2012
Stefanos Gritzalis, Aleksandros Tsakountakis, Georgios Kambourakis, SIPA: Generic and Secure Accounting for SIP, Security and Communication Networks, Vol = 5, pp. = 9, http://onlinelibrary.wiley.com/doi/10.1002/sec.387/pdf, YES, 0.311, 1006-1027, 2012, Wiley   
Stefanos Gritzalis, C. Kalloniatis, C. Mouratidis, S. Islam, M. Huget, Aligning Security and Privacy to support the development of Secure Information Systems, Journal of Universal Computer Science, Vol = 18, pp. = 12, http://www.jucs.org/jucs_18_12/aligning_security_and_privacy/jucs_18_12_1608_1627_mouratidis.pdf, YES, 0.762, 1608-1627, 2012, JUCS   
2011
Stefanos Gritzalis, Georgios Kambourakis, J. Park, Constantinos Kolias, DoS Attacks Exploiting Signaling in UMTS and IMS, Computer Communications, Vol = 34, pp. = 3, http://www.sciencedirect.com/science/article/pii/S014036641000085X/pdfft?md5=94294595967bd9ff7b4126f04a80a2e8&pid=1-s2.0-S014036641000085X-main.pdf, YES, 1.044, 226-235, 2011, Elsevier   
Stefanos Gritzalis, Georgios Kambourakis, Georgios Karopoulos, PrivaSIP: Ad-hoc Identity Privacy in SIP, Computer Standards and Interfaces, Vol = 33, pp. = 3, http://www.sciencedirect.com/science/article/pii/S0920548910000942/pdfft?md5=d68aea044eb633ebaeb92d072d250c87&pid=1-s2.0-S0920548910000942-main.pdf, YES, 1.257, 301-314, 2011, Elsevier   
Stefanos Gritzalis, Georgios Kambourakis, Elisavet Konstantinou, Eleni Klaoudatou, A Survey on Cluster-based Group Key Agreement Protocols for WSNs, IEEE Communications Surveys and Tutorials, Vol = 13, pp. = 3, http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5522466&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5522466, YES, 6.311, 429-442, 2011, IEEE Press   
Stefanos Gritzalis, Efstathios Stamatatos, Georgia Frantzeskou, S. MacDonell, S. Georgiou, The significance of user-defined identifiers in Java source code authorship identification, International Journal of Computer Systems Science and Engineering, Vol = 26, pp. = 2, http://aut.researchgateway.ac.nz/bitstream/handle/10292/3469/Frantzeskou%20et%20al%20%282011%29%20IJCSSE.pdf?sequence=2, YES, 0.371, 139-148, 2011   
Stefanos Gritzalis, Petros Belsis, C. Kalloniatis, A Soft Computing approach for Privacy Requirements Engineering, Journal of Applied Soft Computing, Vol = 11, pp. = 7, http://www.sciencedirect.com/science/article/pii/S156849461000270X/pdfft?md5=de7febd4182f6216929512db11b9b3b7&pid=1-s2.0-S156849461000270X-main.pdf, YES, 2.612, 4341-4348, 2011, Elsevier   
Stefanos Gritzalis, X. Luo, F. Liu, S. Lian, Ya , On the Typical Statistic Features for Image Blind Steganalysis, IEEE Journal on Selected Areas on Communications, Vol = 27, pp. = 7, http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5963160&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5963160, YES, 3.413, 1404-1422, 2011, IEEE   
Stefanos Gritzalis, Georgios Kambourakis, F. Pereniguez, R. Marin-Lopez, A. Gomez, PrivaKERB: A User Privacy Framework for Kerberos, Computers & Security, Vol = 30, pp. = 6, http://www.sciencedirect.com/science/article/pii/S0167404811000617/pdfft?md5=77480551dd75f8f6186aed11d9f62fb9&pid=1-s2.0-S0167404811000617-main.pdf, YES, 0.868, 446-463, 2011, Elsevier   
Stefanos Gritzalis, Petros Belsis, C. Skourlas, Secure electronic healthcare records management in wireless environments, Journal of Information Technology Research, Vol = 4, pp. = 4, http://www.igi-global.com/article/secure-electronic-healthcare-records-management/68959, 1-17, 2011, IGI Global