Volgen
Lilian Mitrou
Lilian Mitrou
Geverifieerd e-mailadres voor aegean.gr
Titel
Geciteerd door
Geciteerd door
Jaar
Social media profiling: A Panopticon or Omniopticon tool?
L Mitrou, M Kandias, V Stavrou, D Gritzalis
Proc. of the 6th Conference of the Surveillance Studies Network, 1-15, 2014
1662014
Smartphone sensor data as digital evidence
A Mylonas, V Meletiadis, L Mitrou, D Gritzalis
Computers & Security 38, 51-75, 2013
1232013
History of information: the case of privacy and security in social media
D Gritzalis, M Kandias, V Stavrou, L Mitrou
Proc. of the History of Information Conference, 283-310, 2014
1112014
Insiders trapped in the mirror reveal themselves in social media
M Kandias, K Galbogini, L Mitrou, D Gritzalis
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
1102013
Revisiting legal and regulatory requirements for secure e-voting
L Mitrou, D Gritzalis, S Katsikas
Security in the Information Society: Visions and Perspectives, 469-480, 2002
1092002
Can we trust this user? Predicting insider's attitude via YouTube usage profiling
M Kandias, V Stavrou, N Bozovic, L Mitrou, D Gritzalis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
1082013
Which side are you on? A new Panopticon vs. privacy
M Kandias, L Mitrou, V Stavrou, D Gritzalis
2013 International Conference on Security and Cryptography (SECRYPT), 1-13, 2013
1042013
Data protection, artificial intelligence and cognitive services: is the general data protection regulation (GDPR)‘artificial intelligence-proof’?
L Mitrou
Artificial Intelligence and Cognitive Services: Is the General Data …, 2018
872018
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
812012
Employees’ privacy vs. employers’ security: Can they be balanced?
L Mitrou, M Karyda
Telematics and Informatics 23 (3), 164-178, 2006
762006
Internet forensics: Legal and technical issues
M Karyda, L Mitrou
Second international workshop on digital forensics and incident analysis …, 2007
652007
Privacy preservation by k-anonymization of weighted social networks
ME Skarkala, M Maragoudakis, S Gritzalis, L Mitrou, H Toivonen, P Moen
2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012
592012
Electronic voting: Constitutional and legal requirements, and their technical implications
L Mitrou, D Gritzalis, S Katsikas, G Quirchmayr
Secure electronic voting, 43-60, 2003
592003
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos
Computers & Security 74, 371-383, 2018
562018
A cyber attack evaluation methodology
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014
522014
Reengineering the user: privacy concerns about personal data on smartphones
M Tsavli, PS Efraimidis, V Katos, L Mitrou
Information & Computer Security 23 (4), 394-405, 2015
452015
The General Data Protection Regulation: a law for the digital age?
L Mitrou
EU internet law: Regulation and enforcement, 19-57, 2017
422017
EU's data protection reform and the right to be forgotten: A legal response to a technological challenge?
L Mitrou, M Karyda
5th International Conference of Information Law and Ethics, 29-30, 2012
422012
Data breach notification: issues and challenges for security management
M Karyda, L Mitrou
402016
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Information & Computer Security 24 (1), 38-52, 2016
362016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20