Search results for: Georgios Kambourakis
Future Generation Computer Systems > 2018 > 79 > P2 > 558-574
Educational Technology Research and Development > 2018 > 66 > 2 > 341-384
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Cyber-attack and Cyber-terrorism > 280-289
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Authentication, Authorization and Access Control > 59-68
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Session 4: Authentication and Access Control > 135-144
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Security and Privacy in Real Life Applications > 52-62
International Journal of Information Security > 2017 > 16 > 4 > 401-416
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 6: Continuity of Services and Resiliency > 185-196
Security and Communication Networks > 9 > 6 > 542 - 554
Computer Fraud & Security > 2016 > 2016 > 3 > 8-13
IFIP — The International Federation for Information Processing > Future Challenges in Security and Privacy for Academia and Industry > Malware, Information Flow and DoS Attacks > 17-28
IEEE Communications Surveys & Tutorials > 2016 > 18 > 1 > 184 - 208
International Journal of Information Security > 2016 > 15 > 5 > 455-473
Telematics and Informatics > 2015 > 32 > 4 > 539-563