2009
Charis Mesaritakis, Dimitris Syvridis, Hercules Simos , Alexandros Kapsalis , Optical microring based interrogation method for phase detecting elements, IEEE Sensors Journal, Vol = 9, 1.88, 2009   
Charis Mesaritakis, Dimitris Syvridis, Hercules Simos , D. Alexandropoulos, Dynamic analysis of crosstalk performance in microring based add/drop filters, IEEE/OSA Journal of Lightwave Technology, Vol = 27, 2.86, 2027-2034, 2009   
2008
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Aggeliki Tsohou, Investigating information security awareness: research and practice gaps, Information Security Journal: A Global Perspective, Vol = 17, pp. = 5, http://www.tandfonline.com/doi/pdf/10.1080/19393550802492487, 207–227, 2008, Taylor & Francis   
Stefanos Gritzalis, L. Sterling, G. Antoniou, U. Parampalli, Privacy and Forensics investigation process: The ERPINA protocol, Computer Standards and Interfaces, Vol = 30, pp. = 4, http://www.sciencedirect.com/science/article/pii/S0920548907000979/pdfft?md5=6229592b682bd62ac64cffe8b0026ca1&pid=1-s2.0-S0920548907000979-main.pdf, YES, 1.074, 229-236, 2008, Elsevier   
Stefanos Gritzalis, R. Roman, J. Lopez, Situation Awareness Mechanisms for Wireless Sensor Networks, IEEE Communications, Vol = 46, pp. = 4, http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4481348&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4481348, YES, 2.799, 102-107, 2008, IEEE Press   
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Aggeliki Tsohou, Process-Variance Models in Information Security Awareness Research, Information Management and Computer Security, Vol = 16, pp. = 3, http://www.emeraldinsight.com/journals.htm?articleid=1736849&show=abstract, 271 – 287, 2008, Emerald   
Stefanos Gritzalis, Theodoros Balopoulos, S. Katsikas, Specifying and Implementing Privacy-preserving protocols, International Journal of Information Security, Vol = 7, pp. = 6, http://link.springer.com/content/pdf/10.1007%2Fs10207-008-0057-y.pdf, YES, 1.094, 395-420, 2008, Springer   
Stefanos Gritzalis, Efstathios Stamatatos, Georgia Frantzeskou, S. MacDonell, Examining the Significance of high-level programming features in Source-code Author Classification, Journal of Systems and Software, Vol = 81, pp. = 3, http://www.sciencedirect.com/science/article/pii/S0164121207000829/pdfft?md5=90040a5360af7c35c3b8fd0a92d404fb&pid=1-s2.0-S0164121207000829-main.pdf, YES, 1.241, 447-460, 2008, Elsevier   
Stefanos Gritzalis, Charalambos Skianis, Efthimia Aivaloglou, Trust Establishment in Sensor Networks: Behavior-based, Certificate-based, and a Combinational Approach, International Journal of System of Systems Engineering, Vol = 1, pp. = 1, http://inderscience.metapress.com/content/t64155m1860p5gn1/fulltext.pdf, 128-148, 2008, Inderscience Publisher   
Stefanos Gritzalis, Petros Belsis, K. Fragos, C. Skourlas, Applying effective feature selection techniques with Hierarchical Mixtures of Experts for spam classification, Journal of Computer Security, Vol = 16, pp. = 6, http://iospress.metapress.com/content/l715124h57m12450/fulltext.pdf, 761-790, 2008, IOS Press