Stefanos Gritzalis
Orcid: 0000-0002-8037-2191Affiliations:
- University of Piraeus, Greece
- University of the Aegean, Samos, Greece (former)
According to our database1,
Stefanos Gritzalis
authored at least 260 papers
between 1992 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on ds.unipi.gr
-
on orcid.org
On csauthors.net:
Bibliography
2025
Assessing the detection of lateral movement through unsupervised learning techniques.
Comput. Secur., 2025
2024
Leveraging application permissions and network traffic attributes for Android ransomware detection.
J. Netw. Comput. Appl., 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Int. J. Inf. Sec., June, 2023
Int. J. Inf. Sec., 2023
Comput. Secur., 2023
2022
Directional Hinge Features for Writer Identification: The Importance of the Skeleton and the Effects of Character Size and Pixel Intensity.
SN Comput. Sci., 2022
Determining the Role of Social Identity Attributes to the Protection of Users' Privacy in Social Media.
Future Internet, 2022
The Role of Users' Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study.
Future Internet, 2022
Modern Socio-Technical Perspectives on Privacy, 2022
2021
Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks.
Future Internet, 2021
Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework.
Comput. Sci. Inf. Syst., 2021
Public sector innovation through design thinking: Applying a participatory policy design practice to support the formulation of a national digital transformation strategy.
Proceedings of the ICEGOV 2021: 14th International Conference on Theory and Practice of Electronic Governance, Athens, Greece, October 6, 2021
2020
Inf., 2020
Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the 5th South-East Europe Design Automation, 2020
Proceedings of the Human Aspects of Information Security and Assurance, 2020
Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
2019
Inf. Secur. J. A Glob. Perspect., 2019
Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts.
Int. J. Appl. Geospat. Res., 2019
Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes.
Future Internet, 2019
Future Internet, 2019
Proceedings of the 13th Mediterranean Conference on Information Systems, 2019
An Intercountry Survey of Participatory Practices Used for Open Government Partnership National Action Plan Development.
Proceedings of the Electronic Government - 18th IFIP WG 8.5 International Conference, 2019
A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019
Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Ind. Informatics, 2018
Interpretability Constraints for Fuzzy Modeling Implemented by Constrained Particle Swarm Optimization.
IEEE Trans. Fuzzy Syst., 2018
IEEE Trans. Cloud Comput., 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the 5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2018
An assessment of privacy preservation in crowdsourcing approaches: Towards GDPR compliance.
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
The Civil Society as an Innovation Partner in Public Policy Making: Co-Creating the Greek National Action Plan on Open Government.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018
2017
Int. J. Secur. Softw. Eng., 2017
CoRR, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Supporting the design of privacy-aware business processes via privacy process patterns.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Maturity Level of the Quality Assurance Evaluation Procedures in Higher Education: A qualitative research.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Social Media Use for Decision Making Process in Educational Settings: The Greek Case for Leadership's Views and Attitude in Secondary and Tertiary Education.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
"I Have Learned that I Must Think Twice Before...". An Educational Intervention for Enhancing Students' Privacy Awareness in Facebook.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017
Proceedings of the 9th Cloud Computing Security Workshop, 2017
Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Secur. Commun. Networks, 2016
Int. J. Interact. Mob. Technol., 2016
Int. J. Artif. Intell. Tools, 2016
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Commun. Surv. Tutorials, 2016
Proceedings of the Trust, Privacy and Security in Digital Business, 2016
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016
Self-disclosure, Privacy concerns and Social Capital benefits interaction in FB: A case study.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
2015
Future Internet, 2015
Comput. J., 2015
Privacy and Facebook Universities Students' Communities for Confessions and Secrets: The Greek Case.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015
Proceedings of the Advanced Information Systems Engineering Workshops, 2015
2014
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol.
Secur. Commun. Networks, 2014
Peer-to-Peer Netw. Appl., 2014
Privacy Preserving Data Mining Using Radial Basis Functions on Horizontally Partitioned Databases in the Malicious Model.
Int. J. Artif. Intell. Tools, 2014
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.
Comput. Stand. Interfaces, 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
A holistic approach for quality assurance and advanced decision making for academic institutions using the balanced scorecard technique.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
Proceedings of the 14th International Conference on Frontiers in Handwriting Recognition, 2014
Proceedings of the Advanced Information Systems Engineering Workshops, 2014
Proceedings of the Advanced Information Systems Engineering, 2014
2013
Requir. Eng., 2013
Pers. Ubiquitous Comput., 2013
Math. Comput. Model., 2013
A framework to support selection of cloud providers based on security and privacy requirements.
J. Syst. Softw., 2013
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem.
Int. J. Inf. Sec., 2013
Int. J. Inf. Sec., 2013
Int. J. Adv. Pervasive Ubiquitous Comput., 2013
IEEE Commun. Surv. Tutorials, 2013
Comput. Secur., 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013
Proceedings of the Advanced Information Systems Engineering Workshops, 2013
2012
Secur. Commun. Networks, 2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012
Aligning Security and Privacy to Support the Development of Secure Information Systems.
J. Univers. Comput. Sci., 2012
Inf. Syst. Frontiers, 2012
Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing Students.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012
Proceedings of the Advanced Information Systems Engineering Workshops, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Wirel. Commun. Mob. Comput., 2011
IEEE J. Sel. Areas Commun., 2011
J. Inf. Technol. Res., 2011
The significance of user-defined identifiers in Java source code authorship identification.
Comput. Syst. Sci. Eng., 2011
IEEE Commun. Surv. Tutorials, 2011
Appl. Soft Comput., 2011
Appl. Soft Comput., 2011
Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned Databases.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
2010
Towards adaptive security for convergent wireless sensor networks in beyond 3G environments.
