2017

J70. Stergiopoulos G., Kouktzoglou V., Theocharidou M., Gritzalis D., "A process-based dependency risk analysis methodology for critical infrastructures", International Journal of Critical Infrastructures (Special Issue), April 2017 (to appear) (preprint version).

J69. Pipyros K., Thraskias C., Mitrou L., Gritzalis D., Apostolopoulos T., “A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual”, Computers & Security (Special Issue), April 2017(preprint version).

J68. Tsalis N., Mylonas A., Nisioti A., Gritzalis D., Katos V., “Exploring the protection of private browsing in desktop browsers”, Computers & Security, Vol. 67, pp. 181-197, 2017 (preprint version).

J67. Gkritzali A., Gritzalis D., Stavrou V., “Is Xenios Zeus still alive? Destination image of Athens in the years of Recession”, Journal of Travel Research, February 2017 (accepted for publication).

J66. Stergiopoulos G., Katsaros P., Gritzalis D., “Program analysis with risk-based classification of dynamic invariants for logical error detection”, Computers & Security (Special Issue), February 2017 (preprint version).

2016

J65. Kandias M., Gritzalis D., Stavrou V., Nikoloulis K., “Stress level detection via OSN usage pattern and chronicity analysis: Αn OSINT threat intelligence module”, Computers & Security, December 2016 (accepted for publication) (preprint version).

J64. Kandias M., Mitrou L., Stavrou V., Gritzalis D., “Profiling Online Social Networks Users as an Omniopticon Tool”, International Journal of Social Networks Mining, 2016 (to appear) (preprint version).

J63. Stergiopoulos G., Kotzanikolaou P., Theocharidou M., Lykou G., Gritzalis D., “Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures”, Ιnternational Journal of Critical Infrastructure Protection, March 2016 (to appear) (preprint version).

J62. Tsavli M., Efraimidis P., Katos V., Mitrou L., "Reengineering the user: Privacy concerns about personal data on smartphones", Information & Computer Security, Vol. 23, No. 4, pp. 394-405, 2015.

J61. Pipyros K., Mitrou L., Gritzalis D., Apostolopoulos T., "Cyberoperations and International Humanitarian Law: A review of obstacles in applying International Law rules in Cyber Warfare", Information & Computer Security, Vol. 24, No. 1, pp. 38-52, 2016 (preprint version).

2015

J60. Andriotis P., Oikonomou G., Mylonas A., Tryfonas T., “A study on usability and security features of the Android pattern lock screen”, Information and Computer Security, 2015.

J59. Kozik R., Choras M., Flizikowski A., Theocharidou M., Rosato V., Rome E., Advanced services for critical infrastructures protection, Journal of Ambient Intelligence and Humanized Computing, Springer, Vol. 6, Issue 6, pp. 783-795, December 2015.

J58. Stergiopoulos G., Kotzanikolaou P., Theoharidou M., Gritzalis D., "Risk mitigation strategies for Critical Infrastructures based on graph centrality analysis", International Journal of Critical Infrastructure Protection, Vol. 10, pp. 34-44, September 2015 (preprint version).

J57. Virvilis N., Tsalis N., Mylonas A., Gritzalis D., “Security Busters: Web browser secu­ri­­­ty vs. suspicious sites”, Computers & Security, Vol. 52, pp. 90-105, July 2015 (preprint version).

J56. Ntalampiras S., Soupionis Y., Giannopoulos G., “A Fault Diagnosis System For Interdependent Critical Infrastructures Based On HMMs”, Reliability Engineering and System Safety, 2015.  

2014

J55. Marangos N., Rizomiliotis P., Mitrou L., "Time synchronization: Pivotal element in Cloud Forensics", Security and Communication Networks, 2014 (to appear).

J54. Katos V., Psaroudakis I., Saragiotis P., Mitrou L., "A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description Protocol (SDP)", International Journal of Electronic Security and Digital Forensics, 2014 (to appear).

