Name
Affiliation
Papers
DIMITRIS GRITZALIS
Corresponding author. Tel./fax: +30 210 8203505.
120
Collaborators
Citations 
PageRank 
119
955
99.85
Referers 
Referees 
References 
1862
1541
1074
Search Limit
1001000
Title
Citations
PageRank
Year
A decentralized honeypot for IoT Protocols based on Android devices00.342022
Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks00.342022
A Security-Aware Framework for Designing Industrial Engineering Processes00.342021
Negative MWOM and value co-destruction during destination crises00.342020
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis.00.342020
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.20.372019
Analyzing Congestion Interdependencies Of Ports And Container Ship Routes In The Maritime Network Infrastructure00.342018
Profiling online social networks users: an omniopticon tool.00.342017
Protecting the Transportation Sector from the Negative Impacts of Climate Change.00.342017
Human-Centered Specification Exemplars for Critical Infrastructure Environments.00.342016
Critical Infrastructure Protection: A Holistic Methodology for Greece.00.342016
Cyberoperations And International Humanitarian Law A Review Of Obstacles In Applying International Law Rules In Cyber Warfare00.342016
Access Control Issues In Utilizing Fog Computing For Transport Infrastructure50.472015
Security Busters: Web browser security vs. rogue sites50.472015
Hacking and Penetration Testing with Low Power Devices00.342015
Automated exploit detection using path profiling: The disposition should matter, not the position10.352015
"Water, Water, Every Where": Nuances For A Water Industry Critical Infrastructure Specification Exemplar00.342015
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures10.352015
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015).00.342015
Execution Path Classification for Vulnerability Analysis and Detection.00.342015
A Bug Hunter's Diary.10.342014
Insider Threat: Enhancing BPM through Social Media50.432014
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication50.412014
Browser Blacklists: The Utopia of Phishing Protection.30.412014
Automated Detection of Logical Errors in Programs.40.412014
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings00.342014
Business Process Modeling for Insider Threat Monitoring and Handling.30.402014
The Big Four - What We Did Wrong in Advanced Persistent Threat Detection?431.952013
Assessing N-Order Dependencies Between Critical Infrastructures150.812013
Assessing Privacy Risks In Android: A User-Centric Approach140.772013
Evaluating the Manageability of Web Browsers Controls.60.512013
Delegate the smartphone user? Security awareness in smartphone platforms702.462013
Hacking VoIP00.342013
Proactive insider threat detection through social media: the YouTube case90.482013
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework.60.472013
A Practical Steganographic Approach for Matroska Based High Quality Video Files00.342013
Insiders Trapped in the Mirror Reveal Themselves in Social Media.100.612013
Youtube User and Usage Profiling: Stories of Political Horror and Security Success.00.342013
In Cloud We Trust: Risk-Assessment-as-a-Service.60.552013
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users.170.822013
Metasploit the Penetration Tester's Guide10.342013
Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?170.872013
Privacy Risk, Security, Accountability in the Cloud70.462013
Smartphone sensor data as digital evidence221.232013
Cybercrime in the Digital Economy - Editorial.10.342013
Cascading Effects Of Common-Cause Failures In Critical Infrastructures80.552013
A Risk Assessment Method For Smartphones251.072012
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services00.342012
Hunting application-level logical errors80.532012
Formal analysis for robust anti-SPIT protection using model checking50.472012
  • 1
  • 2