Wirel. Commun. Mob. Comput., 2010
Intell. Autom. Soft Comput., 2010
Information and communications security, privacy and trust: Standards and regulations.
Comput. Stand. Interfaces, 2010
Comput. Commun., 2010
Comput. Commun., 2010
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Proceedings of the Electronic Government and the Information Systems Perspective, 2010
2009
J. Univers. Comput. Sci., 2009
J. Netw. Comput. Appl., 2009
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Res., 2009
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags.
IEEE Commun. Lett., 2009
Data Knowl. Eng., 2009
Proceedings of the Trust, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
End to end secure communication in ad-hoc assistive medical environments using secure paths.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009
Proceedings of the PCI 2009, 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of IEEE International Conference on Communications, 2009
Information Systems Security Management: A Review and a Classification of the ISO Standards.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
2008
Encyclopedia of Wireless and Mobile Communications, 2008
Enabling the provision of secure web based m-health services utilizing XML based security models.
Secur. Commun. Networks, 2008
Requir. Eng., 2008
Examining the significance of high-level programming features in source code author classification.
J. Syst. Softw., 2008
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification.
J. Comput. Secur., 2008
Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach.
Int. J. Syst. Syst. Eng., 2008
Int. J. Inf. Sec., 2008
Comput. Stand. Interfaces, 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections.
Proceedings of the Privacy in Statistical Databases, 2008
Proceedings of the 16th Euromicro International Conference on Parallel, 2008
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
Proceedings of the Computer Security, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Telecommun. Syst., 2007
Telecommun. Syst., 2007
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec., 2007
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method.
Int. J. Digit. EVid., 2007
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks.
IEEE Commun. Surv. Tutorials, 2007
A framework for protecting a SIP-based infrastructure against malformed message attacks.
Comput. Networks, 2007
A PKI approach for deploying modern secure distributed e-learning and m-learning environments.
Comput. Educ., 2007
Proceedings of the Trust, 2007
Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains.
Proceedings of the Trust, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments.
Proceedings of the Advances in Computer Science, 2007
Proceedings of the The Second International Conference on Availability, 2007
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process.
Proceedings of the The Second International Conference on Availability, 2007
2006
Incorporating privacy requirements into the system design process: The PriS conceptual framework.
Internet Res., 2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006
IEEE Commun. Surv. Tutorials, 2006
Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks.
Comput. Commun., 2006
Comput. Networks, 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Artificial Intelligence Applications and Innovations, 2006
Proceedings of the Artificial Intelligence Applications and Innovations, 2006
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Withdrawing a declaration of will: Towards a framework for digital signature revocation.
Internet Res., 2005
A good-practice guidance on the use of PKI services in the public sector of the European Union member states.
Inf. Manag. Comput. Security, 2005
Int. J. Pervasive Comput. Commun., 2005
Comput. Stand. Interfaces, 2005
Comput. Stand. Interfaces, 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains.
Proceedings of the Trust, 2005
Proceedings of the Advances in Informatics, 2005
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005
Evaluation of digital certificates acquisition in large-scale 802.11-3GPP hybrid environments.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005
Pervasive Secure Electronic Healthcare Records Management.
Proceedings of the Ubiquitous Computing, 2005
Proceedings of the International Conference on Pervasive Services 2005, 2005
Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information.
Proceedings of the ICETE 2005, 2005
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
Introducing Ontology-based Security Policy Management in the Grid.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Incorporating Security Requirements Into the Software Development Process.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
2004
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks.
Wirel. Pers. Commun., 2004
Internet Res., 2004
Inf. Manag. Comput. Secur., 2004
Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems.
EURASIP J. Wirel. Commun. Netw., 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004
Proceedings of the NETWORKING 2004, 2004
Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process.
Proceedings of the ICETE 2004, 2004
Implementing Knowledge Management Techniques for Security Purposes.
Proceedings of the ICEIS 2004, 2004
Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks.
Proceedings of the Electronic Government: Third International Conference, 2004
Proceedings of the Electronic Government: Third International Conference, 2004
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.
Proceedings of the Communications and Multimedia Security, 2004
2003
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.
Comput. Commun., 2003
Comput. Commun., 2003
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information.
Comput. Commun., 2003
Introducing PKI to Enhance Security in Future Mobile Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Computer Safety, 2003
Proceedings of the Electronic Government, Second International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Quality assured trusted third parties for deploying secure internet-based healthcare applications.
Int. J. Medical Informatics, 2002
Security Requirements of e-Government Services: An Organizational Framework.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002
Using SSL/TLS in authentication and key agreement procedures of future mobile networks.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002
2001
Oper. Res., 2001
Inf. Manag. Comput. Secur., 2001
Towards an ISO-9000 compliant certification service provider.
Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), 2001
2000
Distributed component software security issues on deploying a secure electronic marketplace.
Inf. Manag. Comput. Secur., 2000
Comput. Secur., 2000
1999
Security requirements, risks and recommendations for small enterprise and home-office environments.
Inf. Manag. Comput. Secur., 1999
Trusted third party services for deploying secure telemedical applications over the WWW.
Comput. Secur., 1999
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification.
Comput. Commun., 1999
1998
Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl.
ACM SIGOPS Oper. Syst. Rev., 1998
The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction.
Microprocess. Microsystems, 1998
Proceedings of the Computer Safety, 1998
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
1997
Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools.
Proceedings of the 16th International Conference on Computer Safety, 1997
1996
Security profile for interconnected open distributed systems with varying vulnerability.
Proceedings of the Information Systems Security, 1996
1992