2008 |
Stefanos Gritzalis, Charalambos Skianis, Efthimia Aivaloglou, Trust Establishment in Sensor Networks: Behavior-based, Certificate-based, and a Combinational Approach, International Journal of System of Systems Engineering, Vol = 1, pp. = 1, http://inderscience.metapress.com/content/t64155m1860p5gn1/fulltext.pdf, 128-148, 2008, Inderscience Publisher |
| | |
Stefanos Gritzalis, Petros Belsis, K. Fragos, C. Skourlas, Applying effective feature selection techniques with Hierarchical Mixtures of Experts for spam classification, Journal of Computer Security, Vol = 16, pp. = 6, http://iospress.metapress.com/content/l715124h57m12450/fulltext.pdf, 761-790, 2008, IOS Press |
| | |
Stefanos Gritzalis, S. Katsikas, C. Bouras, J. Papagiannopoulos, The Broadband Status of the Western Greece: A study on the offer and the demand of broadband services for eGovernment promotion, International Journal of Electronic Governance, Vol = 1, pp. = 3, http://inderscience.metapress.com/content/j164593250q58272/fulltext.pdf, 326-344, 2008, Inderscience Publishers |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Aggelos Rouskas, Demosthenes Vouyioukas, I. Maglogiannis, Constantinos Kolias, Enabling the Provision of Secure Web based M-Health Services utilizing XML based Security Models, Security and Communication Networks, Vol = 1, pp. = 5, http://www.icsd.aegean.gr/publication_files/journal/880277417.pdf, YES, 0.433, 375-388, 2008, Wiley InterScience |
| | |
Stefanos Gritzalis, E. Kavakli, C. Kalloniatis, Addressing Privacy Requirements in System Design: The PriS Methodology, Requirements Engineering, Vol = 13, pp. = 3, http://link.springer.com/content/pdf/10.1007%2Fs00766-008-0067-3.pdf, YES, 1.625, 241-255, 2008, Springer |
| | |
2007 |
Stefanos Gritzalis, Charalambos Skianis, Efthimia Aivaloglou, Towards a flexible trust establishment framework for sensor networks, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol = 35, pp. = 3, http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9049-x.pdf, YES, 0.423, 207-213, 2007, Springer |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Constantinos Lambrinoudakis, Dimitris Geneiatakis, A. Dagiouklas, A framework for protecting SIP-based infrastructure against Malformed Message Attacks, Computer Networks, Vol = 51, pp. = 10, http://www.sciencedirect.com/science/article/pii/S1389128606003458/pdfft?md5=69c7b49dec8c094db8c015df7e23e04e&pid=1-s2.0-S1389128606003458-main.pdf, YES, 0.83, 2580-2593, 2007, Elsevier |
| | |
Stefanos Gritzalis, Efstathios Stamatatos, Georgia Frantzeskou, C. Chaski, B. Howald, Identifying Authorship by Byte Level n-grams: The Source Code Author Profile (SCAP) Method, International Journal of Digital Evidence, Vol = 6, pp. = 1, http://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C829-0387-009D214D2170C321.pdf, 2007 |
| | |
Stefanos Gritzalis, S. Katsikas, Petros Belsis, Interconnecting Autonomous MedicalDomains: Security, Interoperability and Semantic-Driven Perspectives, IEEE Engineering in Medicine and Biology, Vol = 26, pp. = 5, http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4312664&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4312664, YES, 1.066, 23-28, 2007, IEEE Press |
| | |
Stefanos Gritzalis, Georgios Kambourakis, Aggelos Rouskas, D. Kontoni, A PKI Approach for Deploying Modern Secure Distributed e-learning and m-learning Environments, Computers and Education, Vol = 48, pp. = 1, http://www.sciencedirect.com/science/article/pii/S0360131504001745/pdfft?md5=4357646a7be4002ed8cd25e64e395f82&pid=1-s2.0-S0360131504001745-main.pdf, YES, 1.602, 1-16, 2007, Elsevier |
| | |