create your own website



Conferences

Title of Paper Authors Title of published proceeding  Editor(s) Publisher Place of Publication Date Pages Vol.
Do Identity and Location Data Interrelate? New Affiliations and Privacy Con-cerns in Social-Driven Sharing K. Vgena
A. Kitsiou
C. Kalloniatis
D. Kavroudakis
TRUSTBUS2019- 16th International Conference on Trust, Privacy and Security in Digital Business S. Gritzalis
E. Weippl
S. K. Katsikas
Springer  Linz,
Austria
September, 2019 3-16 Vol.11711
The interrelation of game elements and privacy requirements for the design of a system: A metamodel
Aikaterini-Georgia Mavroeidi
Angeliki Kitsiou
Christos Kalloniatis
TRUSTBUS2019- 16th International Conference on Trust, Privacy and Security in Digital Business S. Gritzalis
E. Weippl
S. K. Katsikas
Springer  Linz,
Austria
September, 2019 110-125 Vol.11711
Secure and Privacy-Aware Intelligent Transport Systems and their Role on Smart Cities Development A. Polydoropoulou
C. Kalloniatis
D. Kavroudakis
Gritzalis S.
TRB 2019 Transportation Research Board TRB’s 98th Meeting K. Turnbull et al. TRB  Washington,
USA
January 2019
Towards the Design of Usable Privacy by Design Methodologies Pattakou A.
Mavroroeidi A.G.
Diamantopoulou V.
Kalloniatis C.
Gritzalis S.
ESPRE 2018 (5th International Workshop on Evolving Security & Privacy Requirements Engineering) K. Beckers, S. Faily, S.-W. Lee, N. Mead IEEE CPS Conference Publishing Services  Banff,
Canada
August 2018
Enhancing Cultural Tourism Experiences in Albania through Mobile Augmented Reality Applications A. Dhembi
D. Kavroudakis.
Kalloniatis C.
3rd ’SmartBlueCity’ Euro-Mediterranean Conference and Exhibition 2018 on “Featur-ing Territorial Intelligence of Small and Medium-sized Cities and Insular Communities in the Mediterranean Scenery – Building Bridges between Local Endeavors and Global Developments” A. Stratigea Springer  Larnaca,
Cyprus
October 2018
Modeling Data Center Temperature Profile in Terms of a First Order Polynomial RBF Network Trained by Particle Swarm Optimization J. Troumbis
G. Tsekouras
C. Kalloniatis
P. Papachiou
D. Haralambopoulos
ICANN 2018 27th International Conference on Artificial Neural Networks Věra Kůrková
Yannis Manolopoulos
Barbara Hammer
Lazaros Iliadis
Ilias Maglogiannis
Springer  Rhodes,
Greece
October 2018 Volume 11140
A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness S. Simou
J. Troumbis
C. Kalloniatis
D. Kavroudakis
S. Gritzalis
TRUSTBUS 2018 14th International Conference on Trust, Privacy and Security G. Pernul
S. Furnell
Springer  Regensburg,
Germany
September 2018 150-164
The use of Internet οf Things in cultural sites: A critical overview (abstract) Kavroudakis D.
Stavridis S.
Batsaris M.
Kalloniatis C.
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies)   Kusadasi,
Turkey
May 2018
Smart Spatial Network Paths: The case of cultural routes (abstract) Agourogiannis P.
Kavroudakis D.
Kalloniatis C.
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies)   Kusadasi,
Turkey
May 2018
The role of Gamification in Cultural Informatics (accepted for publication) Mavroeidi A.G.
Kitsiou A.
Kalloniatis C.
Gritzalis S.
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies)   Kusadasi,
Turkey
May 2018
The role of Social Software Engineering in the design of Privacy-Aware Information System (accepted for publication) Vgena A.
Kitsiou A.
Kavroudakis D.
Kalloniatis C.
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies)   Kusadasi,
Turkey
May 2018
Conspiracy theories in social media. University students’ beliefs on cancer cure and vaccinations (accepted for publication) Bantimaroudis F.
Sideri M.
Ballas D.
Panagiotidis T.
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies)   Kusadasi,
Turkey
May 2018
Efficiency and effectiveness approaches in spatial data collection of vrisa after lesvos earthquake Kavroudakis D.
Soulakellis N.
Topouzelis K.
Chatzistamatis S.
Vasilakos C.
Papakonstantinou A.
Tataris G.
Kalloniatis C.
Roussou O.
Batsaris M.
Chaidas K.
Kalaitzis P.
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences   Istanbul, Turkey March 2018 277-281 XLII-3/W4
Synergistic exploitation of geoinformation methods for post-earthquake 3d mapping of vrisa traditional settlement, Lesvos island, Greece Soulakellis N.
Chatzistamatis S.
Vasilakos C.
Tataris G.
Papakonstantinou A.
Kavroudakis D.
Topouzelis K.
Roussou O.
Kalloniatis C.
Papadopoulou E.
Chaidas K.
Kalaitzis P.

