Prof. Stefanos Gritzalis
TitleCited byYear
Survey of security vulnerabilities in session initiation protocol
D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ...
IEEE Communications Surveys & Tutorials 8 (3), 68-81, 2006
2242006
Addressing privacy requirements in system design: the PriS method
C Kalloniatis, E Kavakli, S Gritzalis
Requirements Engineering 13 (3), 241-255, 2008
1802008
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
C Lambrinoudakis, S Gritzalis, F Dridi, GN Pernul
Computer Communications 26 (16), 1873-1883, 2003
1752003
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
S Gritzalis, D Spinellis, P Georgiadis
Computer Communications 22 (8), 697-709, 1999
1391999
Integrating wireless sensor networks and the internet: a security analysis
R Roman, J Lopez
Internet Research 19 (2), 246-259, 2009
1252009
Identifying authorship by byte-level n-grams: The source code author profile (scap) method
G Frantzeskou, E Stamatatos, S Gritzalis, CE Chaski, BS Howald
International Journal of Digital Evidence 6 (1), 1-18, 2007
1182007
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
1082013
Enhancing web privacy and anonymity in the digital era
S Gritzalis
Information Management & Computer Security 12 (3), 255-287, 2004
952004
Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset
C Kolias, G Kambourakis, A Stavrou, S Gritzalis
IEEE Communications Surveys & Tutorials 18 (1), 184-208, 2015
932015
Effective identification of source code authors using byte-level information
G Frantzeskou, E Stamatatos, S Gritzalis, S Katsikas
Proceedings of the 28th international conference on Software engineering …, 2006
802006
Digital privacy: theory, technologies, and practices
A Acquisti, S Gritzalis, C Lambrinoudakis, S di Vimercati
CRC Press, 2007
772007
SIP Security Mechanisms: A state-of-the-art review
D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ...
Proceedings of the Fifth International Network Conference (INC 2005), 147-155, 2005
772005
A framework for protecting a SIP-based infrastructure against malformed message attacks
D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ...
Computer Networks 51 (10), 2580-2593, 2007
762007
Security requirements, risks and recommendations for small enterprise and home-office environments
D Spinellis, S Kokolakis, S Gritzalis
Information Management & Computer Security 7 (3), 121-128, 1999
741999
A survey on cluster-based group key agreement protocols for WSNs
E Klaoudatou, E Konstantinou, G Kambourakis, S Gritzalis
IEEE Communications surveys & tutorials 13 (3), 429-442, 2010
732010
Detecting DNS amplification attacks
G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis
International Workshop on Critical Information Infrastructures Security, 185-196, 2007
732007
Advanced SSL/TLS-based authentication for secure WLAN-3G interworking
G Kambourakis, A Rouskas, G Kormentzas, S Gritzalis
IEE Proceedings-Communications 151 (5), 501-506, 2004
692004
A modular approach to ERP system selection: A case study
M Ziaee, M Fathian, SJ Sadjadi
Information Management & Computer Security 14 (5), 485-495, 2006
682006
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
672012
Introducing traffic analysis
G Danezis, R Clayton
Digital Privacy, 117-138, 2007
642007
The system can't perform the operation now. Try again later.
Articles 1–20