2007 |
Stefanos Gritzalis, Charalambos Skianis, Efthimia Aivaloglou, Towards a flexible trust establishment framework for sensor networks, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol = 35, pp. = 3, http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9049-x.pdf, YES, 0.423, 207-213, 2007, Springer |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Constantinos Lambrinoudakis, Dimitris Geneiatakis, A. Dagiouklas, A framework for protecting SIP-based infrastructure against Malformed Message Attacks, Computer Networks, Vol = 51, pp. = 10, http://www.sciencedirect.com/science/article/pii/S1389128606003458/pdfft?md5=69c7b49dec8c094db8c015df7e23e04e&pid=1-s2.0-S1389128606003458-main.pdf, YES, 0.83, 2580-2593, 2007, Elsevier |
| | |
Stefanos Gritzalis, Efstathios Stamatatos, Georgia Frantzeskou, C. Chaski, B. Howald, Identifying Authorship by Byte Level n-grams: The Source Code Author Profile (SCAP) Method, International Journal of Digital Evidence, Vol = 6, pp. = 1, http://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C829-0387-009D214D2170C321.pdf, 2007 |
| | |
Stefanos Gritzalis, S. Katsikas, Petros Belsis, Interconnecting Autonomous MedicalDomains: Security, Interoperability and Semantic-Driven Perspectives, IEEE Engineering in Medicine and Biology, Vol = 26, pp. = 5, http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4312664&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4312664, YES, 1.066, 23-28, 2007, IEEE Press |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Aggelos Rouskas, D. Kontoni, A PKI Approach for Deploying Modern Secure Distributed e-learning and m-learning Environments, Computers and Education, Vol = 48, pp. = 1, http://www.sciencedirect.com/science/article/pii/S0360131504001745/pdfft?md5=4357646a7be4002ed8cd25e64e395f82&pid=1-s2.0-S0360131504001745-main.pdf, YES, 1.602, 1-16, 2007, Elsevier |
| | |
Stefanos Gritzalis, Constantinos Lambrinoudakis, S. Katsikas, A. Yannacopoulos, P. Hatzopoulos, A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments, International Journal of Information Security, Vol = 6, pp. = 4, http://link.springer.com/content/pdf/10.1007%2Fs10207-006-0010-x.pdf, YES, 1.094, 197-211, 2007, Springer |
| | |
Stefanos Gritzalis, M. Belsis, A. Dwivedi, R. Bali, R. Naguib, Providing Secure mAccess to Medical Information, International Journal of Electronic Healthcare, Vol = 3, pp. = 1, http://inderscience.metapress.com/content/07khkxmmbplm1nyh/fulltext.pdf, 51-71, 2007, InderScience Publishers |
| | |
Stefanos Gritzalis, S. Katsikas, Petros Belsis, Partial and fuzzy constraint satisfaction to support coalition formation, ENTCS Electronic Notes on Theoretical Computer Science, Vol = 179, pp. = 1, http://www.sciencedirect.com/science/article/pii/S1571066107003040/pdf?md5=2e70ad7bacffc41a4aeb566420b7758d&pid=1-s2.0-S1571066107003040-main.pdf, 75-86, 2007, Elsevier |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Georgios Karopoulos, Survey of Secure Hand-off Optimization Schemes for Multimedia Services over all-IP Wireless Heterogeneous Networks, IEEE Communications Surveys and Tutorials, Vol = 9, pp. = 3, https://heim.ifi.uio.no/paalee/referencing_publications/ref-sec-karopoulos-commsurveys-2007.pdf, YES, 6.348, 18-28, 2007, IEEE Press |
| | |
Stefanos Gritzalis, J. Lopez, J. Onieva, R. Rodrigo, J. Zhou, Integration of Non-repudiation Services in Mobile Digital Rights Management Scenarios, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol = 35, pp. = 3, http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9050-4.pdf, YES, 0.423, 161-176, 2007, Springer |
| | |