2014
Stefanos Gritzalis, Georgios Kambourakis, Dimitrios Damopoulos, S Park, Exposing mobile malware from the inside (or what is your mobile app really doing?), Peer-to-Peer Networking and Applications, Vol = 7, pp. = 4, http://link.springer.com/content/pdf/10.1007%2Fs12083-012-0179-x.pdf, YES, 0.632, 687-697, 2014, Springer   
Stefanos Gritzalis, E. Kavakli, C. Kalloniatis, C. Mouratidis, S. Islam, V. Manousakis, Towards the Design of Secure and Privacy-oriented Information Systems in the Cloud: Identifying the major concepts, Computer Standards and Interfaces, Vol = 36, pp. = 4, http://www.sciencedirect.com/science/article/pii/S0920548913001840, YES, 0.879, 759-775, 2014, Elsevier   
Euripidis Loukis, A. Ranchhod, R. Trivedi, C. Gurau, Evaluating the educational effectiveness of simulation games: A value-generation model, Information Sciences (Science Citation Index, SCOPUS - Impact Factor 3.969), Vol = 264, YES, 3.969, 75-90, 2014   
Stefanos Gritzalis, Emmanouil Maragoudakis, A. Panteli, Privacy-Preserving Data Mining using Radial Basis Functions on Horizontally-partitioned Databases in the Malicious Model, International Journal on Artificial Intelligence Tools, Vol = 23, pp. = 5, http://www.worldscientific.com/toc/ijait/23/05, YES, 0.436, 1450007:1-22, 2014, World Scientific Publishing   
Alexios Kaporis, S. Sioutas, K. Tsichlas, A. Papadopoulos, Ge Brodal, K. Tsakalidis, Dynamic 3-sided Planar Range Queries with Expected Doubly Logarithmic Time, Theoretical Computer Science, Vol = , pp. = 0, http://www.journals.elsevier.com/theoretical-computer-science/, 0.697, , 2014, Springer, YES   
Stefanos Gritzalis, E. Kavakli, C. Kalloniatis, Addressing Privacy in Traditional and Cloud-based Systems, International Journal of Applied Industrial Engineering, Vol = 2, pp. = 1, http://www.igi-global.com/journal/international-journal-applied-industrial-engineering/41034, , 2014, IGI Global   
Georgios Kambourakis, Anonymity and closely related terms in the Cyberspace: An analysis by example, Journal of Information Security and Applications, Vol = 19, pp. = 1, http://www.sciencedirect.com/science/article/pii/S2214212614000209, 2-17, 2014, Elsevier   
Christos Gkoumopoulos, A. Kameas, B. Oflynn, Automated Zone-Specific Irrigation with Wireless Sensor/Actuator Network and Adaptable Decision Support, Computers and Electronics in Agriculture, Vol = 105, http://www.sciencedirect.com/science/article/pii/S0168169914000829, YES, 1.766, 20–33, 2014, Elsevier   
Georgios Kambourakis, Dimitrios Damopoulos, Dimitrios Papamartzivanos, M. Pavlidakis, Introducing Touchstroke: Keystroke-based Authentication System for Smartphones, Security and Communication Networks, http://onlinelibrary.wiley.com/doi/10.1002/sec.1061/abstract, YES, 0, 2014, Wiley   
Panagiotis Rizomiliotis, Lilian Mitrou, Nikolaos Marangos, Time Synchronization: Pivotal Element in Cloud Forensics, Security and Communication Networks , Vol = ?, pp. = 0, , ?, 2014, Wiley, YES