Bill Tsoumas
Cited by
Cited by
Towards an ontology-based security management
B Tsoumas, D Gritzalis
20th International Conference on Advanced Information Networking and …, 2006
Smartphone security evaluation the malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
Proceedings of the international conference on security and cryptography, 25-36, 2011
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
Trust, Privacy, and Security in Digital Business: 10th International …, 2013
An ontology-based approach to information systems security management
B Tsoumas, S Dritsas, D Gritzalis
Computer Network Security: Third International Workshop on Mathematical …, 2005
Secure electronic voting: The current landscape
C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos
Secure electronic voting, 101-122, 2003
OntoSPIT: SPIT management through ontologies
S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis
Computer Communications 32 (1), 203-212, 2009
Electronic voting systems: Security implications of the administrative workflow
C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ...
14th International Workshop on Database and Expert Systems Applications …, 2003
From risk analysis to effective security management: towards an automated approach
V Tsoumas, T Tryfonas
Information Management & Computer Security 12 (1), 91-101, 2004
On the feasibility of malware attacks in smartphone platforms
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
E-Business and Telecommunications: International Joint Conference, ICETE …, 2012
Security-by-Ontology: A knowledge-centric approach
B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis
Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006
A secure smartphone applications roll-out scheme
A Mylonas, B Tsoumas, S Dritsas, D Gritzalis
Trust, Privacy and Security in Digital Business: 8th International …, 2011
Attack modeling of SIP-oriented SPIT
J Mallios, S Dritsas, B Tsoumas, D Gritzalis
Critical Information Infrastructures Security: Second International Workshop …, 2008
Hunting application-level logical errors
G Stergiopoulos, B Tsoumas, D Gritzalis
Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012
On business logic vulnerabilities hunting: the APP_LogGIC framework
G Stergiopoulos, B Tsoumas, D Gritzalis
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
An Assurance-by-Ontology Paradigm Proposal: Elements of Security Knowledge
D Gritzalis, B Tsoumas
Information Assurance and Computer Security 6, 15, 2006
Towards secure sealing of privacy policies
K Moulinos, J Iliadis, V Tsoumas
Information management & computer security 12 (4), 350-361, 2004
An ontology-based approach to network security management
V Tsoumas, S Dritsas, D Gritzalis
Proc. of the 3rd International Conference on Mathematical Models, Methods …, 0
Demonstration and empirical analysis of hunting application-level logic errors
G Stergiopoulos, V Tsoumas, D Gritzalis
Proc. of the 7th International Conference on Network & System Security, 236-249, 2013
Secure e-Voting: The Current Landscape
C Lambrinoudakis, V Tsoumas, M Karyda, S Ikonomopoulos, D Gritzalis
Secure Electronic Voting: Trends and Perspectives, Capabilities and Limitations, 2002
The system can't perform the operation now. Try again later.
Articles 1–20