases are analyzed daily for the discovery of patterns and useful information. Privacy concerns have emerged as…”
Get full text
Journal Article -
11
Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes
Published in Future internet (01-11-2019)“…Nowadays, location-sharing applications (LSA) within social media enable users to share their location information at different levels of precision. Users on…”
Get full text
Journal Article -
12
Gamification vs. Privacy: Identifying and Analysing the Major Concerns
Published in Future internet (07-03-2019)“…Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user…”
Get full text
Journal Article -
13
DoS attacks exploiting signaling in UMTS and IMS
Published in Computer communications (15-03-2011)“…The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the growing demand of modern mobile and Internet applications for high…”
Get full text
Journal Article -
14
Examining the significance of high-level programming features in source code author classification
Published in The Journal of systems and software (01-03-2008)“…The use of Source Code Author Profiles (SCAP) represents a new, highly accurate approach to source code authorship identification that is, unlike previous…”
Get full text
Journal Article -
15
Exposing mobile malware from the inside (or what is your mobile app really doing?)
Published in Peer-to-peer networking and applications (01-12-2014)“…It is without a doubt that malware especially designed for modern mobile platforms is rapidly becoming a serious threat. The problem is further multiplexed by…”
Get full text
Journal Article -
16
Addressing privacy requirements in system design: the PriS method
Published in Requirements engineering (01-09-2008)Get full text
Journal Article -
17
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem
Published in International journal of information security (01-04-2013)“…At the 2011 Eurocrypt, Kiltz et al., in their best paper price awarded paper, proposed an ultra-lightweight authentication protocol, called . While the new…”
Get full text
Journal Article -
18
The Implementation of Goffee and Jones’s Types of Organizational Culture in a Greek State-Owned Organization that Introduced New Technologies
Published in Foundations of management (23-02-2017)“…Organizational culture plays a significant role in corporations. The introduction of new technologies creates significant changes and requires the contribution…”
Get full text
Journal Article -
19
A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments
Published in Future internet (01-12-2015)“…The appeal of e-Government users to retain control over their personal information, while making use of advanced governmental electronic services through…”
Get full text
Journal Article -
20
Evolution and Trends in IoT Security
Published in Computer (Long Beach, Calif.) (01-07-2018)“…The amount and diversity of devices that integrate connection capabilities continues to grow, and both the public and private sectors continue to explore…”
Get full text
Journal Article