Stelios Dritsas
Title
Cited by
Cited by
Year
Smartphone security evaluation the malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
Proceedings of the International Conference on Security and Cryptography, 25-36, 2011
922011
Protecting privacy and anonymity in pervasive computing: trends and perspectives
S Dritsas, D Gritzalis, C Lambrinoudakis
Telematics and informatics 23 (3), 196-210, 2006
692006
An ontology for secure e-government applications
M Karyda, T Balopoulos, S Dritsas, L Gymnopoulos, S Kokolakis, ...
First International Conference on Availability, Reliability and Security …, 2006
562006
An ontology-based approach to information systems security management
B Tsoumas, S Dritsas, D Gritzalis
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
522005
OntoSPIT: SPIT management through ontologies
S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis
Computer Communications 32 (1), 203-212, 2009
492009
An adaptive policy-based approach to SPIT management
Y Soupionis, S Dritsas, D Gritzalis
European Symposium on Research in Computer Security, 446-460, 2008
462008
SIP vulnerabilities and anti-SPIT mechanisms assessment
GF Marias, S Dritsas, M Theoharidou, J Mallios, D Gritzalis
2007 16th International Conference on Computer Communications and Networks …, 2007
442007
Threat analysis of the session initiation protocol regarding spam
S Dritsas, J Mallios, M Theoharidou, GF Marias, D Gritzalis
2007 IEEE International Performance, Computing, and Communications …, 2007
392007
Secure cloud storage: Available infrastructures and architectures review and evaluation
N Virvilis, S Dritsas, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2011
312011
On the feasibility of malware attacks in smartphone platforms
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
International conference on e-business and telecommunications, 217-232, 2011
302011
A cloud provider-agnostic secure storage protocol
N Virvilis, S Dritsas, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 104-115, 2010
282010
A knowledge-based approach to security requirements for e-health applications
S Dritsas, L Gymnopoulos, M Karyda, T Balopoulos, S Kokolakis, ...
Electronic Journal for E-Commerce Tools and Applications, 1-24, 2006
282006
Spit identification criteria implementation: Effectiveness and lessons learned
S Dritsas, Y Soupionis, M Theoharidou, Y Mallios, D Gritzalis
IFIP International Information Security Conference, 381-395, 2008
272008
Security-by-Ontology: A knowledge-centric approach
B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis
IFIP International Information Security Conference, 99-110, 2006
272006
A secure smartphone applications roll-out scheme
A Mylonas, B Tsoumas, S Dritsas, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2011
262011
Attack modeling of SIP-oriented SPIT
J Mallios, S Dritsas, B Tsoumas, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 299-310, 2007
232007
The ambient intelligence paradigm A review of security and privacy strategies in leading economies
M Theoharidou, G Marias, S Dritsas, D Gritzalis
2006 2nd IET International Conference on Intelligent Environments-IE 06 2 …, 2006
222006
GRID security review
L Gymnopoulos, S Dritsas, S Gritzalis, C Lambrinoudakis
International Workshop on Mathematical Methods, Models, and Architectures …, 2003
172003
Employing ontologies for the development of security critical applications
S Dritsas, L Gymnopoulos, M Karyda, T Balopoulos, S Kokolakis, ...
Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government …, 2005
162005
Applicability of privacy enhancing technologies in ubiquitous computing environments
S Dritsas, J Mallios, D Gritzalis, C Lambrinoudakis
Proc. of the IEEE Workshop on Security, Privacy and Trust in Ubiquitous …, 2005
122005
The system can't perform the operation now. Try again later.
Articles 1–20