Get my own profile
Public access
View all8 articles
7 articles
available
not available
Based on funding mandates
Co-authors
- Dimitris A. GritzalisProfessor of Cybersecurity, Athens University of Economics & BusinessVerified email at aueb.gr
- Marianthi TheocharidouCybersecurity Officer, EU Agency for CybersecurityVerified email at enisa.europa.eu
- George StergiopoulosAssistant Professor, Inf. and Comm. Systems Engineering, University of the AegeanVerified email at aegean.gr
- Emmanouil (Manos) MagkosProfessor, Department of Informatics, Ionian UniversityVerified email at ionio.gr
- Dimitrios ZorbasNazarbayev University, School of Engineering and Digital Sciences, Department of Computer ScienceVerified email at ieee.org
- Sokratis K. KatsikasProfessor, Dept. of Information Security and Communication Technology, NTNUVerified email at ntnu.no
- Dimitrios D. VergadosUniversity of PiraeusVerified email at unipi.gr
- Nikolaos PetrakosComputer Science, Informatics, University of Piraeus GR, Naval PostGraduate School (NPS) USAVerified email at unipi.gr
- Constantinos PatsakisUniversity of PiraeusVerified email at unipi.gr
- GKIOULOS VASILEIOSNTNU i GjøvikVerified email at ntnu.no
- Gaute WangenAssociate Professor, NTNU GjøvikVerified email at ntnu.no
- Michalis KorakakisUniversity of CambridgeVerified email at cam.ac.uk
- Vassilios VerykiosHellenic Open University, GREECEVerified email at eap.gr
- Melanie BourocheTrinity College DublinVerified email at tcd.ie
Follow
Panayiotis Kotzanikolaou
Department of Informatics, University of Piraeus, Greece
Verified email at unipi.gr