2013
Stefanos Gritzalis, Georgios Kambourakis, Dimitrios Damopoulos, From Keyloggers to Touchloggers: Take the Rough with the Smooth, Computers & Security, Vol = 32, http://www.sciencedirect.com/science/article/pii/S0167404812001654/pdfft?md5=4e742c0e55f282d00e8308b6493bc17b&pid=1-s2.0-S0167404812001654-main.pdf, YES, 1.172, 102-114, 2013, Elsevier   
Stefanos Gritzalis, Panagiotis Rizomiliotis, On the security of AUTH, an authentication protocol based on the subspace LPN problem, International Journal of Information Security, Vol = 12, pp. = 2, http://link.springer.com/article/10.1007/s10207-012-0188-z, YES, 0.941, 151-154, 2013, Springer   
Stefanos Gritzalis, C. Kalloniatis, C. Mouratidis, S. Islam, A Framework to support selection of Cloud Providers based on Security and Privacy Requirements, Journal of Systems and Software, Vol = 86, pp. = 9, http://www.sciencedirect.com/science/article/pii/S0164121213000575/pdfft?md5=7235f5f5f82af4a183a2a9dc603c036e&pid=1-s2.0-S0164121213000575-main.pdf, YES, 1.245, 2276-2293, 2013, Elsevier   
Stefanos Gritzalis, N. Nikitakos, K. Malagas, K. Kourousis, G. Baxter, Τhe Introduction of Innovative Services in a State Owned Airline: A Case Study of a IT migration project, Journal of Technology Management & Innovation, Vol = 8, pp. = 2, http://www.jotmi.org/index.php/GT/article/download/art306/759, 74-83, 2013, Inderscience   
Stefanos Gritzalis, Georgios Kambourakis, F. Pereniguez, R. Marin-Lopez, A. Gomez, A. Ruiz Martinez, KAMU: Providing Advanced User Privacy in Kerberos Multi-Domain Scenarios, International Journal of Information Security (IJIS), Vol = 12, pp. = 6, http://link.springer.com/content/pdf/10.1007%2Fs10207-013-0201-1.pdf, YES, 0.941, 505-525, 2013, Springer   
Stefanos Gritzalis, Prokopis Drogkaris, Constantinos Lambrinoudakis, Employing Privacy Policies and Preferences in Modern e-Government Environments, International Journal of Electronic Governance, Vol = 6, pp. = 2, http://inderscience.metapress.com/content/r4j26m562126317k/, 101-116, 2013, Inderscience   
Stefanos Gritzalis, Georgios Kambourakis, Marios Anagnostopoulos, P. Kopanos, G. Louloudakis, DNS Amplification Attack Revisited, Computers & Security, Vol = 39, http://www.sciencedirect.com/science/article/pii/S0167404813001405/pdfft?md5=6955fa8fac3389ef75401b533c7812ce&pid=1-s2.0-S0167404813001405-main.pdf, YES, 1.172, 475-485, 2013, Elsevier   
Stefanos Gritzalis, Petros Belsis, C. Skourlas, A Wireless System for Secure Electronic Healthcare Records Management, International Journal of Advanced Pervasive and Ubiquitous Computing, Vol = 5, pp. = 5, http://www.igi-global.com/journal/international-journal-advanced-pervasive-ubiquitous/1106, 16-32, 2013, IGI Global   
2012
Stefanos Gritzalis, Georgios Kambourakis, Dimitrios Damopoulos, Athanasios Loukas, Maria-Eleni Maria Eleni Skarkala, S. Menesidou, MILC: A Secure and Privacy-Preserving Mobile Instant Locator with Chatting, Information System Frontiers, Vol = 14, pp. = 3, http://link.springer.com/content/pdf/10.1007%2Fs10796-010-9254-0.pdf, YES, 0.851, 481-497, 2012, Springer   
Stefanos Gritzalis, Georgios Kambourakis, Dimitrios Damopoulos, S. Menesidou, M. Papadaki, N. Clarke, Evaluation of Anomaly-Based IDS for Mobile Devices Using Machine Learning Classifiers, Security and Communication Networks, Vol = 5, pp. = 1, http://onlinelibrary.wiley.com/doi/10.1002/sec.341/pdf, YES, 0.311, 3-14, 2012, Wiley