Search Results - "Gritzalis, Stefanos"

Refine Results
  1. 1

    Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset by Kolias, Constantinos, Kambourakis, Georgios, Stavrou, Angelos, Gritzalis, Stefanos

    “…Wi-Fi has become the de facto wireless technology for achieving short- to medium-range device connectivity. While early attempts to secure this technology have…”
    Get full text
    Journal Article
  2. 2

    Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities by Choo, Kim-Kwang Raymond, Gritzalis, Stefanos, Park, Jong Hyuk

    “…Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional technological sector (e.g., oil and gas industry). There are, however, a…”
    Get full text
    Journal Article
  3. 3

    New facets of mobile botnet: architecture and evaluation by Anagnostopoulos, Marios, Kambourakis, Georgios, Gritzalis, Stefanos

    “…It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays,…”
    Get full text
    Journal Article
  4. 4

    Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media by Vgena, Katerina, Kitsiou, Angeliki, Kalloniatis, Christos, Gritzalis, Stefanos

    Published in Future internet (01-09-2022)
    “…Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal…”
    Get full text
    Journal Article
  5. 5

    The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study by Kitsiou, Angeliki, Despotidi, Charikleia, Kalloniatis, Christos, Gritzalis, Stefanos

    Published in Future internet (01-11-2022)
    “…Even though both internet-of-cloud services and biometric systems (BSs) are used worldwide, popular and expanded among public and private services, their…”
    Get full text
    Journal Article
  6. 6

    Hybrid trust and reputation management for sensor networks by Aivaloglou, Efthimia, Gritzalis, Stefanos

    Published in Wireless networks (01-07-2010)
    “…Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes…”
    Get full text
    Journal Article
  7. 7

    Attacks and Countermeasures on 802.16: Analysis and Assessment by Kolias, C., Kambourakis, G., Gritzalis, S.

    Published in IEEE Communications surveys and tutorials (01-01-2013)
    “…The IEEE 802.16 technology, commonly referred to as WiMAX, gains momentum as an option for broadband wireless communication access. So far, several research…”
    Get full text
    Journal Article
  8. 8

    Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks by Kitsiou, Angeliki, Tzortzaki, Eleni, Kalloniatis, Christos, Gritzalis, Stefanos

    Published in Future internet (01-02-2021)
    “…Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services. Aiming at…”
    Get full text
    Journal Article
  9. 9

    Preserving Digital Privacy in e-Participation Environments: Towards GDPR Compliance by Diamantopoulou, Vasiliki, Androutsopoulou, Aggeliki, Gritzalis, Stefanos, Charalabidis, Yannis

    Published in Information (Basel) (01-02-2020)
    “…The application of the General Data Protection Regulation (GDPR) 2016/679/EC, the Regulation for the protection of personal data, is a challenge and must be…”
    Get full text
    Journal Article
  10. 10

    PPDM-TAN: A Privacy-Preserving Multi-Party Classifier by Skarkala, Maria Eleni, Maragoudakis, Manolis, Gritzalis, Stefanos, Mitrou, Lilian

    Published in Computation (01-01-2021)
    “…Distributed medical, financial, or social databases are analyzed daily for the discovery of patterns and useful information. Privacy concerns have emerged as…”
    Get full text
    Journal Article
  11. 11

    Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes by Vgena, Katerina, Kitsiou, Angeliki, Kalloniatis, Christos, Kavroudakis, Dimitris, Gritzalis, Stefanos

    Published in Future internet (01-11-2019)
    “…Nowadays, location-sharing applications (LSA) within social media enable users to share their location information at different levels of precision. Users on…”
    Get full text
    Journal Article
  12. 12

    Gamification vs. Privacy: Identifying and Analysing the Major Concerns by Mavroeidi, Aikaterini-Georgia, Kitsiou, Angeliki, Kalloniatis, Christos, Gritzalis, Stefanos

    Published in Future internet (07-03-2019)
    “…Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user…”
    Get full text
    Journal Article
  13. 13

    DoS attacks exploiting signaling in UMTS and IMS by Kambourakis, Georgios, Kolias, Constantinos, Gritzalis, Stefanos, Park, Jong Hyuk

    Published in Computer communications (15-03-2011)
    “…The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the growing demand of modern mobile and Internet applications for high…”
    Get full text
    Journal Article
  14. 14

    Examining the significance of high-level programming features in source code author classification by Frantzeskou, Georgia, MacDonell, Stephen, Stamatatos, Efstathios, Gritzalis, Stefanos

    Published in The Journal of systems and software (01-03-2008)
    “…The use of Source Code Author Profiles (SCAP) represents a new, highly accurate approach to source code authorship identification that is, unlike previous…”
    Get full text
    Journal Article
  15. 15

    Exposing mobile malware from the inside (or what is your mobile app really doing?) by Damopoulos, Dimitrios, Kambourakis, Georgios, Gritzalis, Stefanos, Park, Sang Oh

    Published in Peer-to-peer networking and applications (01-12-2014)
    “…It is without a doubt that malware especially designed for modern mobile platforms is rapidly becoming a serious threat. The problem is further multiplexed by…”
    Get full text
    Journal Article
  16. 16
  17. 17

    On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem by Rizomiliotis, Panagiotis, Gritzalis, Stefanos

    “…At the 2011 Eurocrypt, Kiltz et al., in their best paper price awarded paper, proposed an ultra-lightweight authentication protocol, called . While the new…”
    Get full text
    Journal Article
  18. 18

    The Implementation of Goffee and Jones’s Types of Organizational Culture in a Greek State-Owned Organization that Introduced New Technologies by Malagas, Konstantinos, Gritzalis, Stefanos, Nikitakos, Nikitas, Fragoudaki, Alexandra

    Published in Foundations of management (23-02-2017)
    “…Organizational culture plays a significant role in corporations. The introduction of new technologies creates significant changes and requires the contribution…”
    Get full text
    Journal Article
  19. 19

    A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments by Drogkaris, Prokopios, Gritzalis, Stefanos, Kalloniatis, Christos, Lambrinoudakis, Costas

    Published in Future internet (01-12-2015)
    “…The appeal of e-Government users to retain control over their personal information, while making use of advanced governmental electronic services through…”
    Get full text
    Journal Article
  20. 20

    Evolution and Trends in IoT Security by Roman-Castro, Rodrigo, Lopez, Javier, Gritzalis, Stefanos

    Published in Computer (Long Beach, Calif.) (01-07-2018)
    “…The amount and diversity of devices that integrate connection capabilities continues to grow, and both the public and private sectors continue to explore…”
    Get full text
    Journal Article