Dimitris Gritzalis
Orcid: 0000-0002-7793-6128
According to our database1,
Dimitris Gritzalis
authored at least 203 papers
between 1991 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
2025
0
5
10
15
20
25
2
2
1
1
7
4
3
7
6
2
5
6
2
5
6
6
4
3
6
5
2
2
1
1
4
2
1
1
1
1
1
2
1
1
2
1
2
1
1
1
2
4
2
5
7
5
19
4
10
3
4
2
6
3
1
1
2
4
3
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
Int. J. Inf. Sec., October, 2024
Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices.
Sensors, September, 2024
Int. J. Inf. Sec., August, 2024
Enhancing attack resilience of cyber-physical systems through state dependency graph models.
Int. J. Inf. Sec., February, 2024
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks.
Comput. Secur., 2024
CSE-ARS: Deep Learning-Based Late Fusion of Multimodal Information for Chat-Based Social Engineering Attack Recognition.
IEEE Access, 2024
Automated Event Log Analysis With Causal Dependency Graphs for Impact Assessment of Business Processes.
IEEE Access, 2024
Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
Int. J. Inf. Sec., 2023
Int. J. Inf. Sec., 2023
IEEE Access, 2023
Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering.
IEEE Access, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
2022
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0.
Int. J. Inf. Sec., 2022
Int. J. Inf. Sec., 2022
Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks.
IEEE Access, 2022
Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
2021
Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection.
Sensors, 2021
Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era.
Secur. Commun. Networks, 2021
Dropping malware through sound injection: A comparative analysis on Android operating systems.
Comput. Secur., 2021
Design and Evaluation of COFELET-based Approaches for Cyber Security Learning and Training.
Comput. Secur., 2021
IEEE Access, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
2020
Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies.
Sensors, 2020
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis.
Secur. Priv., 2020
Automatic network restructuring and risk mitigation through business process asset dependency analysis.
Comput. Secur., 2020
Bus. Process. Manag. J., 2020
Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems.
Proceedings of the E-Business and Telecommunications, 2020
2019
Sensors, 2019
J. Comput. Secur., 2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
2018
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual.
Comput. Secur., 2018
Comput. Secur., 2018
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment.
Comput. Networks, 2018
Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure.
IEEE Access, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 Global Internet of Things Summit, 2018
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets.
Proceedings of the Computer Security, 2018
Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2018
2017
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures.
SIGMETRICS Perform. Evaluation Rev., 2017
Int. J. Soc. Netw. Min., 2017
Int. J. Crit. Infrastructures, 2017
Comput. Secur., 2017
Program analysis with risk-based classification of dynamic invariants for logical error detection.
Comput. Secur., 2017
Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module.
Comput. Secur., 2017
Proceedings of the Critical Infrastructure Protection XI, 2017
Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning.
Proceedings of the Critical Information Infrastructures Security, 2017
2016
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare.
Inf. Comput. Secur., 2016
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures.
Int. J. Crit. Infrastructure Prot., 2016
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Cyber-Attacks Evaluation Using Simple Additive Weighting Method on the Basis of Schmitt's Analysis.
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016
Proceedings of the Critical Infrastructure Protection X, 2016
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Proceedings of the HCI 2016, 2016
2015
Risk mitigation strategies for critical infrastructures based on graph centrality analysis.
Int. J. Crit. Infrastructure Prot., 2015
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015).
Comput. Secur., 2015
Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015).
Comput. Secur., 2015
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Critical Infrastructure Protection IX, 2015
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Critical Information Infrastructures Security, 2015
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar.
Proceedings of the Critical Information Infrastructures Security, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
2014
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication.
J. Comput. Secur., 2014
Comput. Secur., 2014
Comput. Secur., 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
2013
Int. J. Crit. Infrastructures, 2013
Comput. Secur., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 4th International Conference on Information, 2013
Proceedings of the 4th International Conference on Information, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the Critical Infrastructure Protection VII, 2013
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Int. J. Inf. Sec., 2012
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services.
Int. J. Electron. Secur. Digit. Forensics, 2012
Comput. Secur., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection.
Proceedings of the Critical Information Infrastructures Security, 2012
2011
J. Comput. Secur., 2011
Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Smartphone Security Evaluation - The Malware Attack Case .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects.
Proceedings of the Critical Information Infrastructure Security, 2011
Proceedings of the Critical Information Infrastructure Security, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
J. Comput. Secur., 2010
Comput. Secur., 2010
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony.
Comput. Secur., 2010
Proceedings of the Critical Information Infrastructures Security, 2010
Proceedings of the Critical Information Infrastructures Security, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
BLAST: Off-the-Shelf Hardware for Building an Efficient Hash-Based Cluster Storage System.
Proceedings of the NPC 2009, 2009
Proceedings of the Critical Infrastructure Protection III, 2009
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
2008
A CBK for Information Security and Critical Information and Communication Infrastructure Protection.
Int. J. Crit. Infrastructure Prot., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Computer Security, 2008
2007
Int. J. Medical Informatics, 2007
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
Proceedings of the Trust, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
2006
Telematics Informatics, 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments.
IEEE Trans. Inf. Technol. Biomed., 2005
Proceedings of the Computer Network Security, 2005
2004
Int. J. Medical Informatics, 2004
Comput. Secur., 2004
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks.
Proceedings of the Public Key Infrastructure, 2004
2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the Secure Electronic Voting, 2003
Comput. Commun., 2003
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information.
Comput. Commun., 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
J. Comput. Secur., 2002
Revisiting Legal and Regulatory Requirements for Secure E-Voting.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Functional Requirements for a Secure Electronic Voting System.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Elaborating Quantitative Approaches for IT Security Evaluation.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2001
Inf. Manag. Comput. Secur., 2001
Pythia: Towards Anonymity in Authentication.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the 21st International Conference of the Chilean Computer Science Society (SCCC 2001), 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
2000
A Qualitative Approach to Information Availability.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the CCS 2000, 2000
1999
Trusted third party services for deploying secure telemedical applications over the WWW.
Comput. Secur., 1999
1998
Microprocess. Microsystems, 1998
Proceedings of the MEDINFO '98, 1998
1997
Comput. Secur., 1997
1996
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996
Attack Modelling in Open Network Environments.
Proceedings of the Communications and Multimedia Security II, 1996
1995
Comput. Secur., 1995
1994
Comput. Secur., 1994
1992
1991