J53. Virvilis N., Serrano O., Dandurand L., "Big Data analytics for sophisticated attack detection", ISACA Journal, Vol. 3, 2014 (to appear).

J52. Soupionis Y., Koutsiamanis A.-R., Efraimidis P., Gritzalis D., “A game-theoretic analysis of preventing spam over Internet Τelephony with audio CAPTCHA-based authentication”, Journal of Computer Security, Vol. 22, pp. 383-413, 2014.

2013

J51. Mylonas A., Meletiadis V., Mitrou L., Gritzalis D., “Smartphone sensor data as digital evidence”, Computers & Security (Special Issue: Cybercrime in the Digital Economy), Vol. 38, pp. 51-75, October 2013.

J50. Kotzanikolaou P., Theoharidou M., Gritzalis D., "Accessing n-order dependencies between critical infrastructures", International Journal of Critical Infrastructures, Vol. 9, Nos. 1-2, pp. 93-110, 2013.

J49. Mylonas A., Kastania A., Gritzalis D., “Delegate the smartphone user? Security awareness in smartphone platforms”, Computers & Security, Vol. 34, pp. 47-66, May 2013.

2012

J48. Tsiakis T., Katsaros P., Gritzalis D., “Externality cost assessment for interactive audio me­­dia protection of Internet services”, Journal of Electronic Security & Digital Foren­sics, Vol. 4, Nos. 2/3, pp. 164-177, 2012.

J47. Gritzalis D., Katsaros P., Basagiannis S., Soupionis Y., “Formal analysis for robust anti-SPIT protection using model-checking”, International Journal of Information Security, Vol. 11, No. 2, pp. 121-135, 2012.

2011

J46. Theoharidou M., Kotzanikolaou P., Gritzalis D., “Risk assessment methodology for interdependent critical infrastructures”, International Journal of Risk Assessment and Management (Special Issue on Risk Analysis of Critical Infrastructures), Vol. 15, Nos. 2/3, pp. 128-148, 2011.

J45. Gritzalis D., Marias G., Rebahi Y., Soupionis Y., Ehlert S., “SPIDER: A platform for ma­­na­­ging SIP-based spam over Internet Telephony”, Journal of Computer Security, Vol. 19, No. 5, pp. 835-867, 2011.

2010

J44. Lekkas D., Gritzalis D., “e-Passports as a means towards a globally interoperable Public Key Infrastructure”, Journal of Computer Security, Vol. 18, No. 3, pp. 379-396, 2010.

J43. Soupionis Y., Gritzalis D., “Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony”, Computers & Security, Vol. 29, Νο. 5, pp. 603-618, 2010.

J42. Theoharidou M., Kotzanikolaou P., Gritzalis D., “A multi-layer Criticality Assessment methodology based on interdependencies”, Computers & Security, Vol. 29, No. 6, pp. 643-658, 2010. 

2009

J41. Stamatiou P., Gritzalis D., "Countering Unsolicited Calls in the Internet Telephony: An anti-SPIT Architecture", Hellenic Open University Journal of Informatics, Vol. 2, No. 1, pp. 49-63, 2009.

J40. Dritsas S., Tsoumas B., Dritsou V., Konstantopoulos P., Gritzalis D., "OntoSPIT: SPIT Management through Ontologies", Computer Communications, Vol. 32, No. 2, pp. 203-212, 2009.

2008

J39. Theoharidou M., Xidara D., Gritzalis D., "A Common Body of Knowledge for Information Security and Critical Information and Communication Infrastructure Protection", International Journal of Critical Infrastructure Protection, Vol. 1, No. 1, pp. 81-96, 2008.

J38. Gritzalis D., Mallios Y., "A SIP-based SPIT management framework", Computers & Security, 2008, Vol. 27, Nos. 5-6, pp.136-153, October 2008.

2007

J37. Theoharidou M., Gritzalis D., "A Common Body of Knowledge for Information Security", IEEE Security & Privacy, Vol. 4, No. 2, pp. 64-67, March/April 2007. 

