create your own website



Conferences

491-498
Title of PaperAuthorsTitle of published proceeding Editor(s)PublisherPlace of PublicationDatePagesVol.
Efficiency and effectiveness approaches in spatial data collection of vrisa after lesvos earthquakeKavroudakis D.
Soulakellis N.
Topouzelis K.
Chatzistamatis S.
Vasilakos C.
Papakonstantinou A.
Tataris G.
Kalloniatis C.
Roussou O.
Batsaris M.
Chaidas K.
Kalaitzis P.

Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci.
 
Synergistic exploitation of geoinformation methods for post-earthquake 3d mapping of vrisa traditional settlement, Lesvos island, GreeceSoulakellis N.
Chatzistamatis S.
Vasilakos C.
Tataris G.
Papakonstantinou A.
Kavroudakis D.
Topouzelis K.
Roussou O.
Kalloniatis C.
Papadopoulou E.
Chaidas K.
Kalaitzis P.


Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci.
 2018XLII-3/W4
The role of Gender Privacy in the use of Cloud Computing ServicesMichalopoulou P.
Kalloniatis C.

PCI 2017
(Pan-Hellenic Conference on Informatics)
Anagnostopoulos I. et al.ACM Press Larisa, GreeceSeptember 2017
Machine Learning and Images For Malware Detection and ClassificationKosmidis K. 
Kalloniatis C.

PCI 2017
(Pan-Hellenic Conference on Informatics)
Anagnostopoulos I. et al.ACM Press Larisa, GreeceSeptember 2017
I have learned that I must think twice before. An educational intervention for enhancing students’ privacy awareness in FBSideri M. 
Kitsiou A. Tzortzaki E.
Kalloniatis C.
Gritzalis S. 
e-Democracy 2017
(7th International Conference on e-Democracy)
Katsikas S.
Zorkadis V.
Springer CCIS (Communications in Computer and Information Science)Athens, GreeceDecember 201779-95792 
Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts Kalloniatis C.
Kavroudakis D. 
Polydoropoulou A.
Gritzalis S.

2nd SMART-MED
(Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean)
Nikolaides C. 
Springer 
Heraklion, Greece,September 2017
Modelling Cloud Forensic-Enabled Services Simou S. 
Kalloniatis C.
Gritzalis S. 
TRUSTBUS 2017
(14th International Conference on Trust Privacy and Security in Digital Business)
Fischer-Huebner S. 
Lambrinoudakis
C. 
Springer LNCS (Lecture Notes in Computer Science)Lyon, FranceAugust 2017
Supporting Privacy by Design using Privacy Process PatternsDiamantopoulou V.
Argyropoulos N. 
Kalloniatis C.
Mouratidis H. 
IFIP SEC 2017 
(32nd IFIP International Information Security Conference)
De Capitani di Vimercati S.
Martinelli F. 
Springer LNCSRome, ItalyMay 2017491-505
Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A ReviewPattakou A. 
Kalloniatis C.
Gritzalis S. 
CLOUD COMPUTING 2017
(8th International Conference on Cloud Computing, GRIDs, and Virtualization)
Dini P. IARIAAthens, GreeceFebruary 2017
Managing User Experience: Usability and Security in a new era of Software SupremacyZagouras P.
Kalloniatis C.
Gritzalis S. 
HCII 2017
(19th International Conference on Human-Computer Interaction)
Stephanidis C.Springer LNCS (Lecture Notes in Computer Science)

Vancouver, CanadaMay 2017
APPARATUS: Reasoning About Security Requirements in the Internet of ThingsMavropoulos O.
Mouratidis H. Fish A.
Panaousis E. 
Kalloniatis C.

WISSE 2016
(6th International Workshop on Information Systems Security Engineering)
Rosado D.Springer LNCS (Lecture Notes in Computer Science)

Ljubljana, SloveniaJune 2016
Social media use for decision making process in educational settings: The Greek case for Leadership’s views and attitude in Secondary and Tertiary EducationSideri M.
Filippopoulou A.
Rouvalis G.
Kalloniatis C.
Gritzalis S. 
HICSS-50 2017
(Hawaii International Conference on System Sciences)
Bui T.
Sprague R.
IEEE CPS (Conference Publishing Services)Hawaii, USAJanuary 20172875-2884
A Semi-Automatic Approach for Eliciting Cloud Security and Privacy RequirementsArgyropoulos N., Shei S.
Kalloniatis C.
Mouratidis C. 
Delaney A.
Fish A.
Gritzalis S.
HICSS-50 2017
(Hawaii International Conference on System Sciences)
Bui T.
Sprague R.
IEEE CPS (Conference Publishing Services)Hawaii, USAJanuary 20174827-4836
Migrating eGovernment Services in the Cloud: A Capability Modelling ApproachGongolidis E.
Kavakli E.  
Loucopoulos P. 
Kalloniatis C. 
PCI 2016
(20th Pan-Hellenic Conference on Informatics)
Verykios V. et al.ACM Press

