Dimitris Gritzalis

Orcid: 0000-0002-7793-6128

According to our database1, Dimitris Gritzalis authored at least 195 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing attack resilience of cyber-physical systems through state dependency graph models.
Int. J. Inf. Sec., February, 2024

CSE-ARS: Deep Learning-Based Late Fusion of Multimodal Information for Chat-Based Social Engineering Attack Recognition.
IEEE Access, 2024

2023
Correction to: A decentralized honeypot for IoT Protocols based on Android devices.
Int. J. Inf. Sec., 2023

Cyber range design framework for cyber security education and training.
Int. J. Inf. Sec., 2023

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks.
IEEE Access, 2023

Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering.
IEEE Access, 2023

Risk-Based Illegal Information Flow Detection in the IIoT.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0.
Int. J. Inf. Sec., 2022

A decentralized honeypot for IoT Protocols based on Android devices.
Int. J. Inf. Sec., 2022

Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks.
IEEE Access, 2022

Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection.
Sensors, 2021

Sensors Cybersecurity.
Sensors, 2021

Contextualized Filtering for Shared Cyber Threat Information.
Sensors, 2021

Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era.
Secur. Commun. Networks, 2021

Dropping malware through sound injection: A comparative analysis on Android operating systems.
Comput. Secur., 2021

Design and Evaluation of COFELET-based Approaches for Cyber Security Learning and Training.
Comput. Secur., 2021

A Security-Aware Framework for Designing Industrial Engineering Processes.
IEEE Access, 2021

Towards Integrating Security in Industrial Engineering Design Practices.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies.
Sensors, 2020

Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis.
Secur. Priv., 2020

Automatic network restructuring and risk mitigation through business process asset dependency analysis.
Comput. Secur., 2020

Negative MWOM and value co-destruction during destination crises.
Bus. Process. Manag. J., 2020

Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns.
IEEE Access, 2020

Assessing Interdependencies and Congestion Delays in the Aviation Network.
IEEE Access, 2020

Avoiding Network and Host Detection using Packet Bit-masking.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems.
Proceedings of the E-Business and Telecommunications, 2020

2019
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.
Sensors, 2019

Using side channel TCP features for real-time detection of malware connections.
J. Comput. Secur., 2019

Access Control in the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

Towards Indeterminacy-Tolerant Access Control in IoT.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
Exiting the Risk Assessment Maze: A Meta-Survey.
ACM Comput. Surv., 2018

A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual.
Comput. Secur., 2018

A new methodology toward effectively assessing data center sustainability.
Comput. Secur., 2018

Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment.
Comput. Networks, 2018

Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure.
IEEE Access, 2018

Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Implementing Cyber-Security Measures in Airports to Improve Cyber-Resilience.
Proceedings of the 2018 Global Internet of Things Summit, 2018

Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets.
Proceedings of the Computer Security, 2018

Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures.
SIGMETRICS Perform. Evaluation Rev., 2017

Profiling online social networks users: an omniopticon tool.
Int. J. Soc. Netw. Min., 2017

A process-based dependency risk analysis methodology for critical infrastructures.
Int. J. Crit. Infrastructures, 2017

Exploring the protection of private browsing in desktop browsers.
Comput. Secur., 2017

Program analysis with risk-based classification of dynamic invariants for logical error detection.
Comput. Secur., 2017

Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module.
Comput. Secur., 2017

Protecting the Transportation Sector from the Negative Impacts of Climate Change.
Proceedings of the Critical Infrastructure Protection XI, 2017

Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare.
Inf. Comput. Secur., 2016

Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures.
Int. J. Crit. Infrastructure Prot., 2016

Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Cyber-Attacks Evaluation Using Simple Additive Weighting Method on the Basis of Schmitt's Analysis.
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016

Classification and Comparison of Critical Infrastructure Protection Tools.
Proceedings of the Critical Infrastructure Protection X, 2016

Critical Infrastructure Protection: A Holistic Methodology for Greece.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

Human-Centered Specification Exemplars for Critical Infrastructure Environments.
Proceedings of the HCI 2016, 2016

2015
Risk mitigation strategies for critical infrastructures based on graph centrality analysis.
Int. J. Crit. Infrastructure Prot., 2015

Security Busters: Web browser security vs. rogue sites.
Comput. Secur., 2015

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015).
Comput. Secur., 2015

Hacking and Penetration Testing with Low Power Devices.
Comput. Secur., 2015

Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015).
Comput. Secur., 2015

Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.
Proceedings of the SECRYPT 2015, 2015

Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation.
Proceedings of the Critical Infrastructure Protection IX, 2015

Execution Path Classification for Vulnerability Analysis and Detection.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Access Control Issues in Utilizing Fog Computing for Transport Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2015

"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar.
Proceedings of the Critical Information Infrastructures Security, 2015

