Follow
Stefanos Gritzalis
Stefanos Gritzalis
Professor, Lab. of Systems Security, Dept. of Digital Systems, University of Piraeus, Greece
Verified email at unipi.gr - Homepage
Title
Cited by
Cited by
Year
Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset
C Kolias, G Kambourakis, A Stavrou, S Gritzalis
IEEE Communications Surveys & Tutorials 18 (1), 184-208, 2015
5382015
What can behavioral economics teach us about privacy
A Acquisti, J Grossklags
Digital privacy: theory, technologies and practices 18, 363-377, 2007
3912007
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)
S Carlo, F Bonifacio
Lecture Notes in Computer Science 12786, 3-20, 2021
368*2021
Addressing privacy requirements in system design: the PriS method
C Kalloniatis, E Kavakli, S Gritzalis
Requirements Engineering 13, 241-255, 2008
3352008
Survey of security vulnerabilities in session initiation protocol
D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ...
IEEE Communications Surveys & Tutorials 8 (3), 68-81, 2006
2622006
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
C Lambrinoudakis, S Gritzalis, F Dridi, G Pernul
Computer communications 26 (16), 1873-1883, 2003
2372003
Identifying authorship by byte-level n-grams: The source code author profile (scap) method
G Frantzeskou, E Stamatatos, S Gritzalis, CE Chaski, BS Howald
International Journal of Digital Evidence 6 (1), 1-18, 2007
2082007
Cryptographic solutions for industrial Internet-of-Things: Research challenges and opportunities
KKR Choo, S Gritzalis, JH Park
IEEE Transactions on Industrial Informatics 14 (8), 3567-3569, 2018
1842018
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
1722013
Detecting DNS amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
Critical Information Infrastructures Security: Second International Workshop …, 2008
1702008
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
S Gritzalis, D Spinellis, P Georgiadis
Computer Communications 22 (8), 697-709, 1999
1601999
DNS amplification attack revisited
M Anagnostopoulos, G Kambourakis, P Kopanos, G Louloudakis, ...
Computers & Security 39, 475-485, 2013
1572013
Effective identification of source code authors using byte-level information
G Frantzeskou, E Stamatatos, S Gritzalis, S Katsikas
Proceedings of the 28th international conference on Software engineering …, 2006
1472006
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
1212012
Enhancing web privacy and anonymity in the digital era
S Gritzalis
Information Management & Computer Security 12 (3), 255-287, 2004
1212004
A critical review of 13 years of mobile game-based learning
F Giannakas, G Kambourakis, A Papasalouros, S Gritzalis
Educational Technology Research and Development 66, 341-384, 2018
1172018
Challenges in e-government and security of information
MS Hwang, CT Li, JJ Shen, YP Chu
Information & Security 15 (1), 9-20, 2004
1152004
Digital privacy: theory, technologies, and practices
A Acquisti, S Gritzalis, C Lambrinoudakis, S di Vimercati
CRC Press, 2007
1042007
A framework for protecting a SIP-based infrastructure against malformed message attacks
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Computer Networks 51 (10), 2580-2593, 2007
962007
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli
Computer Standards & Interfaces 36 (4), 759-775, 2014
912014
The system can't perform the operation now. Try again later.
Articles 1–20