Towards an ontology-based security management B Tsoumas, D Gritzalis 20th International Conference on Advanced Information Networking and …, 2006 | 210 | 2006 |
Smartphone security evaluation the malware attack case A Mylonas, S Dritsas, B Tsoumas, D Gritzalis Proceedings of the international conference on security and cryptography, 25-36, 2011 | 112 | 2011 |
Smartphone forensics: A proactive investigation scheme for evidence acquisition A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 81 | 2012 |
A qualitative metrics vector for the awareness of smartphone security users A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos Trust, Privacy, and Security in Digital Business: 10th International …, 2013 | 80 | 2013 |
An ontology-based approach to information systems security management B Tsoumas, S Dritsas, D Gritzalis Computer Network Security: Third International Workshop on Mathematical …, 2005 | 62 | 2005 |
Secure electronic voting: The current landscape C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos Secure electronic voting, 101-122, 2003 | 61 | 2003 |
OntoSPIT: SPIT management through ontologies S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis Computer Communications 32 (1), 203-212, 2009 | 55 | 2009 |
Electronic voting systems: Security implications of the administrative workflow C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ... 14th International Workshop on Database and Expert Systems Applications …, 2003 | 40 | 2003 |
From risk analysis to effective security management: towards an automated approach V Tsoumas, T Tryfonas Information Management & Computer Security 12 (1), 91-101, 2004 | 36 | 2004 |
On the feasibility of malware attacks in smartphone platforms A Mylonas, S Dritsas, B Tsoumas, D Gritzalis E-Business and Telecommunications: International Joint Conference, ICETE …, 2012 | 35 | 2012 |
Security-by-Ontology: A knowledge-centric approach B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006 | 30 | 2006 |
A secure smartphone applications roll-out scheme A Mylonas, B Tsoumas, S Dritsas, D Gritzalis Trust, Privacy and Security in Digital Business: 8th International …, 2011 | 29 | 2011 |
Attack modeling of SIP-oriented SPIT J Mallios, S Dritsas, B Tsoumas, D Gritzalis Critical Information Infrastructures Security: Second International Workshop …, 2008 | 28 | 2008 |
Hunting application-level logical errors G Stergiopoulos, B Tsoumas, D Gritzalis Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012 | 23 | 2012 |
On business logic vulnerabilities hunting: the APP_LogGIC framework G Stergiopoulos, B Tsoumas, D Gritzalis Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 17 | 2013 |
An assurance-by-ontology paradigm proposal: Elements of security knowledge management D Gritzalis, B Tsoumas NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION …, 2006 | 11 | 2006 |
Towards secure sealing of privacy policies K Moulinos, J Iliadis, V Tsoumas Information management & computer security 12 (4), 350-361, 2004 | 9 | 2004 |
An ontology-based approach to network security management V Tsoumas, S Dritsas, D Gritzalis Proc. of the 3rd International Conference on Mathematical Models, Methods …, 0 | 9 | |
Demonstration and empirical analysis of hunting application-level logic errors G Stergiopoulos, V Tsoumas, D Gritzalis Proc. of the 7th International Conference on Network & System Security, 236-249, 2013 | 8 | 2013 |
Secure e-Voting: The Current Landscape C Lambrinoudakis, V Tsoumas, M Karyda, S Ikonomopoulos, D Gritzalis Secure Electronic Voting: Trends and Perspectives, Capabilities and Limitations, 2002 | 4 | 2002 |