Secure Electronic Voting D Gritzalis (Ed.) Springer, 2003 | 7383* | 2003 |
Delegate the smartphone user? Security awareness in smartphone platforms A Mylonas, A Kastania, D Gritzalis Computers & Security 34, 47-66, 2013 | 409 | 2013 |
The Big Four – What we did wrong in Advanced Persistent Threat detection? N Virvilis, D Gritzalis 8th International Conference on Availability, Reliability & Security (ARES-2013), 2013 | 305 | 2013 |
Principles and requirements for a secure e-voting system D Gritzalis Computers & Security 21 (6), 539-556, 2002 | 269 | 2002 |
An insider threat prediction model M Kandias, A Mylonas, N Virvilis, M Theoharidou, D Gritzalis 3rd International Conference on Trust, Privacy and Security in Digital …, 2010 | 252 | 2010 |
Critical Infrastructure Security and Resilience: Theories, Methods, Tools and Technologies D Gritzalis, M Theocharidou, G Stergiopoulos (Eds.) Springer, 2019 | 251* | 2019 |
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? D Gritzalis, V Katos, P Katsaros, Y Soupionis, J Psaroudakis, A Mentis 4th International Conference on Information, Intelligence, Systems …, 2013 | 242 | 2013 |
The insider threat in cloud computing M Kandias, N Virvilis, D Gritzalis 6th International Workshop on Critical Infrastructure Security (CRITIS-2011 …, 2011 | 219 | 2011 |
Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies G Lykou, D Moustakas, D Gritzalis Sensors 20 (12), 3537, 2020 | 212 | 2020 |
Towards an ontology-based security management B Tsoumas, D Gritzalis 20th International IEEE Conference on Advanced Information Networking …, 2006 | 207 | 2006 |
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? N Virvilis, D Gritzalis, T Apostolopoulos 10th IEEE International Conference on Autonomous and Trusted Computing (ATC …, 2013 | 187 | 2013 |
A risk assessment method for smartphones M Theoharidou, A Mylonas, D Gritzalis 27th IFIP International Information Security and Privacy Conference, 443-456, 2012 | 174 | 2012 |
Social media profiling: A Panopticon or Omniopticon tool? L Mitrou, M Kandias, V Stavrou, D Gritzalis 6th Conference of the Surveillance Studies Network (SSN-2014), 2014 | 162 | 2014 |
Proactive insider threat detection through social media: The YouTube case M Kandias, V Stavrou, N Bozovic, D Gritzalis 12th ACM Workshop on Privacy in the Electronic Society (WPES-2013), 261-266, 2013 | 135 | 2013 |
Assessing n-order dependencies between critical infrastructures P Kotzanikolaou, M Theoharidou, D Gritzalis International Journal of Critical Infrastructures 9 (1), 93-110, 2013 | 133 | 2013 |
A security architecture for interconnecting health information systems D Gritzalis, C Lambrinoudakis International Journal of Medical Informatics 73 (3), 305-309, 2004 | 127 | 2004 |
Risk mitigation strategies for critical infrastructures based on graph centrality analysis G Stergiopoulos, P Kotzanikolaou, M Theocharidou, D Gritzalis International Journal of Critical Infrastructure Protection 10, 34-44, 2015 | 121 | 2015 |
Smartphone sensor data as digital evidence A Mylonas, V Meletiadis, L Mitrou, D Gritzalis Computers & Security 38, 51-75, 2013 | 121 | 2013 |
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures G Stergiopoulos, P Kotzanikolaou, M Theocharidou, G Lykou, D Gritzalis International Journal of Critical Infrastructure Protection 12, 46-60, 2016 | 118 | 2016 |
Risk-based criticality analysis M Theoharidou, P Kotzanikolaou, D Gritzalis Critical Infrastructure Protection III, 35-49, 2009 | 116 | 2009 |