The big four-what we did wrong in advanced persistent threat detection?

N Virvilis, D Gritzalis - 2013 international conference on …, 2013 - ieeexplore.ieee.org
As both the number and the complexity of cyber-attacks continuously increase, it is
becoming evident that current security mechanisms have limited success in detecting …

The insider threat in cloud computing

M Kandias, N Virvilis, D Gritzalis - … September 8-9, 2011, Revised Selected …, 2013 - Springer
Cloud computing is an emerging technology paradigm, enabling and facilitating the dynamic
and versatile provision of computational resources and services. Even though the …

A framework for evaluating storage system security

E Riedel, M Kallahalla, R Swaminathan - Conference on File and …, 2002 - usenix.org
There are a variety of ways to ensure the security of data and the integrity of data transfer,
depending on the set of anticipated attacks, the level of security desired by data owners, and …

Smartphone sensor data as digital evidence

A Mylonas, V Meletiadis, L Mitrou, D Gritzalis - Computers & Security, 2013 - Elsevier
The proliferation of smartphones introduces new opportunities in digital forensics. One of the
reasons is that smartphones are usually equipped with sensors (eg accelerometer, proximity …

Cascading effects of common-cause failures in critical infrastructures

P Kotzanikolaou, M Theoharidou, D Gritzalis - … Infrastructure Protection VII …, 2013 - Springer
One of the most challenging problems in critical infrastructure protection is the assessment
and mitigation of cascading failures across infrastructures. In previous research, we have …

A qualitative metrics vector for the awareness of smartphone security users

A Mylonas, D Gritzalis, B Tsoumas… - Trust, Privacy, and …, 2013 - Springer
The proliferation of smartphones introduced new challenges in the users' security and
privacy. Currently, the literature concentrates mainly on the 'nuts and bolts' of their security …

S-port: Collaborative security management of port information systems

D Polemi, T Ntouskas, E Georgakakis, C Douligeris… - IISA …, 2013 - ieeexplore.ieee.org
Port Information and Communication Technology (PICT) systems offer a series of critical
services rendering their effective security management an issue of vital importance. Existing …

Evaluation of certificate validation mechanisms

TP Hormann, K Wrona, S Holtmanns - Computer Communications, 2006 - Elsevier
In this article we evaluate different certificate validation mechanisms to be possibly used
within the Wireless Public Key Infrastructure (W-PKI). An implementation of a standard …

Approaching encryption through complex number logarithms

G Stergiopoulos, M Kandias… - … Conference on Security …, 2013 - ieeexplore.ieee.org
In this paper, we approach encryption through the properties of complex logarithm and the
complex plane. We introduce a mathematical concept to be used in cryptography. As an …

Real-time environmental monitoring for cloud-based hydrogeological modeling with hydrogeosphere

A Lapin, E Schiller, P Kropf, O Schilling… - 2014 IEEE Intl Conf …, 2014 - ieeexplore.ieee.org
This paper describes an architecture for real-time environmental modeling. It consists of a
wireless mesh network equipped with sensors and a cloud-based infrastructure to perform …