The big four-what we did wrong in advanced persistent threat detection?

N Virvilis, D Gritzalis - 2013 international conference on …, 2013 - ieeexplore.ieee.org
As both the number and the complexity of cyber-attacks continuously increase, it is
becoming evident that current security mechanisms have limited success in detecting …

The insider threat in cloud computing

M Kandias, N Virvilis, D Gritzalis - … September 8-9, 2011, Revised Selected …, 2013 - Springer
Cloud computing is an emerging technology paradigm, enabling and facilitating the dynamic
and versatile provision of computational resources and services. Even though the …

Remote electronic voting in uncontrolled environments: A classifying survey

MP Heinl, S Gölz, C Bösch - ACM Computing Surveys, 2022 - dl.acm.org
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …

Smartphone sensor data as digital evidence

A Mylonas, V Meletiadis, L Mitrou, D Gritzalis - Computers & Security, 2013 - Elsevier
The proliferation of smartphones introduces new opportunities in digital forensics. One of the
reasons is that smartphones are usually equipped with sensors (eg accelerometer, proximity …

[PDF][PDF] History of information: the case of privacy and security in social media

D Gritzalis, M Kandias, V Stavrou… - Proc. of the History of …, 2014 - infosec.aueb.gr
Web 2.0 and Social media have widened society's opportunities for communication
amusement and networking, while enabling internet users to contribute online content. The …

Insiders trapped in the mirror reveal themselves in social media

M Kandias, K Galbogini, L Mitrou, D Gritzalis - Network and System …, 2013 - Springer
Social media have widened society's opportunities for communication, while they offer ways
to perform employees' screening and profiling. Our goal in this paper is to develop an insider …

Which side are you on? A new Panopticon vs. privacy

M Kandias, L Mitrou, V Stavrou… - … Conference on Security …, 2013 - ieeexplore.ieee.org
Social media and Web 2.0 have enabled internet users to contribute online content, which
may be crawled and utilized for a variety of reasons, from personalized advertising to …

Evaluating security of voting schemes in the universal composability framework

J Groth - Applied Cryptography and Network Security: Second …, 2004 - Springer
In the literature, voting protocols are considered secure if they satisfy requirements such as
privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol …

Cascading effects of common-cause failures in critical infrastructures

P Kotzanikolaou, M Theoharidou, D Gritzalis - … Infrastructure Protection VII …, 2013 - Springer
One of the most challenging problems in critical infrastructure protection is the assessment
and mitigation of cascading failures across infrastructures. In previous research, we have …

A qualitative metrics vector for the awareness of smartphone security users

A Mylonas, D Gritzalis, B Tsoumas… - Trust, Privacy, and …, 2013 - Springer
The proliferation of smartphones introduced new challenges in the users' security and
privacy. Currently, the literature concentrates mainly on the 'nuts and bolts' of their security …