An Intensive Analysis of Security and Privacy Browser Add-Ons.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication.
J. Comput. Secur., 2014

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks.
Comput. Secur., 2014

Securing cloud and mobility: A practitioner's guide.
Comput. Secur., 2014

A Bug Hunter's Diary.
Comput. Secur., 2014

Introduction to Computer and Network Security: Navigating Shades of Gray.
Comput. Secur., 2014

Editorial.
Comput. Secur., 2014

Business Process Modeling for Insider Threat Monitoring and Handling.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Mobile Devices - A Phisher's Paradise.
Proceedings of the SECRYPT 2014, 2014

Insider Threat: Enhancing BPM through Social Media.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Browser Blacklists: The Utopia of Phishing Protection.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Automated Detection of Logical Errors in Programs.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Assessing n-order dependencies between critical infrastructures.
Int. J. Crit. Infrastructures, 2013

Hacking VoIP.
Comput. Secur., 2013

Smartphone sensor data as digital evidence.
Comput. Secur., 2013

Delegate the smartphone user? Security awareness in smartphone platforms.
Comput. Secur., 2013

Metasploit the Penetration Tester's Guide.
Comput. Secur., 2013

Cybercrime in the Digital Economy - Editorial.
Comput. Secur., 2013

Proactive insider threat detection through social media: the YouTube case.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Qualitative Metrics Vector for the Awareness of Smartphone Security Users.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Evaluating the Manageability of Web Browsers Controls.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Approaching Encryption through Complex Number Logarithms.
Proceedings of the SECRYPT 2013, 2013

Which Side Are You On? - A New Panopticon vs. Privacy.
Proceedings of the SECRYPT 2013, 2013

Assessing Privacy Risks in Android: A User-Centric Approach.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework.
Proceedings of the Network and System Security - 7th International Conference, 2013

Insiders Trapped in the Mirror Reveal Themselves in Social Media.
Proceedings of the Network and System Security - 7th International Conference, 2013

S-Port: Collaborative security management of Port Information systems.
Proceedings of the 4th International Conference on Information, 2013

The Sphinx enigma in critical VoIP infrastructures: Human or botnet?
Proceedings of the 4th International Conference on Information, 2013

In Cloud We Trust: Risk-Assessment-as-a-Service.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Cascading Effects of Common-Cause Failures in Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection VII, 2013

Youtube User and Usage Profiling: Stories of Political Horror and Security Success.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

Return on Security Investment for Cloud Platforms.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Privacy Risk, Security, Accountability in the Cloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

A Practical Steganographic Approach for Matroska Based High Quality Video Files.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

The Big Four - What We Did Wrong in Advanced Persistent Threat Detection?
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Formal analysis for robust anti-SPIT protection using model checking.
Int. J. Inf. Sec., 2012

Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services.
Int. J. Electron. Secur. Digit. Forensics, 2012

Inside Cyber Warfare: Mapping the Cyber Underworld.
Comput. Secur., 2012

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
Comput. Secur., 2012

A Risk Assessment Method for Smartphones.
Proceedings of the Information Security and Privacy Research, 2012

Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition.
Proceedings of the Information Security and Privacy Research, 2012

Hunting Application-Level Logical Errors.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT).
J. Comput. Secur., 2011

Guest Editor's Preface.
J. Comput. Secur., 2011

Editorial.
Comput. Secur., 2011

Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

A Secure Smartphone Applications Roll-out Scheme.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Smartphone Security Evaluation - The Malware Attack Case .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Exploitation of auctions for outsourcing security-critical projects.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Economic Evaluation of Interactive Audio Media for Securing Internet Services.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Securing Transportation-Critical Infrastructures: Trends and Perspectives.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

On the Feasibility of Malware Attacks in Smartphone Platforms.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects.
Proceedings of the Critical Information Infrastructure Security, 2011

The Insider Threat in Cloud Computing.
Proceedings of the Critical Information Infrastructure Security, 2011

ASPF: Adaptive anti-SPIT Policy-based Framework.
Proceedings of the Sixth International Conference on Availability, 2011

2010
e-Passports as a means towards a Globally Interoperable Public Key Infrastructure.
J. Comput. Secur., 2010

A multi-layer Criticality Assessment methodology based on interdependencies.
Comput. Secur., 2010

Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony.
Comput. Secur., 2010

Editorial.
Comput. Secur., 2010

Editorial.
Comput. Secur., 2010

Editorial.
Comput. Secur., 2010

An Insider Threat Prediction Model.
Proceedings of the Trust, 2010

A Cloud Provider-Agnostic Secure Storage Protocol.
Proceedings of the Critical Information Infrastructures Security, 2010

A Formally Verified Mechanism for Countering SPIT.
Proceedings of the Critical Information Infrastructures Security, 2010

