Bill Tsoumas
Bill Tsoumas
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα aueb.gr
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Towards an ontology-based security management
B Tsoumas, D Gritzalis
20th International Conference on Advanced Information Networking and …, 2006
1742006
Smartphone security evaluation the malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
Proceedings of the international conference on security and cryptography, 25-36, 2011
1062011
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
International Conference on Trust, Privacy and Security in Digital Business …, 2013
642013
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
IFIP International Information Security Conference, 249-260, 2012
602012
An ontology-based approach to information systems security management
B Tsoumas, S Dritsas, D Gritzalis
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
592005
Secure electronic voting: The current landscape
C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos
Secure electronic voting, 101-122, 2003
582003
OntoSPIT: SPIT management through ontologies
S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis
Computer Communications 32 (1), 203-212, 2009
542009
Electronic voting systems: Security implications of the administrative workflow
C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ...
14th International Workshop on Database and Expert Systems Applications …, 2003
382003
On the feasibility of malware attacks in smartphone platforms
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
International conference on e-business and telecommunications, 217-232, 2011
352011
From risk analysis to effective security management: towards an automated approach
V Tsoumas, T Tryfonas
Information Management & Computer Security, 2004
352004
A secure smartphone applications roll-out scheme
A Mylonas, B Tsoumas, S Dritsas, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2011
282011
Security-by-Ontology: A knowledge-centric approach
B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis
IFIP International Information Security Conference, 99-110, 2006
282006
Attack modeling of SIP-oriented SPIT
J Mallios, S Dritsas, B Tsoumas, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 299-310, 2007
262007
Hunting application-level logical errors
G Stergiopoulos, B Tsoumas, D Gritzalis
International Symposium on Engineering Secure Software and Systems, 135-142, 2012
222012
On business logic vulnerabilities hunting: the APP_LogGIC framework
G Stergiopoulos, B Tsoumas, D Gritzalis
International Conference on Network and System Security, 236-249, 2013
172013
An Assurance-by-Ontology Paradigm Proposal: Elements of Security Knowledge
D Gritzalis, B Tsoumas
Information Assurance and Computer Security 6, 15, 2006
92006
Towards secure sealing of privacy policies
K Moulinos, J Iliadis, V Tsoumas
Information management & computer security, 2004
92004
An ontology-based approach to network security management
V Tsoumas, S Dritsas, D Gritzalis
Proc. of the 3rd International Conference on Mathematical Models, Methods …, 0
8
Demonstration and empirical analysis of hunting application-level logic errors
G Stergiopoulos, V Tsoumas, D Gritzalis
Proc. of the 7th International Conference on Network & System Security, 236-249, 2013
72013
Secure electronic voting
C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos
Kluwer Academic Publishers, chapter Secure electronic voting: The current …, 2002
32002
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20