International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences   Istanbul, Turkey March 2018 491-498 XLII-3/W4
The role of Gender Privacy in the use of Cloud Computing Services Michalopoulou P.
Kalloniatis C.

PCI 2017
(Pan-Hellenic Conference on Informatics)
Anagnostopoulos I. et al. ACM Press  Larisa, Greece September 2017
Machine Learning and Images For Malware Detection and Classification Kosmidis K. 
Kalloniatis C.

PCI 2017
(Pan-Hellenic Conference on Informatics)
Anagnostopoulos I. et al. ACM Press  Larisa, Greece September 2017
I have learned that I must think twice before. An educational intervention for enhancing students’ privacy awareness in FB Sideri M. 
Kitsiou A. Tzortzaki E.
Kalloniatis C.
Gritzalis S. 
e-Democracy 2017
(7th International Conference on e-Democracy)
Katsikas S.
Zorkadis V.
Springer CCIS (Communications in Computer and Information Science) Athens, Greece December 2017 79-95 792 
Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts Kalloniatis C.
Kavroudakis D. 
Polydoropoulou A.
Gritzalis S.

2nd SMART-MED
(Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean)
Nikolaides C.  Springer  Heraklion, Greece, September 2017
Modelling Cloud Forensic-Enabled Services Simou S. 
Kalloniatis C.
Gritzalis S. 
TRUSTBUS 2017
(14th International Conference on Trust Privacy and Security in Digital Business)
Fischer-Huebner S. 
Lambrinoudakis C.
 
Springer LNCS (Lecture Notes in Computer Science) Lyon, France August 2017
Supporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns V. Diamantopoulou
N. Argyropoulos
C. Kalloniatis
S. Gritzalis
 
Proceedings of the IEEE RCIS 2017 11th International Conference on Research Challenges in Information Science IEEE Press Brighton,
UK
May 2017
Supporting Privacy by Design using Privacy Process Patterns V. Diamantopoulou
C. Kalloniatis
S. Gritzalis
H. Mouratidis
 
IFIP SEC 2017 
(32nd IFIP International Information Security Conference)
De Capitani di Vimercati S.
Martinelli F. 
Springer LNCS Rome, Italy May 2017 491-505
Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review Pattakou A. 
Kalloniatis C.
Gritzalis S. 
CLOUD COMPUTING 2017
(8th International Conference on Cloud Computing, GRIDs, and Virtualization)
Dini P.  IARIA Athens, Greece February 2017
Managing User Experience: Usability and Security in a new era of Software Supremacy Zagouras P.
Kalloniatis C.
Gritzalis S. 
HCII 2017
(19th International Conference on Human-Computer Interaction)
Stephanidis C. Springer LNCS (Lecture Notes in Computer Science)

Vancouver, Canada May 2017
APPARATUS: Reasoning About Security Requirements in the Internet of Things Mavropoulos O.
Mouratidis H. Fish A.
Panaousis E. 
Kalloniatis C.

WISSE 2016
(6th International Workshop on Information Systems Security Engineering)
Rosado D. Springer LNCS (Lecture Notes in Computer Science)

Ljubljana, Slovenia June 2016
Social media use for decision making process in educational settings: The Greek case for Leadership’s views and attitude in Secondary and Tertiary Education Sideri M.
Filippopoulou A.
Rouvalis G.
Kalloniatis C.
Gritzalis S. 
HICSS-50 2017
(Hawaii International Conference on System Sciences)
Bui T.
Sprague R.
IEEE CPS (Conference Publishing Services) Hawaii, USA January 2017 2875-2884
A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements Argyropoulos N., Shei S.
Kalloniatis C.
Mouratidis C. 
Delaney A.
Fish A.
Gritzalis S.
HICSS-50 2017
(Hawaii International Conference on System Sciences)
Bui T.
Sprague R.
IEEE CPS (Conference Publishing Services) Hawaii, USA January 2017 4827-4836
Migrating eGovernment Services in the Cloud: A Capability Modelling Approach Gongolidis E.
Kavakli E.  
Loucopoulos P. 
Kalloniatis C. 
PCI 2016
(20th Pan-Hellenic Conference on Informatics)
Verykios V. et al. ACM Press

