Title of Paper | Authors | Title of published proceeding | Editor(s) | Publisher | Place of Publication | Date | Pages | Vol. |
---|---|---|---|---|---|---|---|---|
Do Identity and Location Data Interrelate? New Affiliations and Privacy Con-cerns in Social-Driven Sharing | K. Vgena A. Kitsiou C. Kalloniatis D. Kavroudakis |
TRUSTBUS2019- 16th International Conference on Trust, Privacy and Security in Digital Business | S. Gritzalis E. Weippl S. K. Katsikas |
Springer | Linz, Austria |
September, 2019 | 3-16 | Vol.11711 |
The interrelation of game elements and privacy
requirements for the design of a system: A metamodel |
Aikaterini-Georgia Mavroeidi Angeliki Kitsiou Christos Kalloniatis |
TRUSTBUS2019- 16th International Conference on Trust, Privacy and Security in Digital Business | S. Gritzalis E. Weippl S. K. Katsikas |
Springer | Linz, Austria |
September, 2019 | 110-125 | Vol.11711 |
Secure and Privacy-Aware Intelligent Transport Systems and their Role on Smart Cities Development | A. Polydoropoulou C. Kalloniatis D. Kavroudakis Gritzalis S. |
TRB 2019 Transportation Research Board TRB’s 98th Meeting | K. Turnbull et al. | TRB | Washington, USA |
January 2019 | ||
Towards the Design of Usable Privacy by Design Methodologies | Pattakou A. Mavroroeidi A.G. Diamantopoulou V. Kalloniatis C. Gritzalis S. |
ESPRE 2018 (5th International Workshop on Evolving Security & Privacy Requirements Engineering) | K. Beckers, S. Faily, S.-W. Lee, N. Mead | IEEE CPS Conference Publishing Services | Banff, Canada |
August 2018 | ||
Enhancing Cultural Tourism Experiences in Albania through Mobile Augmented Reality Applications | A. Dhembi D. Kavroudakis. Kalloniatis C. |
3rd ’SmartBlueCity’ Euro-Mediterranean Conference and Exhibition 2018 on “Featur-ing Territorial Intelligence of Small and Medium-sized Cities and Insular Communities in the Mediterranean Scenery – Building Bridges between Local Endeavors and Global Developments” | A. Stratigea | Springer | Larnaca, Cyprus |
October 2018 | ||
Modeling Data Center Temperature Profile in Terms of a First Order Polynomial RBF Network Trained by Particle Swarm Optimization | J. Troumbis G. Tsekouras C. Kalloniatis P. Papachiou D. Haralambopoulos |
ICANN 2018 27th International Conference on Artificial Neural Networks | Věra Kůrková Yannis Manolopoulos Barbara Hammer Lazaros Iliadis Ilias Maglogiannis |
Springer | Rhodes, Greece |
October 2018 | Volume 11140 | |
A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness | S. Simou J. Troumbis C. Kalloniatis D. Kavroudakis S. Gritzalis |
TRUSTBUS 2018 14th International Conference on Trust, Privacy and Security | G. Pernul S. Furnell |
Springer | Regensburg, Germany |
September 2018 | 150-164 | |
The use of Internet οf Things in cultural sites: A critical overview (abstract) | Kavroudakis D. Stavridis S. Batsaris M. Kalloniatis C. |
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies) | Kusadasi, Turkey |
May 2018 | Smart Spatial Network Paths: The case of cultural routes (abstract) | Agourogiannis P. Kavroudakis D. Kalloniatis C. |
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies) | Kusadasi, Turkey |
May 2018 | The role of Gamification in Cultural Informatics (accepted for publication) | Mavroeidi A.G. Kitsiou A. Kalloniatis C. Gritzalis S. |
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies) | Kusadasi, Turkey |
May 2018 | The role of Social Software Engineering in the design of Privacy-Aware Information System (accepted for publication) | Vgena A. Kitsiou A. Kavroudakis D. Kalloniatis C. |
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies) | Kusadasi, Turkey |
May 2018 | Conspiracy theories in social media. University students’ beliefs on cancer cure and vaccinations (accepted for publication) | Bantimaroudis F. Sideri M. Ballas D. Panagiotidis T. |
CICMS 2018 (1ST International Conference on Cultural Informatics & Communication-Media Studies) | Kusadasi, Turkey |
May 2018 |
Efficiency and effectiveness approaches in spatial data collection of vrisa after lesvos earthquake | Kavroudakis D. Soulakellis N. Topouzelis K. Chatzistamatis S. Vasilakos C. Papakonstantinou A. Tataris G. Kalloniatis C. Roussou O. Batsaris M. Chaidas K. Kalaitzis P. |