Patras, GreeceNovember 2016
Privacy and Facebook Universities Students’ Communities for Confessions and Secrets: The Greek CaseSideri M. 
Kitsiou A. 
Kalloniatis C.
Gritzalis S. 
eDemocracy 2016
(6th Inetrantional Confrence on e-Democracy- Citizen Rights in the World of the New Computing Paradigms)
Katsikas S. Sideridis A.Spring-er International Publishing77-94
Towards a Model-Based Framework for Forensic- Enabled Cloud Information SystemsSimou S.
Kalloniatis C. 
Mouratidis H. 
Gritzalis S. 
TrustBus 2016
(13th International Conference on Trust Privacy and Security in Digital Business)
Furnell S.
S. Katsikas S. 
Lambrinoudakis C. 
Springer LNCS (Lecture Notes in Computer Science) 

Porto, PortugalSeptember 2016
Reasoning about security and privacy in cloud computing under a unified meta-modelPattakou A. 
Kalloniatis C.
Gritzalis S. 
HAISA 2016 
(10th International Symposium on Human Aspects of Information Security & Assurance)
Furnell-ClarkeFrankfurt, GermanyJuly 2016
Incorporating Privacy Patterns into Semi-Automatic Business Process DerivatioArgyropoulos N. 
Kalloniatis C. 
Mouratidis H.
Fish A. 
RCIS 2016
(10th International Conference on Research Challenges in Information Science
)
Modelling Secure Cloud Computing Systems from a Security Requirements PerspectiveShei S.
Kalloniatis C. Mouratidis H.
Delaney A. 
TrustBus 2016
(13th International Conference on Trust Privacy and Security in Digital Business)
Furnell S. 
Katsikas S. 
Lambrinoudakis C. 
Springer LNCS (Lecture Notes in Computer Science) 

Porto, PortugalSeptember 2016
Digital Privacy and Social Capital on Social Network Sites. Friends or Foes?Kitsiou A. Tzortzaki E. Sideri M.
Gritzalis S. 
STAST 2016 
(6th International Workshop on Socio-Technical Aspects of Security and Trust)
Benenson  Z. 
Gates C.
IEEE CPS Conference Publishing ServicesLos Angeles, USADecember 2016
Self-disclosure, Privacy concerns and Social Capital benefits interaction in Facebook: A case studyTzortzaki E.
Kitsiou A.
Sideri M.
Gritzalis S. 
PCI 2016
(20th Pan-Hellenic Conference on Informatics)
Verykios V. et al.ACM Press.Patras, GreeceNovember 2016
Designing Privacy-Aware Systems in the CloudKalloniatis C.

TrustBus 2015
(12th International Conference on Trust Privacy and Security in Digital Business)
Hubner S. Lambrinoudakis C.Springer LNCS (Lecture Notes in Computer Science) 

Valencia, SpainSeptember 2015
A Meta-model for assisting a Cloud Forensics ProcessSimou S. 
Kalloniatis C.
Mouratidis H. 
Gritzalis S. 
CRiSIS 2015
(10th International Conference on Risks and Security of Internet and Systems)
Gabillon A. Springer LNCS (Lecture Notes in Computer Science)

Mytilene, GreeceJuly 2015
Towards the development of a Cloud Forensics Methodology: A Conceptual ModelSimou S.
Kalloniatis C.
Mouratidis H.
Gritzalis S. 
WISSE 2015
(5th International Workshop on Information Systems Security Engineering)
Rosado D. Springer LNCS (Lecture Notes in Computer Science)

