| Towards an ontology-based security management B Tsoumas, D Gritzalis 20th International Conference on Advanced Information Networking and …, 2006 | 219 | 2006 |
| Smartphone security evaluation The malware attack case A Mylonas, S Dritsas, B Tsoumas, D Gritzalis Proceedings of the international conference on security and cryptography, 25-36, 2011 | 114 | 2011 |
| A qualitative metrics vector for the awareness of smartphone security users A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos International Conference on Trust, Privacy and Security in Digital Business …, 2013 | 84 | 2013 |
| Smartphone forensics: A proactive investigation scheme for evidence acquisition A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis IFIP international information security conference, 249-260, 2012 | 82 | 2012 |
| An ontology-based approach to information systems security management B Tsoumas, S Dritsas, D Gritzalis International Workshop on Mathematical Methods, Models, and Architectures …, 2005 | 66 | 2005 |
| Secure electronic voting: The current landscape C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos Secure electronic voting, 101-122, 2003 | 62 | 2003 |
| OntoSPIT: SPIT management through ontologies S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis Computer Communications 32 (1), 203-212, 2009 | 55 | 2009 |
| Electronic voting systems: Security implications of the administrative workflow C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ... 14th International Workshop on Database and Expert Systems Applications …, 2003 | 41 | 2003 |
| On the feasibility of malware attacks in smartphone platforms A Mylonas, S Dritsas, B Tsoumas, D Gritzalis International conference on e-business and telecommunications, 217-232, 2011 | 36 | 2011 |
| From risk analysis to effective security management: towards an automated approach V Tsoumas, T Tryfonas Information Management & Computer Security 12 (1), 91-101, 2004 | 36 | 2004 |
| Security-by-Ontology: A knowledge-centric approach B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis IFIP International Information Security Conference, 99-110, 2006 | 31 | 2006 |
| A secure smartphone applications roll-out scheme A Mylonas, B Tsoumas, S Dritsas, D Gritzalis International Conference on Trust, Privacy and Security in Digital Business …, 2011 | 29 | 2011 |
| Attack modeling of SIP-oriented SPIT J Mallios, S Dritsas, B Tsoumas, D Gritzalis International Workshop on Critical Information Infrastructures Security, 299-310, 2007 | 28 | 2007 |
| Hunting application-level logical errors G Stergiopoulos, B Tsoumas, D Gritzalis International Symposium on Engineering Secure Software and Systems, 135-142, 2012 | 23 | 2012 |
| On business logic vulnerabilities hunting: the APP_LogGIC framework G Stergiopoulos, B Tsoumas, D Gritzalis International Conference on Network and System Security, 236-249, 2013 | 19 | 2013 |
| An assurance-by-ontology paradigm proposal: Elements of security knowledge management D Gritzalis, B Tsoumas NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION …, 2006 | 11 | 2006 |
| Towards secure sealing of privacy policies K Moulinos, J Iliadis, V Tsoumas Information Management & Computer Security 12 (4), 350-361, 2004 | 9 | 2004 |
| An ontology-based approach to network security management V Tsoumas, S Dritsas, D Gritzalis Proc. of the 3rd International Conference on Mathematical Models, Methods …, 0 | 9 | |
| Demonstration and empirical analysis of hunting application-level logic errors G Stergiopoulos, V Tsoumas, D Gritzalis Proc. of the 7th International Conference on Network & System Security, 236-249, 2013 | 8 | 2013 |
| Secure Electronic Voting C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos Kluwer Academic Publishers, chapter Secure electronic voting: The current …, 2002 | 6 | 2002 |