Bill Tsoumas
Bill Tsoumas
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα aueb.gr
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Towards an ontology-based security management
B Tsoumas, D Gritzalis
20th International Conference on Advanced Information Networking and …, 2006
1622006
Smartphone security evaluation the malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
Proceedings of the International Conference on Security and Cryptography, 25-36, 2011
932011
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
International Conference on Trust, Privacy and Security in Digital Business …, 2013
602013
An ontology-based approach to information systems security management
B Tsoumas, S Dritsas, D Gritzalis
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
552005
Secure electronic voting: The current landscape
C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos
Secure electronic voting, 101-122, 2003
532003
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
IFIP International Information Security Conference, 249-260, 2012
522012
OntoSPIT: SPIT management through ontologies
S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis
Computer Communications 32 (1), 203-212, 2009
492009
Electronic voting systems: Security implications of the administrative workflow
C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ...
14th International Workshop on Database and Expert Systems Applications …, 2003
362003
From risk analysis to effective security management: towards an automated approach
V Tsoumas, T Tryfonas
Information Management & Computer Security, 2004
332004
On the feasibility of malware attacks in smartphone platforms
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
International conference on e-business and telecommunications, 217-232, 2011
302011
Security-by-Ontology: A knowledge-centric approach
B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis
IFIP International Information Security Conference, 99-110, 2006
272006
A secure smartphone applications roll-out scheme
A Mylonas, B Tsoumas, S Dritsas, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2011
262011
Attack modeling of SIP-oriented SPIT
J Mallios, S Dritsas, B Tsoumas, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 299-310, 2007
232007
Hunting application-level logical errors
G Stergiopoulos, B Tsoumas, D Gritzalis
International Symposium on Engineering Secure Software and Systems, 135-142, 2012
212012
On business logic vulnerabilities hunting: the APP_LogGIC framework
G Stergiopoulos, B Tsoumas, D Gritzalis
International Conference on Network and System Security, 236-249, 2013
172013
Towards secure sealing of privacy policies
K Moulinos, J Iliadis, V Tsoumas
Information management & computer security, 2004
92004
An assurance-by-ontology paradigm proposal: Elements of security knowledge management
D Gritzalis, B Tsoumas
NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION …, 2006
82006
An ontology-based approach to network security management
V Tsoumas, S Dritsas, D Gritzalis
Proc. of the 3rd International Conference on Mathematical Models, Methods …, 0
7
Demonstration and empirical analysis of hunting application-level logic errors
G Stergiopoulos, V Tsoumas, D Gritzalis
Proc. of the 7th International Conference on Network and System Security …, 2013
62013
Secure electronic voting
C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos
Kluwer Academic Publishers, chapter Secure electronic voting: The current …, 2002
32002
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20