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences | Istanbul, Turkey | March 2018 | 277-281 | XLII-3/W4 | ||
Synergistic exploitation of geoinformation methods for post-earthquake 3d mapping of vrisa traditional settlement, Lesvos island, Greece | Soulakellis N. Chatzistamatis S. Vasilakos C. Tataris G. Papakonstantinou A. Kavroudakis D. Topouzelis K. Roussou O. Kalloniatis C. Papadopoulou E. Chaidas K. Kalaitzis P. |
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences | Istanbul, Turkey | March 2018 | 491-498 | XLII-3/W4 | ||
The role of Gender Privacy in the use of Cloud Computing Services | Michalopoulou P. Kalloniatis C. |
PCI 2017 (Pan-Hellenic Conference on Informatics) |
Anagnostopoulos I. et al. | ACM Press | Larisa, Greece | September 2017 | ||
Machine Learning and Images For Malware Detection and Classification | Kosmidis K. Kalloniatis C. |
PCI 2017
(Pan-Hellenic Conference on Informatics) |
Anagnostopoulos I. et al. | ACM Press | Larisa, Greece | September 2017 | ||
I have learned that I must think twice before. An educational intervention for enhancing students’ privacy awareness in FB | Sideri M. Kitsiou A. Tzortzaki E. Kalloniatis C. Gritzalis S. |
e-Democracy 2017 (7th International Conference on e-Democracy) |
Katsikas S. Zorkadis V. |
Springer CCIS (Communications in Computer and Information Science) | Athens, Greece | December 2017 | 79-95 | 792 |
Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts | Kalloniatis C.
Kavroudakis D. Polydoropoulou A. Gritzalis S. |
2nd SMART-MED (Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean) |
Nikolaides C. | Springer | Heraklion, Greece, | September 2017 | ||
Modelling Cloud Forensic-Enabled Services | Simou S. Kalloniatis C. Gritzalis S. |
TRUSTBUS 2017 (14th International Conference on Trust Privacy and Security in Digital Business) |
Fischer-Huebner S. Lambrinoudakis C. |
Springer LNCS (Lecture Notes in Computer Science) | Lyon, France | August 2017 | ||
Supporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns | V. Diamantopoulou N. Argyropoulos C. Kalloniatis S. Gritzalis |
Proceedings of the IEEE RCIS 2017 11th International Conference on Research Challenges in Information Science | IEEE Press | Brighton, UK |
May 2017 | |||
Supporting Privacy by Design using Privacy Process Patterns | V. Diamantopoulou C. Kalloniatis S. Gritzalis H. Mouratidis |
IFIP SEC 2017 (32nd IFIP International Information Security Conference) |
De Capitani di Vimercati S. Martinelli F. |
Springer LNCS | Rome, Italy | May 2017 | 491-505 | |
Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review | Pattakou A. Kalloniatis C. Gritzalis S. |
CLOUD COMPUTING 2017 (8th International Conference on Cloud Computing, GRIDs, and Virtualization) |
Dini P. | IARIA | Athens, Greece | February 2017 | ||
Managing User Experience: Usability and Security in a new era of Software Supremacy | Zagouras P.
Kalloniatis C. Gritzalis S. |
HCII 2017
(19th International Conference on Human-Computer Interaction) |
Stephanidis C. | Springer LNCS (Lecture Notes in Computer
Science) |
Vancouver, Canada | May 2017 | ||
APPARATUS: Reasoning About Security Requirements in the Internet of Things | Mavropoulos O. Mouratidis H. Fish A. Panaousis E. Kalloniatis C. |
WISSE 2016 (6th International Workshop on Information Systems Security Engineering) |
Rosado D. | Springer LNCS (Lecture Notes in Computer
Science) |
Ljubljana, Slovenia | June 2016 | ||
Social media use for decision making process in educational settings: The Greek case for Leadership’s views and attitude in Secondary and Tertiary Education | Sideri M. Filippopoulou A. Rouvalis G. Kalloniatis C. Gritzalis S. |
HICSS-50 2017 (Hawaii International Conference on System Sciences) |
Bui T. Sprague R. |
IEEE CPS (Conference Publishing Services) | Hawaii, USA | January 2017 | 2875-2884 | |
A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements | Argyropoulos N., Shei S. Kalloniatis C. Mouratidis C. Delaney A. Fish A. Gritzalis S. |
HICSS-50 2017
(Hawaii International Conference on System Sciences) |
Bui T.
