Costas Lambrinoudakis
Orcid: 0000-0003-3101-5347
According to our database1,
Costas Lambrinoudakis
authored at least 109 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Forensic Sci. Int. Digit. Investig., 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Int. J. Inf. Sec., June, 2023
Proceedings of the 13th International Conference on Dependable Systems, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
Int. J. Inf. Sec., 2022
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud.
CoRR, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Modern Socio-Technical Perspectives on Privacy, 2022
2021
Future Internet, 2021
Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework.
Comput. Sci. Inf. Syst., 2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
2020
Proceedings of the Advanced Computational Intelligence in Healthcare - 7, 2020
Compatibility of a Security Policy for a Cloud-Based Healthcare System with the EU General Data Protection Regulation (GDPR).
Inf., 2020
Inf. Comput. Secur., 2020
Inf. Comput. Secur., 2020
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
Proceedings of the 9th International Conference on Information Communication and Management, 2019
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile.
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019
2018
Comput. Secur., 2018
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018
The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
2017
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens' Trust and the Role of Information Privacy.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017
2016
Proceedings of the Trust, Privacy and Security in Digital Business, 2016
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
2015
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments.
Int. J. Inf. Sec., 2015
Future Internet, 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Proceedings of the 19th Panhellenic Conference on Informatics, 2015
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
2014
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments.
J. Cloud Comput., 2014
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014
Empowering Users to Specify and Manage Their Privacy Preferences in e-Government Environments.
Proceedings of the Electronic Government and the Information Systems Perspective, 2014
2013
Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy.
Inf. Manag. Comput. Secur., 2013
Int. J. Inf. Sec., 2013
Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments.
IEEE Commun. Surv. Tutorials, 2013
Comput. Math. Appl., 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
Secur. Commun. Networks, 2012
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012
2011
Wirel. Commun. Mob. Comput., 2011
Int. J. Inf. Technol. Syst. Approach, 2011
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
2010
Proceedings of the Trust, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
Proceedings of the Electronic Government and the Information Systems Perspective, 2010
2009
Trans. Large Scale Data Knowl. Centered Syst., 2009
Comput. Secur., 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of IEEE International Conference on Communications, 2009
Information Systems Security Management: A Review and a Classification of the ISO Standards.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
2008
Encyclopedia of Wireless and Mobile Communications, 2008
Comput. Secur., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony.
Proceedings of the Trust, 2008
A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks.
Proceedings of the 4th International ICST Mobile Multimedia Communications Conference, 2008
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
Proceedings of the Computer Security, 2008
2007
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment.
Telecommun. Syst., 2007
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec., 2007
Special issue: TrustBus 2006.
Comput. Syst. Sci. Eng., 2007
A framework for protecting a SIP-based infrastructure against malformed message attacks.
Comput. Networks, 2007
2006
Telematics Informatics, 2006
J. Biomed. Informatics, 2006
Inf. Manag. Comput. Secur., 2006
IEEE Commun. Surv. Tutorials, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments.
IEEE Trans. Inf. Technol. Biomed., 2005
Comput. Stand. Interfaces, 2005
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
2004
Internet Res., 2004
Int. J. Medical Informatics, 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions.
Proceedings of the Public Key Infrastructure, 2004
2003
Proceedings of the Secure Electronic Voting, 2003
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.
Comput. Commun., 2003
Proceedings of the Computer Safety, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Functional Requirements for a Secure Electronic Voting System.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Security Requirements of e-Government Services: An Organizational Framework.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2001
Pythia: Towards Anonymity in Authentication.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
2000
Inf. Manag. Comput. Secur., 2000
Using Smart Cards in an Educational Environment: Services and Security Features.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1995
Int. J. High Speed Comput., 1995
1991
GPFP: A SIMD PE for Higher VLSI Densities.
Proceedings of the VLSI 91, 1991
GPFP: an array processing element for the next generation of massively parallel supercomputer architectures.
Proceedings of the Proceedings Supercomputing '91, 1991