2006

J36. Lekkas D., Gritzalis D., "Long-term verifiability of healthcare records authenticity", International Journal of Medical Informatics, Vol. 76, Issue 5-6, pp. 442-448, 2006.

J35. Dritsas S., Gritzalis D., Lambrinoudakis C., "Protecting privacy and anonymity in pervasive computing trends and perspectives", Telematics and Informatics Journal, Special Issue on Privacy and Anonymity in the Global Village, Vol. 23, No. 3, pp.196-210, 2006, Elsevier Science.

J34. A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, "Formulating Information Systems Risk Management Strategies through Cultural Theory", Information Management and Computer Security, Vol. 14, No. 3, pp. 198-217, 2006, Emerald.

J33. L. Kazatzopoulos, C. Delakouridis, G. F. Marias, P. Georgiadis, "ISSON: An Incentive-based Architecture to Enable Privacy in Dynamic Environments," Emerald, Internet Research Journal, Special Issue Privacy and Anonymity in the Digital Era: Theory, Technologies, and Practice, Vol. 16 No. 2, 2006, pp. 170-188.

J32. G. F. Marias, D. Flitzanis, and K. Mandalas, "Cooperation Enforcement Schemes for MANETs: A Survey," Wiley's Journal of Wireless Communications and Mobile Computing (WCMC), Special Issue on Wireless Networks Security, Vol.6, Issue 3, pp. 319-332, 2006.

J31. G. F. Marias, L. Kazatzopoulos, C. Delakouridis, P. Georgiadis, "Applying Privacy on the Dis­semination of Location Information," Elsevier Telematics and Informatics Journal, Special Issue "Privacy and Anonymity in the Global Village", Vol.23, No.3, pp. 211-219, Aug. 2006 

2005

J30. Karyda M., Kiountouzis E., Kokolakis S., "Information systems security: A contextual perspective", Computers & Security, Vol. 24, no. 3, pp.246-260, 2005.

J29. Theoharidou M., Kokolakis S., Karyda M., Kiountouzis E., "The insider threat to Information Systems and the effectiveness of ISO 17799" , Computers & Security, Vol. 24, no. 6, pp. 472-484, 2005.

2004

J28. Gritzalis D., "Embedding privacy in IT applications development", Information Management and Computer Security Journal, Vol. 12, no. 1, pp. 8-26, MCB University Press, 2004.

J27. Gritzalis D., Lambrinoudakis C., "A Security Architecture for Interconnecting Health Information Systems", International Journal of Medical Informatics, Vol. 73, pp. 305-9, 2004.

J26. Lekkas D., Gritzalis D., Cumulative Notarization for Long-term Preservation of Digital Signatures, Computers & Security, Vol. 23, no. 5, pp. 413-424, 2004.

J25. Moulinos K., Iliadis J., Tsoumas V., "Towards secure sealing of privacy policies", Information Management & Computer Security , Vol. 12 , No. 4, pp. 350-360, 2004.

2003

J24. Iliadis J., Gritzalis S., Gritzalis D., "ADoCSI: A transparent mechanism for disseminating Certificate Status Information", Computer Communications ,Vol. 26, No. 16, pp. 1851-1862, October 2003.

J23. Iliadis J., Gritzalis S., Spinellis D., De Cock D., Preneel B., Gritzalis D., "Towards a framework for evaluating Certificate Status Information mechanism", Computer Communications, Vol.26, No.16, pp. 1839-1850, October 2003.

2002

J22. Gritzalis D., "Principles and requirements for a secure e-voting system", Computers & Security, Vol. 21, No. 6, pp. 539-556, 2002.

J21. Spinellis D., Gritzalis D., " PANOPTIS: Intrusion detection using process accounting records", Journal of Computer Security, Vol. 10, No. 2, pp. 159-176, IOS Press, 2002.

J20. Spinellis D., Moulinos K., Iliadis J., Gritzalis S., Gritzalis D., Katsikas S., "Deploying a secure cyberbazaar by adding trust to commercial applications", eJournal for Electronic Commerce Tools and Applications, Vol. 1, Νο . 2, November 2002. 