Sprague R. |
IEEE CPS (Conference Publishing Services) | Hawaii, USA | January 2017 | 4827-4836 | |
Migrating eGovernment Services in the Cloud: A Capability Modelling Approach | Gongolidis E. Kavakli E. Loucopoulos P. Kalloniatis C. |
PCI 2016 (20th Pan-Hellenic Conference on Informatics) |
Verykios V. et al. | ACM Press
|
Patras, Greece | November 2016 | ||
Privacy and Facebook Universities Students’ Communities for Confessions and Secrets: The Greek Case | Sideri M. Kitsiou A. Kalloniatis C. Gritzalis S. |
eDemocracy 2016 (6th Inetrantional Confrence on e-Democracy- Citizen Rights in the World of the New Computing Paradigms) |
Katsikas S. Sideridis A. | Spring-er International Publishing | 77-94 | |||
Towards a Model-Based Framework for Forensic- Enabled Cloud Information Systems | Simou S. Kalloniatis C. Mouratidis H. Gritzalis S. |
TrustBus 2016 (13th International Conference on Trust Privacy and Security in Digital Business) |
Furnell S. S. Katsikas S. Lambrinoudakis C. |
Springer LNCS (Lecture Notes in Computer
Science) |
Porto, Portugal | September 2016 | ||
Reasoning about security and privacy in cloud computing under a unified meta-model | Pattakou A. Kalloniatis C. Gritzalis S. |
HAISA 2016 (10th International Symposium on Human Aspects of Information Security & Assurance) |
Furnell-Clarke | Frankfurt, Germany | July 2016 | |||
Incorporating Privacy Patterns into Semi-Automatic Business Process Derivatio | Argyropoulos N. Kalloniatis C. Mouratidis H. Fish A. |
RCIS 2016 (10th International Conference on Research Challenges in Information Science ) |
||||||
Modelling Secure Cloud Computing Systems from a Security Requirements Perspective | Shei S. Kalloniatis C. Mouratidis H. Delaney A. |
TrustBus 2016 (13th International Conference on Trust Privacy and Security in Digital Business) |
Furnell S. Katsikas S. Lambrinoudakis C. |
Springer LNCS (Lecture Notes in Computer
Science) |
Porto, Portugal | September 2016 | ||
Digital Privacy and Social Capital on Social Network Sites. Friends or Foes? | Kitsiou A. Tzortzaki E. Sideri M. Gritzalis S. |
STAST 2016 (6th International Workshop on Socio-Technical Aspects of Security and Trust) |
Benenson Z. Gates C. |
IEEE CPS Conference Publishing Services | Los Angeles, USA | December 2016 | ||
Self-disclosure, Privacy concerns and Social Capital benefits interaction in Facebook: A case study | Tzortzaki E. Kitsiou A. Sideri M. Gritzalis S. |
PCI 2016 (20th Pan-Hellenic Conference on Informatics) |
Verykios V. et al. | ACM Press. | Patras, Greece | November 2016 | ||
Designing Privacy-Aware Systems in the Cloud | Kalloniatis C.
|
TrustBus 2015 (12th International Conference on Trust Privacy and Security in Digital Business) |
Hubner S. Lambrinoudakis C. | Springer LNCS (Lecture Notes in Computer
Science) |
Valencia, Spain | September 2015 | ||
A Meta-model for assisting a Cloud Forensics Process | Simou S. Kalloniatis C. Mouratidis H. Gritzalis S. |
CRiSIS 2015 (10th International Conference on Risks and Security of Internet and Systems) |
Gabillon A. | Springer LNCS (Lecture Notes in Computer
Science) |
Mytilene, Greece | July 2015 | ||
Towards the development of a Cloud Forensics Methodology: A Conceptual Model | Simou S.
