2008 |
Stefanos Gritzalis, Georgios Kambourakis, Aggelos Rouskas, In http://www.igi-global.com/chapter/evaluating-security-mechanisms-different-protocol/22076, Evaluating Security Mechanisms in different protocol layers for Bluetooth Connections |
| | |
Stefanos Gritzalis, Efthimia Aivaloglou, S. Katsikas, In , Privacy Protection Mechanisms for Sensor Networks |
| | |
Stefanos Gritzalis, Lilian Mitrou, In , Content Filtering Technologies and the Law |
| | |
Georgios Kambourakis, Constantinos Lambrinoudakis, Dimitris Geneiatakis, In http://www.crcpress.com/product/isbn/9781420066036, SIP Security: Threats, Vulnerabilities and Countermeasures |
| | |
Georgios Kambourakis, In http://www.artechhouse.com/International/Books/On-Mobile-Wiki-Systems-Security-1408.aspx, On Mobile Wiki Systems Security |
| | |
Spyros Kokolakis, Maria Karyda, In , Privacy Perceptions Among Members of Online Communities |
| | |
Maria Karyda, In , The Socioeconomic Background of Electronic Crime |
| | |
Emmanouil Maragoudakis, N. Cosmas, A. Garbis, In , Mining Natural Language Programming Directives with Class-Oriented Bayesian Networks |
| | |
Theodoros Tzouramanis, A. Agathou, In , The Role of Data Mining in Intrusion Detection Technology |
| | |
Alexios Kaporis, L. Kirousis, E. Lalas, In , Thresholds for random k-SAT |
| | |