Search results for: Dimitris Gritzalis
Computers & Security > 2017 > 71 > C > 36-50
Computers & Security > 2017 > 69 > C > 3-17
Computers & Security > 2017 > 67 > C > 181-197
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 8: Threats and Attacks Modeling > 299-310
Lecture Notes in Computer Science > Computer Network Security > Mathematical Models, Architectures and Protocols for Computer Network Security > 151-164
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 10: VoIP Security, Malware, and DRM > 446-460
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Session 1: Secure and Trusted Virtual Organisations > 24-33
Lecture Notes in Computer Science > Computer Network Security > Mathematical Models and Architectures for Computer Network Security > 112-121
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Prevention Systems > 26-37
Lecture Notes in Computer Science > Trust and Privacy in Digital Business > Session 4: Privacy Enhancing Technologies and Privacy Management > 103-113
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Reliability and Security of Content and Data > 74-85
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Security and Privacy Models for Pervasive Information Systems > 49-61
Lecture Notes in Computer Science > Information Assurance in Computer Networks > Network Security Systems: Foundations, Models, and Architectures > 72-83
International Journal of Critical Infrastructure Protection > 2016 > 12 > C > 46-60