Search the dblp DataBase
Sokratis K. Katsikas :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John Iliadis , Diomidis Spinellis , Dimitris Gritzalis , Bart Preneel , Sokratis K. Katsikas Evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:1-8 [Conf ] Sokratis K. Katsikas , Dimitris Gritzalis , Paul G. Spirakis Attack Modelling in Open Network Environments. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:268-277 [Conf ] Sokratis K. Katsikas , N. Theodoropoulos Defending Networks: The Expert System Components of SECURENET. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:291-302 [Conf ] Costas Lambrinoudakis , Dimitris Gritzalis , Sokratis K. Katsikas Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2002, pp:435- [Conf ] Costas Lambrinoudakis , Spyros Kokolakis , Maria Karyda , Vassilis Tsoumas , Dimitris Gritzalis , Sokratis K. Katsikas Electronic Voting Systems: Security Implications of the Administrative Workflow. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:467-471 [Conf ] Dimitrios Lekkas , Stefanos Gritzalis , Sokratis K. Katsikas Towards an ISO-9000 compliant certification service provider. [Citation Graph (0, 0)][DBLP ] HERCMA, 2001, pp:390-397 [Conf ] Georgia Frantzeskou , Efstathios Stamatatos , Stefanos Gritzalis , Sokratis K. Katsikas Effective identification of source code authors using byte-level information. [Citation Graph (0, 0)][DBLP ] ICSE, 2006, pp:893-896 [Conf ] Sokratis K. Katsikas Doctoral Programme on Information and Communication Systems Security at the University of the Aegean. [Citation Graph (0, 0)][DBLP ] International Information Security Workshops, 2004, pp:153-158 [Conf ] Georgia Frantzeskou , Efstathios Stamatatos , Stefanos Gritzalis , Sokratis K. Katsikas Source Code Author Identification Based on N-gram Author Profiles. [Citation Graph (0, 0)][DBLP ] AIAI, 2006, pp:508-515 [Conf ] Petros Belsis , Stefanos Gritzalis , Sokratis K. Katsikas Optimized Multi-Domain Secure Interoperation using Soft Constraints. [Citation Graph (0, 0)][DBLP ] AIAI, 2006, pp:78-85 [Conf ] Dimitris Androutsopoulos , Per Kaijser , Sokratis K. Katsikas , Kåre Presttun , Don Salmon , Paul G. Spirakis Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME. [Citation Graph (0, 0)][DBLP ] IS&N, 1994, pp:61-72 [Conf ] Stylianos Sp. Pappas , Assimakis K. Leros , Sokratis K. Katsikas Multivariate AR Model Order Estimation with Unknown Process Order. [Citation Graph (0, 0)][DBLP ] Panhellenic Conference on Informatics, 2005, pp:787-797 [Conf ] Sokratis K. Katsikas , Javier Lopez , Günther Pernul Trust, Privacy and Security in E-Business: Requirements and Solutions. [Citation Graph (0, 0)][DBLP ] Panhellenic Conference on Informatics, 2005, pp:548-558 [Conf ] Ioanna Kantzavelou , Sokratis K. Katsikas An attack detection system for secure computer systems - outline of the solution. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:123-135 [Conf ] Sokratis K. Katsikas A Postgraduate Programme on Information and Communication Systems Security. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:49-58 [Conf ] L. Mitrou , Dimitris Gritzalis , Sokratis K. Katsikas Revisiting Legal and Regulatory Requirements for Secure E-Voting. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:469-480 [Conf ] Theodore K. Apostolopoulos , Victoria C. Daskalou , Sokratis K. Katsikas , K. D. Moulinos Enforcing Security Policies in Large Scale Communication Networks. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1998, pp:393-397 [Conf ] Theodoros Balopoulos , Lazaros Gymnopoulos , Maria Karyda , Spyros Kokolakis , Stefanos Gritzalis , Sokratis K. Katsikas A Framework for Exploiting Security Expertise in Application Development. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:62-70 [Conf ] Theodoros Balopoulos , Stefanos Gritzalis , Sokratis K. Katsikas Specifying electronic voting protocols in typed MSR. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:35-39 [Conf ] Dimitris Gritzalis , Sokratis K. Katsikas Towards a formal system-to-system authentication protocol. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:954-961 [Journal ] Sokratis K. Katsikas , Thomas Spyrou , Dimitris Gritzalis , John Darzentas Model for network behaviour under viral attack. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:2, pp:124-132 [Journal ] Sokratis K. Katsikas , Ahmed Patel Special issue: securing computer communications with Public Key Infrastructure. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2003, v:26, n:16, pp:1813-1814 [Journal ] Anastasia Doumas , Konstantinos Mavroudakis , Dimitris Gritzalis , Sokratis K. Katsikas Design of a neural network for recognition and classification of computer viruses. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:5, pp:435-448 [Journal ] Dimitris Gritzalis , Sokratis K. Katsikas , Stefanos Gritzalis A zero knowledge probabilistic login protocol. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:8, pp:733-745 [Journal ] Stefanos Gritzalis , Sokratis K. Katsikas , Dimitrios Lekkas , Konstantinos Moulinos , Eleni Polydoro Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:8, pp:731-746 [Journal ] Dimitris Gritzalis , Sokratis K. Katsikas , J. Keklikoglou , A. Tomaras Determining access rights for medical information systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:2, pp:149-161 [Journal ] Dimitris Gritzalis , A. Tomaras , Sokratis K. Katsikas , J. Keklikoglou Data security in medical information systems: The Greek case. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:141-159 [Journal ] Diomidis Spinellis , Stefanos Gritzalis , John Iliadis , Dimitris Gritzalis , Sokratis K. Katsikas Trusted third party services for deploying secure telemedical applications over the WWW. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:627-639 [Journal ] Sokratis K. Katsikas , Javier Lopez , Günther Pernul Editorial. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal ] Sokratis K. Katsikas , Javier Lopez , Günther Pernul Trust, privacy and security in digital business. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal ] Stylianos Sp. Pappas , Assimakis K. Leros , Sokratis K. Katsikas Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory. [Citation Graph (0, 0)][DBLP ] Digital Signal Processing, 2006, v:16, n:6, pp:782-795 [Journal ] Günther Pernul , Marco Casassa Mont , Eduardo B. Fernández , Sokratis K. Katsikas , Alfred Kobsa , Rolf Oppliger Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:2- [Conf ] Petros Belsis , Stefanos Gritzalis , Sokratis K. Katsikas Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:75-86 [Journal ] Stefanos Gritzalis , A. N. Yannacopoulos , Costas Lambrinoudakis , P. Hatzopoulos , Sokratis K. Katsikas A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2007, v:6, n:4, pp:197-211 [Journal ] Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. [Citation Graph (, )][DBLP ] A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory. [Citation Graph (, )][DBLP ] Intrusion Detection Using Evolutionary Neural Networks. [Citation Graph (, )][DBLP ] A Generic Intrusion Detection Game Model in IT Security. [Citation Graph (, )][DBLP ] Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues. [Citation Graph (, )][DBLP ] Editorial. [Citation Graph (, )][DBLP ] Reducing false positives in intrusion detection systems. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.154secs