Ioannis Mavridis

Orcid: 0000-0001-8724-6801

According to our database1, Ioannis Mavridis authored at least 65 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring the Architectural Composition of Cyber Ranges: A Systematic Review.
Future Internet, July, 2024

CSE-ARS: Deep Learning-Based Late Fusion of Multimodal Information for Chat-Based Social Engineering Attack Recognition.
IEEE Access, 2024

A Methodology for Developing & Assessing CTI Quality Metrics.
IEEE Access, 2024

tCOFELET: Conceptual Framework for Team-Centric e-Learning and Training.
IEEE Access, 2024

2023
Cyber range design framework for cyber security education and training.
Int. J. Inf. Sec., 2023

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks.
IEEE Access, 2023

Risk-Based Illegal Information Flow Detection in the IIoT.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks.
IEEE Access, 2022

Assessing Input Use Efficiency of PGI Potatoes - Abstract.
Proceedings of the 10th International Conference on Information and Communication Technologies in Agriculture, 2022

2021
Contextualized Filtering for Shared Cyber Threat Information.
Sensors, 2021

Evaluation of HackLearn COFELET Game User Experience for Cybersecurity Education.
Int. J. Serious Games, 2021

Design and Evaluation of COFELET-based Approaches for Cyber Security Learning and Training.
Comput. Secur., 2021

Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
ARES: Automated Risk Estimation in Smart Sensor Environments.
Sensors, 2020

D4I - Digital forensics framework for reviewing and investigating cyber attacks.
Array, 2020

2019
Ontology-Based Modelling for Cyber Security E-Learning and Training.
Proceedings of the Advances in Web-Based Learning - ICWL 2019, 2019

Conceptual Framework for Developing Cyber Security Serious Games.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Access Control in the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Conceptualization of Game Based Approaches for Learning and Training on Cyber Security.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Conceptual analysis of cyber security education based on live competitions.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

2015
Information infrastructure risk prediction through platform vulnerability analysis.
J. Syst. Softw., 2015

Access Control Issues in Utilizing Fog Computing for Transport Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2015

2014
Security policy verification for multi-domains in cloud systems.
Int. J. Inf. Sec., 2014

GARS: Real-time system for identification, assessment and control of cyber grooming attacks.
Comput. Secur., 2014

2013
A method to calculate social networking hazard probability in definite time.
Inf. Manag. Comput. Secur., 2013

Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

A Methodology for the Development and Verification of Access Control Systems in Cloud Computing.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

2012
Quantifying and measuring metadata completeness.
J. Assoc. Inf. Sci. Technol., 2012

domRBAC: An access control model for modern collaborative systems.
Comput. Secur., 2012

A Use-Based Approach for Enhancing UCON.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Towards Use-Based Usage Control.
Proceedings of the Information Security and Privacy Research, 2012

Artemis: Protection from Sexual Exploitation Attacks via SMS.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Utilizing Survival Analysis for Modeling Child Hazards of Social Networking.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

Challenging issues of UCON in modern computing environments.
Proceedings of the Balkan Conference in Informatics, 2012, 2012

2011
A methodology for evaluating web-based educational systems using statistical multidimensional analysis.
Int. J. Learn. Technol., 2011

Deploying Privacy Improved RBAC in Web Information Systems.
Int. J. Inf. Technol. Syst. Approach, 2011

Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

X-EDCA: A cross-layer MAC-centric mechanism for efficient multimedia transmission in congested IEEE 802.11e infrastructure networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Utilizing document classification for grooming attack recognition.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Towards Colored Petri Net Modeling of Expanded C-TMAC.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
Towards Risk based Prevention of Grooming Attacks.
Proceedings of the SECRYPT 2010, 2010

An ICT Security Management Framework.
Proceedings of the SECRYPT 2010, 2010

Surveying Privacy Leaks Through Online Social Network.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

Towards Differentiated Utilization of Attribute Mutability for Access Control in Ubiquitous Computing.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

A Study on User Behavior and Acceptance of Electronic Banking Services.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2009
How e-learning systems may benefit from ontologies and recommendation methods to efficiently personalise resources.
Int. J. Knowl. Learn., 2009

A Foundation for Defining Security Requirements in Grid Computing.
Proceedings of the PCI 2009, 2009

A Fine-Grained Metric System for the Completeness of Metadata.
Proceedings of the Metadata and Semantic Research - Third International Conference, 2009

Evolving Challenges In Information Security Compliance.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

On the Definition of Access Control Requirements for Grid and Cloud Computing Systems.
Proceedings of the Networks for Grid Applications, 2009

2008
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time.
Int. J. Inf. Comput. Secur., 2008

A Conceptual Framework for Metadata Quality Assessment.
Proceedings of the 2008 International Conference on Dublin Core and Metadata Applications, 2008

2007
A Learner-centered Semantic Web-based Architecture.
Proceedings of the WEBIST 2007, 2007

Identifying Inference Rules for Automatic Metadata Generation from Pre-existing Metadata of Related Resources.
Proceedings of the Metadata and Semantics, 2007

2006
Web services and multimedia in m-business applications: Opportunities and concerns.
Int. J. Web Inf. Syst., 2006

A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Implementation and Evaluation of TCP Enhancements over Satellite Links.
Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), 2006

2003
Healthcare teams over the Internet: programming a certificate-based approach.
Int. J. Medical Informatics, 2003

Towards Dynamically Administered Role-Based Access Control
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2001
Flexible team-based access control using contexts.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

2000
Ασφάλεια πληροφοριακών συστημάτων και συστημάτων βάσεων δεδομένων σε περιβάλλον mobile computing
PhD thesis, 2000

1999
A Secure Payment System for Electronic Commerce.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
Design of Secure Distributed Medical Database Systems.
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998


  Loading...