Follow
Bill Tsoumas
Title
Cited by
Cited by
Year
Towards an ontology-based security management
B Tsoumas, D Gritzalis
20th International Conference on Advanced Information Networking and …, 2006
2102006
Smartphone security evaluation the malware attack case
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
Proceedings of the international conference on security and cryptography, 25-36, 2011
1122011
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
812012
A qualitative metrics vector for the awareness of smartphone security users
A Mylonas, D Gritzalis, B Tsoumas, T Apostolopoulos
Trust, Privacy, and Security in Digital Business: 10th International …, 2013
802013
An ontology-based approach to information systems security management
B Tsoumas, S Dritsas, D Gritzalis
Computer Network Security: Third International Workshop on Mathematical …, 2005
622005
Secure electronic voting: The current landscape
C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos
Secure electronic voting, 101-122, 2003
612003
OntoSPIT: SPIT management through ontologies
S Dritsas, V Dritsou, B Tsoumas, P Constantopoulos, D Gritzalis
Computer Communications 32 (1), 203-212, 2009
552009
Electronic voting systems: Security implications of the administrative workflow
C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ...
14th International Workshop on Database and Expert Systems Applications …, 2003
402003
From risk analysis to effective security management: towards an automated approach
V Tsoumas, T Tryfonas
Information Management & Computer Security 12 (1), 91-101, 2004
362004
On the feasibility of malware attacks in smartphone platforms
A Mylonas, S Dritsas, B Tsoumas, D Gritzalis
E-Business and Telecommunications: International Joint Conference, ICETE …, 2012
352012
Security-by-Ontology: A knowledge-centric approach
B Tsoumas, P Papagiannakopoulos, S Dritsas, D Gritzalis
Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006
302006
A secure smartphone applications roll-out scheme
A Mylonas, B Tsoumas, S Dritsas, D Gritzalis
Trust, Privacy and Security in Digital Business: 8th International …, 2011
292011
Attack modeling of SIP-oriented SPIT
J Mallios, S Dritsas, B Tsoumas, D Gritzalis
Critical Information Infrastructures Security: Second International Workshop …, 2008
282008
Hunting application-level logical errors
G Stergiopoulos, B Tsoumas, D Gritzalis
Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012
232012
On business logic vulnerabilities hunting: the APP_LogGIC framework
G Stergiopoulos, B Tsoumas, D Gritzalis
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
172013
An assurance-by-ontology paradigm proposal: Elements of security knowledge management
D Gritzalis, B Tsoumas
NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION …, 2006
112006
Towards secure sealing of privacy policies
K Moulinos, J Iliadis, V Tsoumas
Information management & computer security 12 (4), 350-361, 2004
92004
An ontology-based approach to network security management
V Tsoumas, S Dritsas, D Gritzalis
Proc. of the 3rd International Conference on Mathematical Models, Methods …, 0
9
Demonstration and empirical analysis of hunting application-level logic errors
G Stergiopoulos, V Tsoumas, D Gritzalis
Proc. of the 7th International Conference on Network & System Security, 236-249, 2013
82013
Secure e-Voting: The Current Landscape
C Lambrinoudakis, V Tsoumas, M Karyda, S Ikonomopoulos, D Gritzalis
Secure Electronic Voting: Trends and Perspectives, Capabilities and Limitations, 2002
42002
The system can't perform the operation now. Try again later.
Articles 1–20