2007
Charis Mesaritakis, Dimitris Syvridis, Hercules Simos, D. Alexandropoulos , Intra-band Crosstalk Properties of Add/Drop Filters Based on Active Microring Resonators, IEEE Photon Technol. Lett., Vol = 19, 1.94, 1649-1651, 2007   
2006
Spyros Kokolakis, Maria Karyda, Constantinos Lambrinoudakis, S. Dritsas, Lazaros Gymnopoulos, Theodoros Balopoulos, S. Katsikas, A knowledge-based approach to security requirements for e-health applications, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, http://www.ejeta.org/specialOct06-issue/ejeta-special-06oct-4.pdf, 2006   
Maria Karyda, Lilian Mitrou, Employees Privacy vs. Employers, Telematics and Informatics Journal, Vol = 14, pp. = 5, http://ac.els-cdn.com/S073658530500047X/1-s2.0-S073658530500047X-main.pdf?_tid=2a8d22de-46c6-11e3-9ba7-00000aab0f01&acdnat=1383730448_70fad65fe27ae623, 198-217, 2006, Elsevier   
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Aggeliki Tsohou, Formulating Information Systems Risk Management Strategies through Cultural Theory, Information Management and Computer Security, Vol = 14, pp. = 3, http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=3&articleid=1556708, 198-217, 2006, Emerald   
Maria Karyda, Lilian Mitrou, G. Quirchmayr, A framework for outsourcing IS/IT security services, Information Management and Computer Security, Vol = 14, pp. = 5, http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=5&articleid=1575971&show=html, 402-415, 2006, Emerald   
Stefanos Gritzalis, Georgios Kambourakis, Aggelos Rouskas, Dimitris Geneiatakis, Support of Subscribers Certificates in a Hybrid WLAN-3G Environment, Computer Networks, Vol = 50, pp. = 11, http://www.sciencedirect.com/science/article/pii/S1389128605002653/pdfft?md5=7321381a9d935cb95b0bf52c8f5f47ab&pid=1-s2.0-S1389128605002653-main.pdf, YES, 0.631, 1843-1859, 2006, Elsevier   
Stefanos Gritzalis, Georgios Kambourakis, Constantinos Lambrinoudakis, Dimitris Geneiatakis, A. Dagiouklas, S. Ehlert, D. Sisalem, Survey of Security Vulnerabilities in Session Initiation Protocol, IEEE Communications Surveys and Tutorials, Vol = 8, pp. = 3, http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4020603, 68-81, 2006, IEEE Press   
Stefanos Gritzalis, Dimitrios Fotakis, Efficient Heuristic Algorithms for Correcting the Cascade Vulnerability Problem for Interconnected Networks, Computer Communications, Vol = 29, pp. = 11, http://www.sciencedirect.com/science/article/pii/S0140366406000326/pdfft?md5=7ecb32b6e5ca8b91e17a07e0733a52ce&pid=1-s2.0-S0140366406000326-main.pdf, YES, 0.444, 2109-2122, 2006, Elsevier   
Stefanos Gritzalis, S. Katsikas, K. Lamprou, Security Architectures for Online Distance Learning and Training: A review, THEMES in Education, Vol = 7, pp. = 1, http://earthlab.uoi.gr/theste/index.php/theste, 63-77, 2006   
Stefanos Gritzalis, A Policy-ruled Knowledge Dissemination Architecture for Supporting multi-domain Secure Interoperation, The eJournal for Electronic Commerce Tools and Applications, Vol = 1, pp. = 4, http://www.ejeta.org/fourth-issue/ejeta-2005.12.24.23.53.40.pdf, 2006