Bill Tsoumas

According to our database1, Bill Tsoumas authored at least 13 papers between 2005 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Inside Cyber Warfare: Mapping the Cyber Underworld.
Comput. Secur., 2012

Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition.
Proceedings of the Information Security and Privacy Research, 2012

Hunting Application-Level Logical Errors.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

2011
A Secure Smartphone Applications Roll-out Scheme.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Smartphone Security Evaluation - The Malware Attack Case .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

On the Feasibility of Malware Attacks in Smartphone Platforms.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

2009
OntoSPIT: SPIT management through ontologies.
Comput. Commun., 2009

2007
Attack Modeling of SIP-Oriented SPIT.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Security-by-Ontology: A Knowledge-Centric Approach.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Towards an Ontology-based Security Management.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
An Ontology-Based Approach to Information Systems Security Management.
Proceedings of the Computer Network Security, 2005


  Loading...