Lilian Mitrou

According to our database1, Lilian Mitrou authored at least 31 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
PPDM-TAN: A Privacy-Preserving Multi-Party Classifier.
Comput., 2021

Human Control and Discretion in AI-driven Decision-making in Government.
Proceedings of the ICEGOV 2021: 14th International Conference on Theory and Practice of Electronic Governance, Athens, Greece, October 6, 2021

2020
PP-TAN: a Privacy Preserving Multi-party Tree Augmented Naive Bayes Classifier.
Proceedings of the 5th South-East Europe Design Automation, 2020

2018
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual.
Comput. Secur., 2018

2017
Profiling online social networks users: an omniopticon tool.
Int. J. Soc. Netw. Min., 2017

2016
Time synchronization: pivotal element in cloud forensics.
Secur. Commun. Networks, 2016

Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment.
Inf. Comput. Secur., 2016

Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare.
Inf. Comput. Secur., 2016

Cyber-Attacks Evaluation Using Simple Additive Weighting Method on the Basis of Schmitt's Analysis.
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016

Data Breach Notification: Issues and Challenges for Security Management.
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016

2015
Reengineering the user: privacy concerns about personal data on smartphones.
Inf. Comput. Secur., 2015

2014
A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol.
Int. J. Electron. Secur. Digit. Forensics, 2014

2013
Smartphone sensor data as digital evidence.
Comput. Secur., 2013

Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Which Side Are You On? - A New Panopticon vs. Privacy.
Proceedings of the SECRYPT 2013, 2013

Insiders Trapped in the Mirror Reveal Themselves in Social Media.
Proceedings of the Network and System Security - 7th International Conference, 2013

Youtube User and Usage Profiling: Stories of Political Horror and Security Success.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

2012
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition.
Proceedings of the Information Security and Privacy Research, 2012

User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

Digital forensics in the Cloud Computing Era.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Privacy Preservation by k-Anonymization of Weighted Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
The "Panopticon" of search engines: the response of the European data protection framework.
Requir. Eng., 2011

Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned Databases.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2009
Search Engines: Gateway to a New "Panopticon"?
Proceedings of the Trust, 2009

Facebook: Reconstructing Communication And Decostructing Privacy Law?
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

2006
Employees' privacy vs. employers' security: Can they be balanced?
Telematics Informatics, 2006

2005
Withdrawing a declaration of will: Towards a framework for digital signature revocation.
Internet Res., 2005

2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003

Privacy and Data Protection in Electronic Communications.
Proceedings of the Computer Network Security, 2003

2002
Revisiting Legal and Regulatory Requirements for Secure E-Voting.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002


  Loading...