Kalloniatis C. Mouratidis H. Gritzalis S. |
WISSE 2015 (5th International Workshop on Information Systems Security Engineering) |
Rosado D. | Springer LNCS (Lecture Notes in Computer
Science) |
Stockholm, Sweden | June 2015 | ||
Towards the Design of Trustworthy Websites for Cultural Organizations: A Visitor’s perspective | Kavakli E. Bantimaroudis F. Kalloniatis C. Gritzalis S. Avgeri K. |
EMCIS 2015 (12th Mediterranean and Middle Eastern Conference on Information Systems) |
Morabito V. | EMCIS | Athens, Greece | June 2015 | ||
Building an innovative solution for wildfire prevention and management: the “aegis” platfor | Athanasis N. Kalloniatis C. Vaitis M. Vasilakos C. Kalabokidis K. |
EMCIS 2015 (12th Mediterranean and Middle Eastern Conference on Information Systems) |
Morabito V. | EMCIS | Athens, Greece | June 2015 | ||
Addressing Privacy and Trust Issues in Cultural Heritage Modelling | Pavlidis M. Mouratidis H. Gonzales-Perez C. Kalloniatis C. |
CRiSIS 2015 (10th International Conference on Risks and Security of Internet and Systems) |
Gabillon A. | Springer LNCS (Lecture Notes in Computer
Science) |
Mytilene, Greece | July 2015 | ||
Privacy-Aware Cloud Deployment Scenario Selection | Meis R. Beckers C. Faßbender S. Heisel M. , Kalloniatis C. Gritzalis S. |
TRUSTBUS ‘14 (11th International Conference on Trust, Privacy and Security in Digital Business) |
Pernull G. Katsikas S. |
Springer LNCS (Lecture Notes in Computer
Science) |
Munich, Germany | August 2014 | 94-105 | 8647 |
Cloud Forensics Solutions: A Review | Simou S. Kalloniatis C. Kavakli E. Gritzalis S. |
WISSE 2014 (4th International Workshop on Information Systems Security Engineering) |
Iliadis L. Papazoglou M. Pohl K. |
Springer LNBIP | Thessaloniki, Greece | June 2014 | 299-309 | 178 |
Cloud Forensics: Identifying the Major Issues and Challenges | Simou S.
Kalloniatis C. Kavakli E. Gritzalis S. |
HCII 2017
(19th International Conference on Human-Computer Interaction) |
Stephanidis C. | Springer LNCS (Lecture Notes in Computer
Science) |
Thessaloniki, Greece | June 2014 | 271-284 | 8484 |
Requirements identification for migrating egovernment applications to the cloud | Gongolidis E. Kalloniatis C. Kavakli E. |
ICT-EurAsia 2014 (Information & Communication Technology-EurAsia Conference 2014) |
Linawati Ir. Sudiana Mahendra M. Neuhold E. Min Tjoa A. You I. |
Springer LNCS (Lecture Notes in Computer
Science) |
Bali, Indonesia | April 2014 | 150-158 | 8407 | Trustworthy Selection of Cloud Providers based on Security and Privacy Re-quirements: Justifying Trust Assumptions | M. Pavlidis H. Mouratidis C. Kalloniatis S. Islam S. Gritzalis |
Proceedings of the TRUSTBUS 2013 10th International Conference on Trust, Privacy and Security in Digital Business | S. Furnell C. Lambrinoudakis |
Springer LNCS (Lecture Notes in Computer
Science) |
Prague, Czech |
August 2013 | 185-198 |
The role of trust for the development of cultural
internet-based
systems (Best paper Award) |
Pavlidis M. Kavakli E. Bantimaroudis F. Mouratidis H. Kalloniatis C. Gritzalis S. |
EMCIS 2013 (European, Mediterranean, and Middle Eastern Conference on Information Systems) |
Ghoneim A. Kamal M. |
EMCIS | London, UK | October 2013 | ||
Privacy in the Cloud: Bridging the Gap between Design and Implementation | Manousakis V. Kalloniatis C. Kavakli E. Gritzalis S. |
WISSE 2013 (3rd International Workshop on Information Systems Security Engineering) in conjunction with CAiSE 2013 (25th International Conference on Advanced Information Systems Engineering) |
Franch X. Soffer P. |
Springer Lecture Notes in Business Information |
Valencia, Spain | June 2013 | ||
Migrating into the Cloud: Identifying the Major Security and Privacy Concerns | Kalloniatis C. Manousakis V. Mouratidis C. Gritzalis S. |
I3E 2013 (12th IFIP Conference on e-Business, e-Services, e-Society) |
Douligeris C. Polemi N. | Springer |
Piraeus, Greece | April 2013 | ||
Applying soft computing technologies for implementing privacy-aware systems | Kalloniatis C. Belsis P. Kavakli E. Gritzalis S. |
WISSE 2012 (2nd International Workshop on Information Systems Security Engineering) in conjunction with CAiSE 2012 (24th International Conference on Advanced Information Systems Engineering) |
Bajec M. Eder J. |
Springer Lecture Notes in Business Information |
Gdask, Poland | June 2012 | ||
Privacy Requirements Engineering for Trustworthy e-Government Services | Vrakas N. Kalloniatis C. Tsohou A. Lambrinoudakis C. |
TRUST 2010 (3rd International Conference on Trust and Trustworthy Computing) |
Acquisti A. Smith S. W. Sadeghi A.-R. |
Springer LNCS Lecture Notes in Computer Science
|
Berlin, Germany | June 2010 | 298-307 | 6101 |
Methods for Designing Privacy Aware Information Systems: A review | Kalloniatis C.
