Support vector machines: Theory and applications T Evgeniou, M Pontil Advanced course on artificial intelligence, 249-257, 1999 | 789* | 1999 |
Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset C Kolias, G Kambourakis, A Stavrou, S Gritzalis IEEE Communications Surveys & Tutorials 18 (1), 184-208, 2015 | 560 | 2015 |
What can behavioral economics teach us about privacy? A Acquisti, J Grossklags Digital privacy, 363-378, 2007 | 409 | 2007 |
Addressing privacy requirements in system design: the PriS method C Kalloniatis, E Kavakli, S Gritzalis Requirements Engineering 13, 241-255, 2008 | 349 | 2008 |
Survey of security vulnerabilities in session initiation protocol D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ... IEEE Communications Surveys & Tutorials 8 (3), 68-81, 2006 | 263 | 2006 |
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy C Lambrinoudakis, S Gritzalis, F Dridi, G Pernul Computer communications 26 (16), 1873-1883, 2003 | 233 | 2003 |
Identifying authorship by byte-level n-grams: The source code author profile (scap) method G Frantzeskou, E Stamatatos, S Gritzalis, CE Chaski, BS Howald International Journal of Digital Evidence 6 (1), 1-18, 2007 | 210 | 2007 |
Cryptographic solutions for industrial Internet-of-Things: Research challenges and opportunities KKR Choo, S Gritzalis, JH Park IEEE Transactions on Industrial Informatics 14 (8), 3567-3569, 2018 | 195 | 2018 |
Detecting DNS amplification attacks G Kambourakis, T Moschos, D Geneiatakis, S Gritzalis Critical Information Infrastructures Security: Second International Workshop …, 2008 | 172 | 2008 |
A framework to support selection of cloud providers based on security and privacy requirements H Mouratidis, S Islam, C Kalloniatis, S Gritzalis Journal of Systems and Software 86 (9), 2276-2293, 2013 | 171 | 2013 |
DNS amplification attack revisited M Anagnostopoulos, G Kambourakis, P Kopanos, G Louloudakis, ... Computers & Security 39, 475-485, 2013 | 160 | 2013 |
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification S Gritzalis, D Spinellis, P Georgiadis Computer Communications 22 (8), 697-709, 1999 | 155 | 1999 |
Effective identification of source code authors using byte-level information G Frantzeskou, E Stamatatos, S Gritzalis, S Katsikas Proceedings of the 28th international conference on Software engineering …, 2006 | 151 | 2006 |
Enhancing web privacy and anonymity in the digital era S Gritzalis Information Management & Computer Security 12 (3), 255-287, 2004 | 125 | 2004 |
A critical review of 13 years of mobile game-based learning F Giannakas, G Kambourakis, A Papasalouros, S Gritzalis Educational Technology Research and Development 66, 341-384, 2018 | 124 | 2018 |
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ... Security and Communication Networks 5 (1), 3-14, 2012 | 118 | 2012 |
Challenges in e-government and security of information MS Hwang, CT Li, JJ Shen, YP Chu Information & Security 15 (1), 9-20, 2004 | 117 | 2004 |
Digital privacy: theory, technologies, and practices A Acquisti, S Gritzalis, C Lambrinoudakis, S di Vimercati CRC Press, 2007 | 111 | 2007 |
A survey on cluster-based group key agreement protocols for WSNs E Klaoudatou, E Konstantinou, G Kambourakis, S Gritzalis IEEE Communications surveys & tutorials 13 (3), 429-442, 2010 | 95 | 2010 |
A framework for protecting a SIP-based infrastructure against malformed message attacks D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ... Computer Networks 51 (10), 2580-2593, 2007 | 94 | 2007 |