Patras, Greece November 2016
Privacy and Facebook Universities Students’ Communities for Confessions and Secrets: The Greek Case Sideri M. 
Kitsiou A. 
Kalloniatis C.
Gritzalis S. 
eDemocracy 2016
(6th Inetrantional Confrence on e-Democracy- Citizen Rights in the World of the New Computing Paradigms)
Katsikas S. Sideridis A. Spring-er International Publishing 77-94
Towards a Model-Based Framework for Forensic- Enabled Cloud Information Systems Simou S.
Kalloniatis C. 
Mouratidis H. 
Gritzalis S. 
TrustBus 2016
(13th International Conference on Trust Privacy and Security in Digital Business)
Furnell S.
S. Katsikas S. 
Lambrinoudakis C. 
Springer LNCS (Lecture Notes in Computer Science) 

Porto, Portugal September 2016
Reasoning about security and privacy in cloud computing under a unified meta-model Pattakou A. 
Kalloniatis C.
Gritzalis S. 
HAISA 2016 
(10th International Symposium on Human Aspects of Information Security & Assurance)
Furnell-Clarke Frankfurt, Germany July 2016
Incorporating Privacy Patterns into Semi-Automatic Business Process Derivatio Argyropoulos N. 
Kalloniatis C. 
Mouratidis H.
Fish A. 
RCIS 2016
(10th International Conference on Research Challenges in Information Science
)
Modelling Secure Cloud Computing Systems from a Security Requirements Perspective Shei S.
Kalloniatis C. Mouratidis H.
Delaney A. 
TrustBus 2016
(13th International Conference on Trust Privacy and Security in Digital Business)
Furnell S. 
Katsikas S. 
Lambrinoudakis C. 
Springer LNCS (Lecture Notes in Computer Science) 

Porto, Portugal September 2016
Digital Privacy and Social Capital on Social Network Sites. Friends or Foes? Kitsiou A. Tzortzaki E. Sideri M.
Gritzalis S. 
STAST 2016 
(6th International Workshop on Socio-Technical Aspects of Security and Trust)
Benenson  Z. 
Gates C.
IEEE CPS Conference Publishing Services Los Angeles, USA December 2016
Self-disclosure, Privacy concerns and Social Capital benefits interaction in Facebook: A case study Tzortzaki E.
Kitsiou A.
Sideri M.
Gritzalis S. 
PCI 2016
(20th Pan-Hellenic Conference on Informatics)
Verykios V. et al. ACM Press. Patras, Greece November 2016
Designing Privacy-Aware Systems in the Cloud Kalloniatis C.

TrustBus 2015
(12th International Conference on Trust Privacy and Security in Digital Business)
Hubner S. Lambrinoudakis C. Springer LNCS (Lecture Notes in Computer Science) 

Valencia, Spain September 2015
A Meta-model for assisting a Cloud Forensics Process Simou S. 
Kalloniatis C.
Mouratidis H. 
Gritzalis S. 
CRiSIS 2015
(10th International Conference on Risks and Security of Internet and Systems)
Gabillon A.  Springer LNCS (Lecture Notes in Computer Science)

Mytilene, Greece July 2015
Towards the development of a Cloud Forensics Methodology: A Conceptual Model Simou S.
Kalloniatis C.
Mouratidis H.
Gritzalis S. 
WISSE 2015
(5th International Workshop on Information Systems Security Engineering)
Rosado D.  Springer LNCS (Lecture Notes in Computer Science)

Stockholm, Sweden June 2015
Towards the Design of Trustworthy Websites for Cultural Organizations: A Visitor’s perspective Kavakli E. Bantimaroudis F.
Kalloniatis C.
Gritzalis S.
Avgeri K. 
EMCIS 2015
(12th Mediterranean and Middle Eastern Conference on Information Systems)
Morabito V.  EMCIS Athens, Greece June 2015
Building an innovative solution for wildfire prevention and management: the “aegis” platfor Athanasis N. 
Kalloniatis C. Vaitis M.
Vasilakos C.
Kalabokidis K.
EMCIS 2015
(12th Mediterranean and Middle Eastern Conference on Information Systems)
Morabito V.  EMCIS Athens, Greece June 2015
Addressing Privacy and Trust Issues in Cultural Heritage Modelling Pavlidis M.
Mouratidis H.
Gonzales-Perez C.
Kalloniatis C.
CRiSIS 2015 
(10th International Conference on Risks and Security of Internet and Systems)
Gabillon A.  Springer LNCS (Lecture Notes in Computer Science)

