The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sokratis K. Katsikas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas
    Evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:1-8 [Conf]
  2. Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis
    Attack Modelling in Open Network Environments. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:268-277 [Conf]
  3. Sokratis K. Katsikas, N. Theodoropoulos
    Defending Networks: The Expert System Components of SECURENET. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:291-302 [Conf]
  4. Costas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas
    Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:435- [Conf]
  5. Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas
    Electronic Voting Systems: Security Implications of the Administrative Workflow. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:467-471 [Conf]
  6. Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas
    Towards an ISO-9000 compliant certification service provider. [Citation Graph (0, 0)][DBLP]
    HERCMA, 2001, pp:390-397 [Conf]
  7. Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas
    Effective identification of source code authors using byte-level information. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:893-896 [Conf]
  8. Sokratis K. Katsikas
    Doctoral Programme on Information and Communication Systems Security at the University of the Aegean. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:153-158 [Conf]
  9. Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas
    Source Code Author Identification Based on N-gram Author Profiles. [Citation Graph (0, 0)][DBLP]
    AIAI, 2006, pp:508-515 [Conf]
  10. Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas
    Optimized Multi-Domain Secure Interoperation using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    AIAI, 2006, pp:78-85 [Conf]
  11. Dimitris Androutsopoulos, Per Kaijser, Sokratis K. Katsikas, Kåre Presttun, Don Salmon, Paul G. Spirakis
    Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME. [Citation Graph (0, 0)][DBLP]
    IS&N, 1994, pp:61-72 [Conf]
  12. Stylianos Sp. Pappas, Assimakis K. Leros, Sokratis K. Katsikas
    Multivariate AR Model Order Estimation with Unknown Process Order. [Citation Graph (0, 0)][DBLP]
    Panhellenic Conference on Informatics, 2005, pp:787-797 [Conf]
  13. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Trust, Privacy and Security in E-Business: Requirements and Solutions. [Citation Graph (0, 0)][DBLP]
    Panhellenic Conference on Informatics, 2005, pp:548-558 [Conf]
  14. Ioanna Kantzavelou, Sokratis K. Katsikas
    An attack detection system for secure computer systems - outline of the solution. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:123-135 [Conf]
  15. Sokratis K. Katsikas
    A Postgraduate Programme on Information and Communication Systems Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:49-58 [Conf]
  16. L. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas
    Revisiting Legal and Regulatory Requirements for Secure E-Voting. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:469-480 [Conf]
  17. Theodore K. Apostolopoulos, Victoria C. Daskalou, Sokratis K. Katsikas, K. D. Moulinos
    Enforcing Security Policies in Large Scale Communication Networks. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:393-397 [Conf]
  18. Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas
    A Framework for Exploiting Security Expertise in Application Development. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:62-70 [Conf]
  19. Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas
    Specifying electronic voting protocols in typed MSR. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:35-39 [Conf]
  20. Dimitris Gritzalis, Sokratis K. Katsikas
    Towards a formal system-to-system authentication protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:12, pp:954-961 [Journal]
  21. Sokratis K. Katsikas, Thomas Spyrou, Dimitris Gritzalis, John Darzentas
    Model for network behaviour under viral attack. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:2, pp:124-132 [Journal]
  22. Sokratis K. Katsikas, Ahmed Patel
    Special issue: securing computer communications with Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1813-1814 [Journal]
  23. Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas
    Design of a neural network for recognition and classification of computer viruses. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:435-448 [Journal]
  24. Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis
    A zero knowledge probabilistic login protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:8, pp:733-745 [Journal]
  25. Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro
    Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:731-746 [Journal]
  26. Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras
    Determining access rights for medical information systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:149-161 [Journal]
  27. Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou
    Data security in medical information systems: The Greek case. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:2, pp:141-159 [Journal]
  28. Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas
    Trusted third party services for deploying secure telemedical applications over the WWW. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:627-639 [Journal]
  29. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Editorial. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  30. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Trust, privacy and security in digital business. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  31. Stylianos Sp. Pappas, Assimakis K. Leros, Sokratis K. Katsikas
    Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory. [Citation Graph (0, 0)][DBLP]
    Digital Signal Processing, 2006, v:16, n:6, pp:782-795 [Journal]
  32. Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger
    Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:2- [Conf]
  33. Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas
    Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:75-86 [Journal]
  34. Stefanos Gritzalis, A. N. Yannacopoulos, Costas Lambrinoudakis, P. Hatzopoulos, Sokratis K. Katsikas
    A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:4, pp:197-211 [Journal]

  35. Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. [Citation Graph (, )][DBLP]


  36. A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory. [Citation Graph (, )][DBLP]


  37. Intrusion Detection Using Evolutionary Neural Networks. [Citation Graph (, )][DBLP]


  38. A Generic Intrusion Detection Game Model in IT Security. [Citation Graph (, )][DBLP]


  39. Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues. [Citation Graph (, )][DBLP]


  40. Editorial. [Citation Graph (, )][DBLP]


  41. Reducing false positives in intrusion detection systems. [Citation Graph (, )][DBLP]


Search in 0.117secs, Finished in 0.118secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002