Stelios Dritsas
Stelios Dritsas
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα aueb.gr - Αρχική σελίδα
ΤίτλοςΠαρατίθεται απόΈτος
Smartphone security evaluation the malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
Proceedings of the International Conference on Security and Cryptography, 25-36, 2011
912011
Protecting privacy and anonymity in pervasive computing: trends and perspectives
S Dritsas, D Gritzalis, C Lambrinoudakis
Telematics and informatics 23 (3), 196-210, 2006
662006
An ontology for secure e-government applications
M Karyda, T Balopoulos, S Dritsas, L Gymnopoulos, S Kokolakis, ...
First International Conference on Availability, Reliability and Security …, 2006
552006
An ontology-based approach to information systems security management
B Tsoumas, S Dritsas, D Gritzalis
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
522005
OntoSPIT: SPIT management through ontologies
S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis
Computer Communications 32 (1), 203-212, 2009
482009
An adaptive policy-based approach to SPIT management
Y Soupionis, S Dritsas, D Gritzalis
European Symposium on Research in Computer Security, 446-460, 2008
452008
SIP vulnerabilities and anti-SPIT mechanisms assessment
GF Marias, S Dritsas, M Theoharidou, J Mallios, D Gritzalis
2007 16th International Conference on Computer Communications and Networks …, 2007
432007
Threat analysis of the session initiation protocol regarding spam
S Dritsas, J Mallios, M Theoharidou, GF Marias, D Gritzalis
2007 IEEE International Performance, Computing, and Communications …, 2007
382007
Secure cloud storage: Available infrastructures and architectures review and evaluation
N Virvilis, S Dritsas, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2011
302011
On the feasibility of malware attacks in smartphone platforms
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
International conference on e-business and telecommunications, 217-232, 2011
292011
A cloud provider-agnostic secure storage protocol
N Virvilis, S Dritsas, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 104-115, 2010
272010
A knowledge-based approach to security requirements for e-health applications
S Dritsas, L Gymnopoulos, M Karyda, T Balopoulos, S Kokolakis, ...
Electronic Journal for E-Commerce Tools and Applications, 1-24, 2006
272006
Spit identification criteria implementation: Effectiveness and lessons learned
S Dritsas, Y Soupionis, M Theoharidou, Y Mallios, D Gritzalis
IFIP International Information Security Conference, 381-395, 2008
262008
A secure smartphone applications roll-out scheme
A Mylonas, B Tsoumas, S Dritsas, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2011
252011
Security-by-Ontology: A knowledge-centric approach
B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis
IFIP International Information Security Conference, 99-110, 2006
252006
Attack modeling of SIP-oriented SPIT
J Mallios, S Dritsas, B Tsoumas, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 299-310, 2007
222007
The ambient intelligence paradigm A review of security and privacy strategies in leading economies
M Theoharidou, G Marias, S Dritsas, D Gritzalis
2006 2nd IET International Conference on Intelligent Environments-IE 06 2 …, 2006
212006
Employing ontologies for the development of security critical applications
S Dritsas, L Gymnopoulos, M Karyda, T Balopoulos, S Kokolakis, ...
Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government …, 2005
162005
GRID security review
L Gymnopoulos, S Dritsas, S Gritzalis, C Lambrinoudakis
International Workshop on Mathematical Methods, Models, and Architectures …, 2003
162003
Applicability of privacy enhancing technologies in ubiquitous computing environments
S Dritsas, J Mallios, D Gritzalis, C Lambrinoudakis
Proc. of the IEEE Workshop on Security, Privacy and Trust in Ubiquitous …, 2005
112005
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20