Mytilene, Greece July 2015
Privacy-Aware Cloud Deployment Scenario Selection Meis R. 
Beckers C. Faßbender S. Heisel M. , Kalloniatis C.
Gritzalis S. 
TRUSTBUS ‘14
(11th International Conference on Trust, Privacy and Security in Digital Business)
Pernull G.
Katsikas S. 
Springer LNCS (Lecture Notes in Computer Science)

Munich, Germany August 2014 94-105 8647
Cloud Forensics Solutions: A Review Simou S.
Kalloniatis C.
Kavakli E.
Gritzalis S. 
WISSE 2014
(4th International Workshop on Information Systems Security Engineering)
Iliadis L.
Papazoglou M. Pohl K. 
Springer LNBIP  Thessaloniki, Greece June 2014 299-309 178
Cloud Forensics: Identifying the Major Issues and Challenges Simou S.
Kalloniatis C.
Kavakli E.
Gritzalis S. 
HCII 2017
(19th International Conference on Human-Computer Interaction)
Stephanidis C. Springer LNCS (Lecture Notes in Computer Science) 

Thessaloniki, Greece June 2014 271-284 8484
Requirements identification for migrating egovernment applications to the cloud Gongolidis E.
Kalloniatis C.
Kavakli E.
ICT-EurAsia 2014
(Information & Communication Technology-EurAsia Conference 2014)
Linawati Ir. 
Sudiana
Mahendra M.
Neuhold E.
Min Tjoa A.
You I.
Springer LNCS (Lecture Notes in Computer Science) 

Bali, Indonesia April 2014 150-158 8407
Trustworthy Selection of Cloud Providers based on Security and Privacy Re-quirements: Justifying Trust Assumptions M. Pavlidis
H. Mouratidis
C. Kalloniatis
S. Islam
S. Gritzalis
Proceedings of the TRUSTBUS 2013 10th International Conference on Trust, Privacy and Security in Digital Business S. Furnell
C. Lambrinoudakis
Springer LNCS (Lecture Notes in Computer Science) 

Prague,
Czech
August 2013 185-198
The role of trust for the development of cultural internet-based systems
(Best paper Award)
Pavlidis M.
Kavakli  E. Bantimaroudis F.
Mouratidis H. 
Kalloniatis C.
Gritzalis S. 
EMCIS 2013 
(European, Mediterranean, and Middle Eastern Conference on Information Systems)
Ghoneim A. 
Kamal M. 
EMCIS London, UK October 2013
Privacy in the Cloud: Bridging the Gap between Design and Implementation Manousakis V. 
Kalloniatis C.
Kavakli E.
Gritzalis S. 
WISSE 2013
(3rd International Workshop on Information Systems Security Engineering) in conjunction with
CAiSE 2013 (25th International Conference on Advanced Information Systems Engineering)
Franch X.
Soffer P. 
Springer
Lecture Notes in Business Information 

Valencia, Spain June 2013
Migrating into the Cloud: Identifying the Major Security and Privacy Concerns Kalloniatis C.
Manousakis V. 
Mouratidis C. 
Gritzalis S. 
I3E 2013
(12th IFIP Conference on e-Business, e-Services, e-Society)
Douligeris C. Polemi N. Springer 

Piraeus, Greece April 2013
Applying soft computing technologies for implementing privacy-aware systems Kalloniatis C.
Belsis P. 
Kavakli E.
Gritzalis S. 
WISSE 2012
(2nd International Workshop on Information Systems Security Engineering) in conjunction with
CAiSE 2012 (24th International Conference on Advanced Information Systems Engineering)
Bajec M.
Eder J. 
Springer
Lecture Notes in Business Information 

Gdask, Poland June 2012
Privacy Requirements Engineering for Trustworthy e-Government Services Vrakas N.
Kalloniatis C. Tsohou A.
Lambrinoudakis C.
TRUST 2010
(3rd International Conference on Trust and Trustworthy Computing)
Acquisti A. 
Smith S. W. Sadeghi A.-R. 
Springer LNCS Lecture Notes in Computer Science

Berlin, Germany June 2010 298-307 6101
Methods for Designing Privacy Aware Information Systems: A review Kalloniatis C.
Kavakli E.
Gritzalis S. . 
PCI 2009
(13th Pan-Hellenic Conference on Informatics)
Chrysikopoulos V.
Alexandris N. Douligeris C. Sioutas S. 
IEEE CPS (Conference Publishing Services )

Corfu, Greece September 2009 185-194
Search engines: gateway to a new “Panopticon”? Kosta E.
Kalloniatis C. Mitrou L. 
Kavakli E. 

