Παρακολούθηση
Lilian Mitrou
Lilian Mitrou
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα aegean.gr
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Social media profiling: A Panopticon or Omniopticon tool?
L Mitrou, M Kandias, V Stavrou, D Gritzalis
Proc. of the 6th Conference of the Surveillance Studies Network, 1-15, 2014
1642014
Smartphone sensor data as digital evidence
A Mylonas, V Meletiadis, L Mitrou, D Gritzalis
Computers & Security 38, 51-75, 2013
1222013
History of information: the case of privacy and security in social media
D Gritzalis, M Kandias, V Stavrou, L Mitrou
Proc. of the History of Information Conference, 283-310, 2014
1102014
Insiders trapped in the mirror reveal themselves in social media
M Kandias, K Galbogini, L Mitrou, D Gritzalis
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
1092013
Can we trust this user? Predicting insider's attitude via YouTube usage profiling
M Kandias, V Stavrou, N Bozovic, L Mitrou, D Gritzalis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
1082013
Revisiting legal and regulatory requirements for secure e-voting
L Mitrou, D Gritzalis, S Katsikas
Security in the Information Society: Visions and Perspectives, 469-480, 2002
1072002
Which side are you on? A new Panopticon vs. privacy
M Kandias, L Mitrou, V Stavrou, D Gritzalis
2013 International Conference on Security and Cryptography (SECRYPT), 1-13, 2013
1032013
Data protection, artificial intelligence and cognitive services: is the general data protection regulation (GDPR)‘artificial intelligence-proof’?
L Mitrou
Artificial Intelligence and Cognitive Services: Is the General Data …, 2018
862018
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
802012
Employees’ privacy vs. employers’ security: Can they be balanced?
L Mitrou, M Karyda
Telematics and Informatics 23 (3), 164-178, 2006
752006
Internet forensics: Legal and technical issues
M Karyda, L Mitrou
Second international workshop on digital forensics and incident analysis …, 2007
652007
Privacy preservation by k-anonymization of weighted social networks
ME Skarkala, M Maragoudakis, S Gritzalis, L Mitrou, H Toivonen, P Moen
2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012
592012
Electronic voting: Constitutional and legal requirements, and their technical implications
L Mitrou, D Gritzalis, S Katsikas, G Quirchmayr
Secure electronic voting, 43-60, 2003
592003
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos
Computers & Security 74, 371-383, 2018
542018
A cyber attack evaluation methodology
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014
522014
Reengineering the user: privacy concerns about personal data on smartphones
M Tsavli, PS Efraimidis, V Katos, L Mitrou
Information & Computer Security 23 (4), 394-405, 2015
452015
EU's data protection reform and the right to be forgotten: A legal response to a technological challenge?
L Mitrou, M Karyda
5th International Conference of Information Law and Ethics, 29-30, 2012
412012
The General Data Protection Regulation: a law for the digital age?
L Mitrou
EU internet law: Regulation and enforcement, 19-57, 2017
392017
Data breach notification: issues and challenges for security management
M Karyda, L Mitrou
392016
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Information & Computer Security 24 (1), 38-52, 2016
362016
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20