[go: up one dir, main page]

Follow
Bill Tsoumas
Title
Cited by
Cited by
Year
Towards an ontology-based security management
B Tsoumas, D Gritzalis
20th International Conference on Advanced Information Networking and …, 2006
2192006
Smartphone security evaluation The malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
Proceedings of the international conference on security and cryptography, 25-36, 2011
1142011
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
International Conference on Trust, Privacy and Security in Digital Business …, 2013
842013
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
IFIP international information security conference, 249-260, 2012
822012
An ontology-based approach to information systems security management
B Tsoumas, S Dritsas, D Gritzalis
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
662005
Secure electronic voting: The current landscape
C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos
Secure electronic voting, 101-122, 2003
622003
OntoSPIT: SPIT management through ontologies
S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis
Computer Communications 32 (1), 203-212, 2009
552009
Electronic voting systems: Security implications of the administrative workflow
C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ...
14th International Workshop on Database and Expert Systems Applications …, 2003
412003
On the feasibility of malware attacks in smartphone platforms
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
International conference on e-business and telecommunications, 217-232, 2011
362011
From risk analysis to effective security management: towards an automated approach
V Tsoumas, T Tryfonas
Information Management & Computer Security 12 (1), 91-101, 2004
362004
Security-by-Ontology: A knowledge-centric approach
B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis
IFIP International Information Security Conference, 99-110, 2006
312006
A secure smartphone applications roll-out scheme
A Mylonas, B Tsoumas, S Dritsas, D Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2011
292011
Attack modeling of SIP-oriented SPIT
J Mallios, S Dritsas, B Tsoumas, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 299-310, 2007
282007
Hunting application-level logical errors
G Stergiopoulos, B Tsoumas, D Gritzalis
International Symposium on Engineering Secure Software and Systems, 135-142, 2012
232012
On business logic vulnerabilities hunting: the APP_LogGIC framework
G Stergiopoulos, B Tsoumas, D Gritzalis
International Conference on Network and System Security, 236-249, 2013
192013
An assurance-by-ontology paradigm proposal: Elements of security knowledge management
D Gritzalis, B Tsoumas
NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION …, 2006
112006
Towards secure sealing of privacy policies
K Moulinos, J Iliadis, V Tsoumas
Information Management & Computer Security 12 (4), 350-361, 2004
92004
An ontology-based approach to network security management
V Tsoumas, S Dritsas, D Gritzalis
Proc. of the 3rd International Conference on Mathematical Models, Methods …, 0
9
Demonstration and empirical analysis of hunting application-level logic errors
G Stergiopoulos, V Tsoumas, D Gritzalis
Proc. of the 7th International Conference on Network & System Security, 236-249, 2013
82013
Secure Electronic Voting
C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos
Kluwer Academic Publishers, chapter Secure electronic voting: The current …, 2002
62002
The system can't perform the operation now. Try again later.
Articles 1–20