TrustBus’09 
(6th International Conference on Trust, Privacy and Security in Digital Business)
Fischer-Huebner et al. Springer LNCS Lecture Notes in Computer Science

Linz, Austria September 2009 11-21 5695
PriS Tool: A Case Tool for Privacy-Oriented RE Kalloniatis C.
Kavakli E. 
Kontellis E. 
MCIS 2009
(4th Mediterranean Conference on Information Systems)
Doukidis G. et al. Athens Greece September 2009 913-925
Intelligent modification for the daltonization process of digitized paintings Anagnostopoulos C.-N
Tsekouras G.E. Anagnostopoulos I.
Kalloniatis C. 
ICVS 2007
(5th International Conference of Computer Vision Systems)
Bielefeld University, Germany

March 2007
Using Privacy Process Patterns for incorporating Privacy requirements into the System Design Process Kalloniatis C.
Kavakli E.
Gritzalis S. 
SecSE 2007
(Secure Software Engineering Workshop) in conjunction with ARES 2007 (The International Conference on Availability, Reliability, and Security)
Skramstad T.  et al.  IEEE CPS Conference Publishing Services Vienna, Austria April 2007 1009-1016
Dealing with Privacy Issues during the System Design Process Kalloniatis C.
Kavakli E.
Gritzalis S. 
ISSPIT’05
(5th IEEE International Symposium on Signal Processing and Information Technology,)
Serpanos D. et al. IEEE CPS (Conference Publishing Services) Athens, Greece December 2005 546-551
Addressing Privacy: Matching user Privacy Requirements with Implementation Techniques Kavakli E.
Kalloniatis C. 
Gritzalis S. 
HERCMA 2005
(7th Hellenic European Research on Computer Mathematics and its Applications Conference)
Lypitakis I.  LEA Publisher Athens, Greece September 2005
A Learning Vector Quantizer Based on Fuzzy Clustering Analysis and its Use in Lossy Image Compression Samonas A. 
Kalloniatis C.
Tsekouras  G.E. 
HERCMA 2005
(7th Hellenic European Research on Computer Mathematics and its Applications Conference)
Lypitakis I.  LEA Publisher Athens, Greece September 2005
PriS Methodology: Incorporating Privacy Requirements into the System Design Process Kalloniatis C.
Kavakli E.
Gritzalis S. 
SREIS 2005
(Symposium on Requirements Engineering for Information Security) in conjunction with 13th IEEE International Requirements Engineering Conference
Mylopoulos J. Spafford G.  IEEE CPS (Conference Publishing Services) Paris, France August 2005
A Fuzzy Logic-Based Approach for Detecting Shifting Patterns in Cross-Cultural Data Tsekouras G.E.
Papageorgiou D. Kotsiantis S.
Kalloniatis C. Pintelas P. 
18th International Conference on Innovations in Applied Artificial Intelligence Springer LNCS (Lecture Notes in Computer Science) 

June 2005 705-708 3533
Analysis of Cross-Cultural Data using Hierarchical Fuzzy Logic Clustering Tsekouras G.E.
Papageorgiou D. 
Kalloniatis C. 
IASTED
(International Conference on Artificial Intelligence and Ap-plications, International Association of Science and Technology for Development, Artificial Intelligence and Applications)
ACTA Press Innsbruck, Austria February 2005 262-267
Security Requirements Engineering for eGovernment Applications: Analysis of Current Frameworks Kalloniatis C.
Kavakli E.
Gritzalis S. 
DEXA’04 EGOV’04
(3rd International Conference on Electronic Government)
Traunmuller R.  Springer LNCS (Lecture Notes in Computer Science) 

Zaragoza, Spain September 2004 66-71 3183
A Fuzzy Clustering Algorithm for Generating Fuzzy Rules from Numerical Data Tsekouras G.E.
Pavlogeorgatos G.
Kalloniatis C.
 
ISDA
(IEEE International Conference on Intelligent Systems Design and Applications)
Budapest, Hungary August 2004
Showing entries (filtered from total entries)

© Copyright 2019 PrivaSI laboratory - All Rights Reserved