According to our database1, Bill Tsoumas authored at least 13 papers between 2005 and 2013.
Legend:Book In proceedings Article PhD thesis Other
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework.
Proceedings of the Network and System Security - 7th International Conference, 2013
Inside Cyber Warfare: Mapping the Cyber Underworld.
Computers & Security, 2012
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition.
Proceedings of the Information Security and Privacy Research, 2012
Hunting Application-Level Logical Errors.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
A Secure Smartphone Applications Roll-out Scheme.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Smartphone Security Evaluation - The Malware Attack Case .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
On the Feasibility of Malware Attacks in Smartphone Platforms.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
OntoSPIT: SPIT management through ontologies.
Computer Communications, 2009
Attack Modeling of SIP-Oriented SPIT.
Proceedings of the Critical Information Infrastructures Security, 2007
Security-by-Ontology: A Knowledge-Centric Approach.
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Towards an Ontology-based Security Management.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
An Ontology-Based Approach to Information Systems Security Management.
Proceedings of the Computer Network Security, 2005