Christos Kalloniatis

Orcid: 0000-0002-8844-2596

According to our database1, Christos Kalloniatis authored at least 90 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater Things.
Future Internet, 2023

AegeanDigital Tourism Tank: Experiences and Products for Enhancing the Sustainable Preservation of Digital Heritage of Cultural Organizations of North Aegean.
Proceedings of the Transdisciplinary Multispectral Modeling and Cooperation for the Preservation of Cultural Heritage, 2023

Review on Privacy and Trust Methodologies in Cloud Computing.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Control Centers for the Wellbeing of Elders with Intellectual Disabilities.
Proceedings of the 13th International Conference on Dependable Systems, 2023

2022
Understanding the role of users' socio-location attributes and their privacy implications on social media.
Inf. Comput. Secur., 2022

Determining the Role of Social Identity Attributes to the Protection of Users' Privacy in Social Media.
Future Internet, 2022

The Role of Users' Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study.
Future Internet, 2022

Mapping CRUD to Events - Towards an object to event-sourcing framework.
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022

Virtual Reality as a mean for increasing privacy awareness: The escape room example.
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022

Self-Adaptive Privacy in Cloud Computing: An overview under an interdisciplinary spectrum.
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022

Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things.
Proceedings of the Artificial Intelligence Applications and Innovations, 2022

A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

Object Relational Mapping Vs. Event-Sourcing: Systematic Review.
Proceedings of the Electronic Government and the Information Systems Perspective, 2022

2021
Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks.
Future Internet, 2021

Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework.
Comput. Sci. Inf. Syst., 2021

Can social gamification and privacy co-exist? Identifying the major concerns.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

Disclosing Social and Location Attributes on Social Media: The Impact on Users' Privacy.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
A Chebyshev polynomial feedforward neural network trained by differential evolution and its application in environmental case studies.
Environ. Model. Softw., 2020

Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Securing User eXperience: A Review for the End-Users' Software Robustness.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
A framework for designing cloud forensic-enabled services (CFeS).
Requir. Eng., 2019

E-Governance in educational settings.
Internet Res., 2019

Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts.
Int. J. Appl. Geospat. Res., 2019

Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes.
Future Internet, 2019

Gamification vs. Privacy: Identifying and Analysing the Major Concerns.
Future Internet, 2019

Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

The Interrelation of Game Elements and Privacy Requirements for the Design of a System: A Metamodel.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

2018
Interpretability Constraints for Fuzzy Modeling Implemented by Constrained Particle Swarm Optimization.
IEEE Trans. Fuzzy Syst., 2018

Assurance of Security and Privacy Requirements for Cloud Deployment Models.
IEEE Trans. Cloud Comput., 2018

Towards a Security Assurance Framework for Connected Vehicles.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

A Decision-Making Approach for Improving Organizations' Cloud Forensic Readiness.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Towards the Design of Usable Privacy by Design Methodologies.
Proceedings of the 5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2018

Modeling Data Center Temperature Profile in Terms of a First Order Polynomial RBF Network Trained by Particle Swarm Optimization.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

2017
Incorporating privacy in the design of cloud-based systems: a conceptual meta-model.
Inf. Comput. Secur., 2017

Designing Secure and Privacy-Aware Information Systems.
Int. J. Secur. Softw. Eng., 2017

A methodology to carry out voting classification tasks using a particle swarm optimization-based neuro-fuzzy competitive learning network.
Evol. Syst., 2017

A conceptual model to support security analysis in the internet of things.
Comput. Sci. Inf. Syst., 2017

Modelling Cloud Forensic-Enabled Services.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Supporting Privacy by Design Using Privacy Process Patterns.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Supporting the design of privacy-aware business processes via privacy process patterns.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

The role of Gender Privacy in the use of Cloud Computing Services.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Machine Learning and Images for Malware Detection and Classification.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Social Media Use for Decision Making Process in Educational Settings: The Greek Case for Leadership's Views and Attitude in Secondary and Tertiary Education.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Managing User Experience: Usability and Security in a New Era of Software Supremacy.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

"I Have Learned that I Must Think Twice Before...". An Educational Intervention for Enhancing Students' Privacy Awareness in Facebook.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

2016
A survey on cloud forensics challenges and solutions.
Secur. Commun. Networks, 2016

Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners.
Int. J. Secur. Softw. Eng., 2016

Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Modelling Secure Cloud Computing Systems from a Security Requirements Perspective.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Incorporating privacy patterns into semi-automatic business process derivation.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

Migrating eGovernment Services in the Cloud: A Capability Modelling Approach.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

Reasoning About Security and Privacy in Cloud Computing Under a Unified Meta-Model.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Apparatus: Reasoning About Security Requirements in the Internet of Things.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

2015
A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments.
Future Internet, 2015

Privacy as an Integral Part of the Implementation of Cloud Solutions.
Comput. J., 2015

Designing Privacy-Aware Systems in the Cloud.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Privacy and Facebook Universities Students' Communities for Confessions and Secrets: The Greek Case.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

A Meta-model for Assisting a Cloud Forensics Process.
Proceedings of the Risks and Security of Internet and Systems, 2015

Addressing Privacy and Trust Issues in Cultural Heritage Modelling.
Proceedings of the Risks and Security of Internet and Systems, 2015

Towards the Development of a Cloud Forensics Methodology: A Conceptual Model.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.
Comput. Stand. Interfaces, 2014

Privacy-Aware Cloud Deployment Scenario Selection.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Requirements Identification for Migrating eGovernment Applications to the Cloud.
Proceedings of the Information and Communication Technology, 2014

Cloud Forensics Solutions: A Review.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Cloud Forensics: Identifying the Major Issues and Challenges.
Proceedings of the Advanced Information Systems Engineering, 2014

2013
Evaluating cloud deployment scenarios based on security and privacy requirements.
Requir. Eng., 2013

A framework to support selection of cloud providers based on security and privacy requirements.
J. Syst. Softw., 2013

Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Privacy in the Cloud: Bridging the Gap between Design and Implementation.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Aligning Security and Privacy to Support the Development of Secure Information Systems.
J. Univers. Comput. Sci., 2012

Model Based Process to Support Security and Privacy Requirements Engineering.
Int. J. Secur. Softw. Eng., 2012

Applying Soft Computing Technologies for Implementing Privacy-Aware Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

2011
The "Panopticon" of search engines: the response of the European data protection framework.
Requir. Eng., 2011

A soft computing approach for privacy requirements engineering: The PriS framework.
Appl. Soft Comput., 2011

2010
Privacy Requirements Engineering for Trustworthy e-Government Services.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

2009
Search Engines: Gateway to a New "Panopticon"?
Proceedings of the Trust, 2009

Methods for Designing Privacy Aware Information Systems: A Review.
Proceedings of the PCI 2009, 2009

Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

2008
Addressing privacy requirements in system design: the PriS method.
Requir. Eng., 2008

2007
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process.
Proceedings of the The Second International Conference on Availability, 2007

2006
Incorporating privacy requirements into the system design process: The PriS conceptual framework.
Internet Res., 2006

2005
A Fuzzy Logic-Based Approach for Detecting Shifting Patterns in Cross-Cultural Data.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005

Analysis of Cross-Cultural Data using Hierarchical Fuzzy Logic Clustering.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2005

2004
Fuzzy Clustering of Categorical Attributes and its Use in Analyzing Cultural Data.
Proceedings of the International Conference on Computational Intelligence, 2004

Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks.
Proceedings of the Electronic Government: Third International Conference, 2004


  Loading...