Kavakli E. Gritzalis S. . |
PCI 2009 (13th Pan-Hellenic Conference on Informatics) |
Chrysikopoulos V. Alexandris N. Douligeris C. Sioutas S. |
IEEE CPS (Conference Publishing Services
) |
Corfu, Greece | September 2009 | 185-194 | |
Search engines: gateway to a new “Panopticon”? | Kosta E. Kalloniatis C. Mitrou L. Kavakli E. |
TrustBus’09 (6th International Conference on Trust, Privacy and Security in Digital Business) |
Fischer-Huebner et al. | Springer LNCS Lecture Notes in Computer Science
|
Linz, Austria | September 2009 | 11-21 | 5695 |
PriS Tool: A Case Tool for Privacy-Oriented RE | Kalloniatis C. Kavakli E. Kontellis E. |
MCIS 2009 (4th Mediterranean Conference on Information Systems) |
Doukidis G. et al. | Athens Greece | September 2009 | 913-925 | ||
Intelligent modification for the daltonization process of digitized paintings | Anagnostopoulos C.-N Tsekouras G.E. Anagnostopoulos I. Kalloniatis C. |
ICVS 2007 (5th International Conference of Computer Vision Systems) |
Bielefeld University, Germany
|
March 2007 | ||||
Using Privacy Process Patterns for incorporating Privacy requirements into the System Design Process | Kalloniatis C.
Kavakli E. Gritzalis S. |
SecSE 2007 (Secure Software Engineering Workshop) in conjunction with ARES 2007 (The International Conference on Availability, Reliability, and Security) |
Skramstad T. et al. | IEEE CPS Conference Publishing Services | Vienna, Austria | April 2007 | 1009-1016 | |
Dealing with Privacy Issues during the System Design Process | Kalloniatis C.
Kavakli E. Gritzalis S. |
ISSPIT’05
(5th IEEE International Symposium on Signal Processing and Information Technology,) |
Serpanos D. et al. | IEEE CPS (Conference Publishing Services) | Athens, Greece | December 2005 | 546-551 | |
Addressing Privacy: Matching user Privacy Requirements with Implementation Techniques |
Kavakli E.
Kalloniatis C. Gritzalis S. |
HERCMA 2005 (7th Hellenic European Research on Computer Mathematics and its Applications Conference) |
Lypitakis I. | LEA Publisher | Athens, Greece | September 2005 | ||
A Learning Vector Quantizer Based on Fuzzy Clustering Analysis and its Use in Lossy Image Compression | Samonas A. Kalloniatis C. Tsekouras G.E. |
HERCMA 2005
(7th Hellenic European Research on Computer Mathematics and its Applications Conference) |
Lypitakis I. | LEA Publisher | Athens, Greece | September 2005 | ||
PriS Methodology: Incorporating Privacy Requirements into the System Design Process | Kalloniatis C.
Kavakli E. Gritzalis S. |
SREIS 2005 (Symposium on Requirements Engineering for Information Security) in conjunction with 13th IEEE International Requirements Engineering Conference |
Mylopoulos J. Spafford G. | IEEE CPS (Conference Publishing Services) | Paris, France | August 2005 | ||
A Fuzzy Logic-Based Approach for Detecting Shifting Patterns in Cross-Cultural Data | Tsekouras G.E. Papageorgiou D. Kotsiantis S. Kalloniatis C. Pintelas P. |
18th International Conference on Innovations in Applied Artificial Intelligence | Springer LNCS (Lecture Notes in Computer
Science) |
June 2005 | 705-708 | 3533 | ||
Analysis of Cross-Cultural Data using Hierarchical Fuzzy Logic Clustering | Tsekouras G.E.
Papageorgiou D. Kalloniatis C. |
IASTED (International Conference on Artificial Intelligence and Ap-plications, International Association of Science and Technology for Development, Artificial Intelligence and Applications) |
ACTA Press | Innsbruck, Austria | February 2005 | 262-267 | ||
Security Requirements Engineering for eGovernment Applications: Analysis of Current Frameworks | Kalloniatis C.
Kavakli E. Gritzalis S. |
DEXA’04 EGOV’04 (3rd International Conference on Electronic Government) |
Traunmuller R. | Springer LNCS (Lecture Notes in Computer
Science) |
Zaragoza, Spain | September 2004 | 66-71 | 3183 |
A Fuzzy Clustering Algorithm for Generating Fuzzy Rules from Numerical Data | Tsekouras G.E.
Pavlogeorgatos G. Kalloniatis C. |
ISDA
(IEEE International Conference on Intelligent Systems Design and Applications) |
Budapest, Hungary | August 2004 |