2001

J19. Gritzalis S., Gritzalis D., "A digital seal solution for deploying trust on commercial transactions", Information Management and Computer Security Journal, MCB University Press, Vol. 9, No. 2, pp. 71-79, March 2001.

J18. Gritzalis S., Gritzalis D., Moulinos K., Iliadis J., "An integrated architecture for deploying a vir­tual private medical network over the Web", Medical Informatics Journal, Vol. 26, No.1, pp. 49-72, March 2001, Cambridge University Press.

2000

J17. Gritzalis D., Lambrinoudakis C., "A data protection scheme for a remote vital signs monitoring service", Medical Informatics Journal, Vol. 25, No. 2, pp. 207-224, Taylor & Francis, July 2000.

J16. Gritzalis S., Katsikas S., Lekkas D., Moulinos K., Polydorou E., "Securing the electronic market:The KEYSTONE Public Key Infrastructure architecture",Computers & Security, Vol. 19, No 8, p. 731-746, 2000. 

1999

J15. Gritzalis S., Iliadis J., Gritzalis D., Spinellis D., Katsikas S., "Developing secure web-based medical applications", Medical Informatics, Vol. 24, No. 1, pp. 75-90, 1999.

J14. Kokolakis S., Gritzalis D., Katsikas S., "Generic Security Policies for Healthcare Information Systems", Health Informatics Journal, Vol. 4, No. 3 . 4, pp. 142-159, 1999.

J13. Spinellis D., Gritzalis S., Iliadis J., Gritzalis D., Katsikas S., "Trusted Third Party services for deploying secure telemedical applications over the WWW", Computers & Security , Vol. 18, No. 7, pp. 627-639, 1999.

1998

J12. Gritzalis D., "Enhancing security and improving interoperability in healthcare information systems" , Medical Informatics , Vol. 23, No. 4, pp. 309-324, 1998.

1997

J11. Gritzalis D., "A baseline security policy for distributed healthcare information systems", Computers & Security, Vol. 16, No. 8, pp. 709-719, 1997. 

1996

J10. Gritzalis D., Katsikas S., "Towards a formal system to system authentication protocol", Computer Communications , Vol. 19, No. 8, pp. 954-961, 1996.

J09. Katsikas S., Spyrou T., Gritzalis D., Darzentas J., "Model for network behaviour under viral attack", Computer Communications, Vol. 19, No. 2, pp. 124-132, 1996.

1995

J08. Doumas A., Mavroudakis K., Gritzalis D., Katsikas S., "Design of a neural network for recognition and classification of computer viruses", Computers & Security,Vol. 14, No. 5, pp. 435-448, October 1995.

1994

J07. Denault M., Gritzalis D., Karagiannis D., Spirakis P., "Intrusion detection: Evaluation and performance issues of the SECURENET system", Computers & Security,Vol. 13, No. 6, pp. 495-508, October 1994.

J06. Katsikas S., Gritzalis D., "The need for a security policy in Health Care Institutions", Journal of Biomedical Computing, Vol. 35, pp. 73-80, 1994. 

1992

J05. Gritzalis D., Katsikas S., Gritzalis S., "A zero-knowledge probabilistic login protocol", Computers & Security, Vol. 11, No. 8, pp. 733-745, December 1992.

J04 .Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Determining access rights in medical information systems", Computers & Security, Vol. 11, No. 2, pp. 149-162, April 1992.

1991

J03. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Data security in medical information systems: Technical aspects of a proposed legislation", Medical Informatics, Vol. 16, No. 4, pp. 371-383, September 1991.

J02. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Data security in medical information systems: The Greek case", Computers & Security, Vol. 10, No. 2, pp. 141-159, April 1991.

1990

J01. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Medical data protection: A proposal for a deontology code", Medical Systems Journal, Vol. 14, No. 6, pp. 375-386, December 1990 (also in: Berleur J.J., Brunnstein K. (Eds.), Ethics of Computing, Chapman & Hall, February 1997 (2nd edition)).