Stockholm, SwedenJune 2015
Towards the Design of Trustworthy Websites for Cultural Organizations: A Visitor’s perspectiveKavakli E. Bantimaroudis F.
Kalloniatis C.
Gritzalis S.
Avgeri K. 
EMCIS 2015
(12th Mediterranean and Middle Eastern Conference on Information Systems)
Morabito V. EMCISAthens, GreeceJune 2015
Building an innovative solution for wildfire prevention and management: the “aegis” platforAthanasis N. 
Kalloniatis C. Vaitis M.
Vasilakos C.
Kalabokidis K.
EMCIS 2015
(12th Mediterranean and Middle Eastern Conference on Information Systems)
Morabito V. EMCISAthens, GreeceJune 2015
Addressing Privacy and Trust Issues in Cultural Heritage ModellingPavlidis M.
Mouratidis H.
Gonzales-Perez C.
Kalloniatis C.
CRiSIS 2015 
(10th International Conference on Risks and Security of Internet and Systems)
Gabillon A. Springer LNCS (Lecture Notes in Computer Science)

Mytilene, GreeceJuly 2015
Privacy-Aware Cloud Deployment Scenario SelectionMeis R. 
Beckers C. Faßbender S. Heisel M. , Kalloniatis C.
Gritzalis S. 
TRUSTBUS ‘14
(11th International Conference on Trust, Privacy and Security in Digital Business)
Pernull G.
Katsikas S. 
Springer LNCS (Lecture Notes in Computer Science)

Munich, GermanyAugust 201494-1058647
Cloud Forensics Solutions: A ReviewSimou S.
Kalloniatis C.
Kavakli E.
Gritzalis S. 
WISSE 2014
(4th International Workshop on Information Systems Security Engineering)
Iliadis L.
Papazoglou M. Pohl K. 
Springer LNBIP Thessaloniki, GreeceJune 2014299-309178
Cloud Forensics: Identifying the Major Issues and ChallengesSimou S.
Kalloniatis C.
Kavakli E.
Gritzalis S. 
HCII 2017
(19th International Conference on Human-Computer Interaction)
Stephanidis C.Springer LNCS (Lecture Notes in Computer Science) 

Thessaloniki, GreeceJune 2014271-2848484
Requirements identification for migrating egovernment applications to the cloudGongolidis E.
Kalloniatis C.
Kavakli E.
ICT-EurAsia 2014
(Information & Communication Technology-EurAsia Conference 2014)
Linawati Ir. 
Sudiana
Mahendra M.
Neuhold E.
Min Tjoa A.
You I.
Springer LNCS (Lecture Notes in Computer Science) 

Bali, IndonesiaApril 2014150-1588407
The role of trust for the development of cultural internet-based systems
(Best paper Award)
Pavlidis M.
Kavakli  E. Bantimaroudis F.
Mouratidis H. 
Kalloniatis C.
Gritzalis S. 
EMCIS 2013 
(European, Mediterranean, and Middle Eastern Conference on Information Systems)
Ghoneim A. 
Kamal M. 
EMCISLondon, UKOctober 2013
Privacy in the Cloud: Bridging the Gap between Design and ImplementationManousakis V. 
Kalloniatis C.
Kavakli E.
Gritzalis S. 
WISSE 2013
(3rd International Workshop on Information Systems Security Engineering) in conjunction with
CAiSE 2013 (25th International Conference on Advanced Information Systems Engineering)
Franch X.
Soffer P. 
Springer
Lecture Notes in Business Information 

Valencia, SpainJune 2013
Migrating into the Cloud: Identifying the Major Security and Privacy ConcernsKalloniatis C.
Manousakis V. 
Mouratidis C. 
Gritzalis S. 
I3E 2013
(12th IFIP Conference on e-Business, e-Services, e-Society)
Douligeris C. Polemi N.Springer 

Piraeus, GreeceApril 2013
Applying soft computing technologies for implementing privacy-aware systemsKalloniatis C.
Belsis P. 
Kavakli E.
Gritzalis S. 
WISSE 2012
(2nd International Workshop on Information Systems Security Engineering) in conjunction with
CAiSE 2012 (24th International Conference on Advanced Information Systems Engineering)
Bajec M.
Eder J. 
Springer
Lecture Notes in Business Information 

Gdask, PolandJune 2012
Privacy Requirements Engineering for Trustworthy e-Government ServicesVrakas N.
Kalloniatis C. Tsohou A.
Lambrinoudakis C.
TRUST 2010
(3rd International Conference on Trust and Trustworthy Computing)
Acquisti A. 
Smith S. W. Sadeghi A.-R. 
Springer LNCS Lecture Notes in Computer Science

Berlin, GermanyJune 2010298-3076101
Methods for Designing Privacy Aware Information Systems: A reviewKalloniatis C.
Kavakli E.
Gritzalis S. . 
PCI 2009
(13th Pan-Hellenic Conference on Informatics)
Chrysikopoulos V.
Alexandris N. Douligeris C. Sioutas S. 
IEEE CPS (Conference Publishing Services )

Corfu, GreeceSeptember 2009185-194
Search engines: gateway to a new “Panopticon”?Kosta E.
Kalloniatis C. Mitrou L. 
Kavakli E. 

