Dimitris A. Gritzalis
TitleCited byYear
The Sphinx enigma in critical VoIP infrastructures: Human or botnet?
D Gritzalis, V Katos, P Katsaros, Y Soupionis, J Psaroudakis, A Mentis
4th International Conference on Information, Intelligence, Systems …, 2013
2562013
Delegate the smartphone user? Security awareness in smartphone platforms
A Mylonas, A Kastania, D Gritzalis
Computers & Security 34, 47-66, 2013
2302013
Secure Electronic Voting
D Gritzalis (Editor)
Springer, 2003
213*2003
Secure Electronic Voting
D Gritzalis
Springer Science & Business Media, 2012
1892012
The Big Four – What we did wrong in Advanced Persistent Threat detection?
N Virvilis, D Gritzalis
8th International Conference on Availability, Reliability & Security (ARES-2013), 2013
1672013
An insider threat prediction model
M Kandias, A Mylonas, N Virvilis, M Theoharidou, D Gritzalis
3rd International Conference on Trust, Privacy and Security in Digital …, 2010
1662010
Principles and requirements for a secure e-voting system
D Gritzalis
Computers & Security 21 (6), 539-556, 2002
1542002
A prospective, non-randomized, no placebo-controlled, phase Ib clinical trial to study the safety of the adipose derived stromal cells-stromal vascular fraction in idiopathic …
A Tzouvelekis, D Gritzalis, V Paspaliaris, G Koliakos, P Ntolios, E Bouros, ...
Journal of Translational Medicine 11 (1), 171-183, 2013
1492013
The insider threat in cloud computing
M Kandias, N Virvilis, D Gritzalis
6th International Workshop on Critical Infrastructure Security (CRITIS-2011 …, 2011
1452011
Towards an ontology-based security management
B Tsoumas, D Gritzalis
20th International IEEE Conference on Advanced Information Networking …, 2006
1432006
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
N Virvilis, D Gritzalis, T Apostolopoulos
10th IEEE International Conference on Autonomous and Trusted Computing (ATC …, 2013
1312013
A risk assessment method for smartphones
M Theoharidou, A Mylonas, D Gritzalis
27th IFIP International Information Security and Privacy Conference, 443-456, 2012
1012012
A security architecture for interconnecting health information systems
D Gritzalis, C Lambrinoudakis
International Journal of Medical Informatics 73 (3), 305-309, 2004
932004
Insiders Trapped in the Mirror Reveal Themselves in Social Media
M Kandias, K Galbogini, L Mitrou, D Gritzalis
7th International Conference on Network and System Security (NSS-2013), 220-235, 2013
892013
A multi-layer criticality assessment methodology based on interdependencies
M Theoharidou, P Kotzanikolaou, D Gritzalis
Computers & Security 29 (6), 643-658, 2010
882010
Proactive insider threat detection through social media: The YouTube case
M Kandias, V Stavrou, N Bozovic, D Gritzalis
12th ACM Workshop on Privacy in the Electronic Society (WPES-2013), 261-266, 2013
842013
Assessing n-order dependencies between critical infrastructures
P Kotzanikolaou, M Theoharidou, D Gritzalis
International Journal of Critical Infrastructures 9 (1), 93-110, 2013
842013
Can we trust this user? Predicting insider’s attitude via YouTube usage profiling
M Kandias, V Stavrou, N Bozovic, L Mitrou, D Gritzalis
10th IEEE International Conference on Autonomous and Trusted Computing (ATC …, 2013
832013
Smartphone security evaluation: The malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
8th International Conference on Security and Cryptography (SECRYPT-2011 …, 2011
812011
Social media profiling: A Panopticon or Omniopticon tool?
L Mitrou, M Kandias, V Stavrou, D Gritzalis
6th Conference of the Surveillance Studies Network (SSN-2014), 2014
802014
The system can't perform the operation now. Try again later.
Articles 1–20