2009
Theodoros Tzouramanis, T. Evdoridis, pp. = , Security Threats in Web-Powered Databases and Web Portals   
Theodoros Tzouramanis, T. Evdoridis, pp. = , Countermeasures for Protecting Legally Sensitive Web-powered Databases and Web Portals   
Theodoros Tzouramanis, T. Evdoridis, pp. = , Security Threats in Legally Sensitive Web-Powered Databases and Web Portals   
Theodoros Tzouramanis, T. Evdoridis, pp. = , A Generalized Comparison of Open Source and Commercial Database Management Systems   
Theodoros Tzouramanis, pp. = , SQL Code Poisoning   
Christos Gkoumopoulos, A. Kameas, H. Hagras, T. Heinroth, V. Callaghan, M. Weber, YES, pp. = [BC2] An architecture that supports task centered adaptation in intelligent environments.pdf##^^&&423485086.pdf, An architecture that supports task centered adaptation in intelligent environments   
2010
Stefanos Gritzalis, Georgios Kambourakis, YES, Key Management in 802.16e   
Stefanos Gritzalis, Constantinos Lambrinoudakis, S. Katsikas, YES, Privacy Enhancing Technologies: A review   
Stefanos Gritzalis, Panagiotis Rizomiliotis, Euaggelos Rekleitis, YES, Privacy Threats and countermeasures in RFID environments   
Stefanos Gritzalis, Efthimia Aivaloglou, S. Katsikas, YES, Privacy Mechanisms in Wireless Sensor Networks