TrustBus’09 
(6th International Conference on Trust, Privacy and Security in Digital Business)
Fischer-Huebner et al.Springer LNCS Lecture Notes in Computer Science

Linz, AustriaSeptember 200911-215695
PriS Tool: A Case Tool for Privacy-Oriented REKalloniatis C.
Kavakli E. 
Kontellis E. 
MCIS 2009
(4th Mediterranean Conference on Information Systems)
Doukidis G. et al.Athens GreeceSeptember 2009913-925
Intelligent modification for the daltonization process of digitized paintingsAnagnostopoulos C.-N
Tsekouras G.E. Anagnostopoulos I.
Kalloniatis C. 
ICVS 2007
(5th International Conference of Computer Vision Systems)
Bielefeld University, Germany

March 2007
Using Privacy Process Patterns for incorporating Privacy requirements into the System Design ProcessKalloniatis C.
Kavakli E.
Gritzalis S. 
SecSE 2007
(Secure Software Engineering Workshop) in conjunction with ARES 2007 (The International Conference on Availability, Reliability, and Security)
Skramstad T.  et al. IEEE CPS Conference Publishing ServicesVienna, AustriaApril 20071009-1016
Dealing with Privacy Issues during the System Design ProcessKalloniatis C.
Kavakli E.
Gritzalis S. 
ISSPIT’05
(5th IEEE International Symposium on Signal Processing and Information Technology,)
Serpanos D. et al.IEEE CPS (Conference Publishing Services)Athens, GreeceDecember 2005546-551
Addressing Privacy: Matching user Privacy Requirements with Implementation Techniques Kavakli E.
Kalloniatis C. 
Gritzalis S. 
HERCMA 2005
(7th Hellenic European Research on Computer Mathematics and its Applications Conference)
Lypitakis I. LEA PublisherAthens, GreeceSeptember 2005
A Learning Vector Quantizer Based on Fuzzy Clustering Analysis and its Use in Lossy Image CompressionSamonas A. 
Kalloniatis C.
Tsekouras  G.E. 
HERCMA 2005
(7th Hellenic European Research on Computer Mathematics and its Applications Conference)
Lypitakis I. LEA PublisherAthens, GreeceSeptember 2005
PriS Methodology: Incorporating Privacy Requirements into the System Design ProcessKalloniatis C.
Kavakli E.
Gritzalis S. 
SREIS 2005
(Symposium on Requirements Engineering for Information Security) in conjunction with 13th IEEE International Requirements Engineering Conference
Mylopoulos J. Spafford G. IEEE CPS (Conference Publishing Services)Paris, FranceAugust 2005
A Fuzzy Logic-Based Approach for Detecting Shifting Patterns in Cross-Cultural DataTsekouras G.E.
Papageorgiou D. Kotsiantis S.
Kalloniatis C. Pintelas P. 
18th International Conference on Innovations in Applied Artificial IntelligenceSpringer LNCS (Lecture Notes in Computer Science) 

June 2005705-7083533
Analysis of Cross-Cultural Data using Hierarchical Fuzzy Logic ClusteringTsekouras G.E.
Papageorgiou D. 
Kalloniatis C. 
IASTED
(International Conference on Artificial Intelligence and Ap-plications, International Association of Science and Technology for Development, Artificial Intelligence and Applications)
ACTA PressInnsbruck, AustriaFebruary 2005262-267
Security Requirements Engineering for eGovernment Applications: Analysis of Current FrameworksKalloniatis C.
Kavakli E.
Gritzalis S. 
DEXA’04 EGOV’04
(3rd International Conference on Electronic Government)
Traunmuller R. Springer LNCS (Lecture Notes in Computer Science) 

Zaragoza, SpainSeptember 200466-713183
A Fuzzy Clustering Algorithm for Generating Fuzzy Rules from Numerical Data Tsekouras G.E.
Pavlogeorgatos G.
Kalloniatis C.
 
ISDA
(IEEE International Conference on Intelligent Systems Design and Applications)
Budapest, HungaryAugust 2004
Showing entries (filtered from total entries)

© Copyright 2018 PrivaSI laboratory - All Rights Reserved