Social media profiling: A Panopticon or Omniopticon tool? L Mitrou, M Kandias, V Stavrou, D Gritzalis Proc. of the 6th Conference of the Surveillance Studies Network, 1-15, 2014 | 166 | 2014 |
Smartphone sensor data as digital evidence A Mylonas, V Meletiadis, L Mitrou, D Gritzalis Computers & Security 38, 51-75, 2013 | 123 | 2013 |
History of information: the case of privacy and security in social media D Gritzalis, M Kandias, V Stavrou, L Mitrou Proc. of the History of Information Conference, 283-310, 2014 | 111 | 2014 |
Insiders trapped in the mirror reveal themselves in social media M Kandias, K Galbogini, L Mitrou, D Gritzalis Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 110 | 2013 |
Revisiting legal and regulatory requirements for secure e-voting L Mitrou, D Gritzalis, S Katsikas Security in the Information Society: Visions and Perspectives, 469-480, 2002 | 109 | 2002 |
Can we trust this user? Predicting insider's attitude via YouTube usage profiling M Kandias, V Stavrou, N Bozovic, L Mitrou, D Gritzalis 2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013 | 108 | 2013 |
Which side are you on? A new Panopticon vs. privacy M Kandias, L Mitrou, V Stavrou, D Gritzalis 2013 International Conference on Security and Cryptography (SECRYPT), 1-13, 2013 | 104 | 2013 |
Data protection, artificial intelligence and cognitive services: is the general data protection regulation (GDPR)‘artificial intelligence-proof’? L Mitrou Artificial Intelligence and Cognitive Services: Is the General Data …, 2018 | 87 | 2018 |
Smartphone forensics: A proactive investigation scheme for evidence acquisition A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 81 | 2012 |
Employees’ privacy vs. employers’ security: Can they be balanced? L Mitrou, M Karyda Telematics and Informatics 23 (3), 164-178, 2006 | 76 | 2006 |
Internet forensics: Legal and technical issues M Karyda, L Mitrou Second international workshop on digital forensics and incident analysis …, 2007 | 65 | 2007 |
Privacy preservation by k-anonymization of weighted social networks ME Skarkala, M Maragoudakis, S Gritzalis, L Mitrou, H Toivonen, P Moen 2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012 | 59 | 2012 |
Electronic voting: Constitutional and legal requirements, and their technical implications L Mitrou, D Gritzalis, S Katsikas, G Quirchmayr Secure electronic voting, 43-60, 2003 | 59 | 2003 |
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos Computers & Security 74, 371-383, 2018 | 56 | 2018 |
A cyber attack evaluation methodology K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014 | 52 | 2014 |
Reengineering the user: privacy concerns about personal data on smartphones M Tsavli, PS Efraimidis, V Katos, L Mitrou Information & Computer Security 23 (4), 394-405, 2015 | 45 | 2015 |
The General Data Protection Regulation: a law for the digital age? L Mitrou EU internet law: Regulation and enforcement, 19-57, 2017 | 42 | 2017 |
EU's data protection reform and the right to be forgotten: A legal response to a technological challenge? L Mitrou, M Karyda 5th International Conference of Information Law and Ethics, 29-30, 2012 | 42 | 2012 |
Data breach notification: issues and challenges for security management M Karyda, L Mitrou | 40 | 2016 |
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos Information & Computer Security 24 (1), 38-52, 2016 | 36 | 2016 |