Name
Papers
Collaborators
IOANNIS MAVRIDIS
46
41
Citations 
PageRank 
Referers 
240
27.01
550
Referees 
References 
760
441
Search Limit
100760
Title
Citations
PageRank
Year
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics00.342021
Design And Evaluation Of Cofelet-Based Approaches For Cyber Security Learning And Training00.342021
Evaluation Of Hacklearn Cofelet Game User Experience For Cybersecurity Education00.342021
Ontology-Based Modelling For Cyber Security E-Learning And Training00.342019
Conceptual Framework for Developing Cyber Security Serious Games00.342019
Conceptualization of Game Based Approaches for Learning and Training on Cyber Security.00.342017
Conceptual analysis of cyber security education based on live competitions.00.342017
Access Control Issues In Utilizing Fog Computing For Transport Infrastructure50.472015
Information infrastructure risk prediction through platform vulnerability analysis30.382015
Security policy verification for multi-domains in cloud systems110.642014
GARS: Real-time system for identification, assessment and control of cyber grooming attacks.10.352014
A method to calculate social networking hazard probability in definite time.10.362013
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems10.352013
A Methodology for the Development and Verification of Access Control Systems in Cloud Computing.10.372013
Utilizing Survival Analysis for Modeling Child Hazards of Social Networking.00.342012
Towards Use-Based Usage Control00.342012
Artemis: Protection from Sexual Exploitation Attacks via SMS20.522012
Quantifying and measuring metadata completeness.70.672012
domRBAC: An access control model for modern collaborative systems90.582012
Challenging issues of UCON in modern computing environments10.362012
A Use-Based Approach for Enhancing UCON.00.342012
Towards Colored Petri Net Modeling of Expanded C-TMAC.00.342011
Deploying Privacy Improved RBAC in Web Information Systems00.342011
A methodology for evaluating web-based educational systems using statistical multidimensional analysis20.492011
X-EDCA: A cross-layer MAC-centric mechanism for efficient multimedia transmission in congested IEEE 802.11e infrastructure networks30.412011
Role-based secure inter-operation and resource usage management in mobile grid systems10.362011
An ICT Security Management Framework00.342010
A Study on User Behavior and Acceptance of Electronic Banking Services.00.342010
Towards Differentiated Utilization of Attribute Mutability for Access Control in Ubiquitous Computing.20.422010
Surveying Privacy Leaks Through Online Social Network.60.742010
A Fine-Grained Metric System for the Completeness of Metadata.10.362009
A Foundation for Defining Security Requirements in Grid Computing10.362009
Evolving Challenges In Information Security Compliance.00.342009
On the Definition of Access Control Requirements for Grid and Cloud Computing Systems.40.422009
How E-Learning Systems May Benefit From Ontologies And Recommendation Methods To Efficiently Personalise Resources30.562009
A conceptual framework for metadata quality assessment181.322008
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time.10.362008
Identifying Inference Rules for Automatic Metadata Generation from Pre-existing Metadata of Related Resources00.342007
Implementation and Evaluation of TCP Enhancements over Satellite Links00.342006
Web Services And Multimedia In M-Business Applications: Opportunities And Concerns20.372006
Healthcare teams over the Internet: programming a certificate-based approach60.742003
Towards Dynamically Administered Role-Based Access Control60.482003
Flexible team-based access control using contexts1336.712001
A Secure Payment System for Electronic Commerce40.431999
eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features41.241999
Design of Secure Distributed Medical Database Systems10.451998