2009
Editorial.
Comput. Secur., 2009

Editorial.
Comput. Secur., 2009

Editorial.
Comput. Secur., 2009

Editorial.
Comput. Secur., 2009

OntoSPIT: SPIT management through ontologies.
Comput. Commun., 2009

Audio CAPTCHA for SIP-Based VoIP.
Proceedings of the Emerging Challenges for Security, 2009

BLAST: Off-the-Shelf Hardware for Building an Efficient Hash-Based Cluster Storage System.
Proceedings of the NPC 2009, 2009

Risk-Based Criticality Analysis.
Proceedings of the Critical Infrastructure Protection III, 2009

An Ontology-Driven antiSPIT Architecture.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
A CBK for Information Security and Critical Information and Communication Infrastructure Protection.
Int. J. Crit. Infrastructure Prot., 2008

A SIP-oriented SPIT Management Framework.
Comput. Secur., 2008

SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

An Adaptive Policy-Based Approach to SPIT Management.
Proceedings of the Computer Security, 2008

2007
Long-term verifiability of the electronic healthcare records' authenticity.
Int. J. Medical Informatics, 2007

Common Body of Knowledge for Information Security.
IEEE Secur. Priv., 2007

Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
Proceedings of the Trust, 2007

Threat Analysis of the Session Initiation Protocol Regarding Spam.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

A CBK for Information Security and Critical Infrastructure Protection.
Proceedings of the Fifth World Conference on Information Security Education, 2007

SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

E-Passports as a Means Towards the First World-Wide Public Key Infrastructure.
Proceedings of the Public Key Infrastructure, 2007

Attack Modeling of SIP-Oriented SPIT.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Protecting privacy and anonymity in pervasive computing: trends and perspectives.
Telematics Informatics, 2006

A Generic Privacy Enhancing Technology for Pervasive Computing Environments.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Security-by-Ontology: A Knowledge-Centric Approach.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Towards an Ontology-based Security Management.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments.
IEEE Trans. Inf. Technol. Biomed., 2005

An Ontology-Based Approach to Information Systems Security Management.
Proceedings of the Computer Network Security, 2005

2004
Embedding privacy in IT applications development.
Inf. Manag. Comput. Secur., 2004

A security architecture for interconnecting health information systems.
Int. J. Medical Informatics, 2004

Introduction.
Int. J. Medical Informatics, 2004

Cumulative notarization for long-term preservation of digital signatures.
Comput. Secur., 2004

Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks.
Proceedings of the Public Key Infrastructure, 2004

2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003

Secure Electronic Voting: the Current Landscape.
Proceedings of the Secure Electronic Voting, 2003

Towards a framework for evaluating certificate status information mechanisms.
Comput. Commun., 2003

ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information.
Comput. Commun., 2003

A Knowledge-Based Repository Model for Security Policies Management.
Proceedings of the Computer Network Security, 2003

Electronic Voting Systems: Security Implications of the Administrative Workflow.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Panoptis: Intrusion Detection Using a Domain-Specific Language.
J. Comput. Secur., 2002

Revisiting Legal and Regulatory Requirements for Secure E-Voting.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Functional Requirements for a Secure Electronic Voting System.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Elaborating Quantitative Approaches for IT Security Evaluation.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Building a Reliable e-Voting System: Functional Requirements and Legal Constraints.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
A digital seal solution for deploying trust on commercial transactions.
Inf. Manag. Comput. Secur., 2001

Pythia: Towards Anonymity in Authentication.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes.
Proceedings of the 21st International Conference of the Chilean Computer Science Society (SCCC 2001), 2001

A Privacy-Enhancing e-Business Model Based on Infomediaries.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

2000
A Qualitative Approach to Information Availability.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Evaluating certificate status information mechanisms.
Proceedings of the CCS 2000, 2000

1999
Trusted third party services for deploying secure telemedical applications over the WWW.
Comput. Secur., 1999

1998
Achieving quality, safety, security and reliability in software systems.
Microprocess. Microsystems, 1998

Methods of Responding to Healthcare Security Incidents.
Proceedings of the MEDINFO '98, 1998

1997
A baseline security policy for distributed healthcare information systems.
Comput. Secur., 1997

1996
High Level Security Policy Guidelines.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

Model for network behaviour under viral attack.
Comput. Commun., 1996

Towards a formal system-to-system authentication protocol.
Comput. Commun., 1996

Attack Modelling in Open Network Environments.
Proceedings of the Communications and Multimedia Security II, 1996

1995
Design of a neural network for recognition and classification of computer viruses.
Comput. Secur., 1995

1994
Intrusion detection: Approach and performance issues of the SECURENET system.
Comput. Secur., 1994

1992
Determining access rights for medical information systems.
Comput. Secur., 1992

A zero knowledge probabilistic login protocol.
Comput. Secur., 1992

1991
Data security in medical information systems: The Greek case.
Comput. Secur., 1991


  Loading...