Filter by type:

Sort by year:

A requirements engineering process for increasing the forensic–readiness of Cloud Services during system design

Journal
S. Simou, C. Kalloniatis, S. Gritzalis
Cluster Computing, Under Review

A Framework for Designing Cloud Forensic-enabled Services (CFeS)

Journal
S. Simou, C. Kalloniatis, S. Gritzalis, V. Katos
Requirements Engineering, https://doi.org/10.1007/s00766-018-0289-y

E-Governance in educational settings. Leadership’s views of the Greek Second-ary and Tertiary Education on social media usage for participatory decision-making

Journal
M. Sideri, A. Filippopoulou, A. Kitsiou, C. Kalloniatis, S. Gritzalis
Internet Research, Under Review

Efficiency and effectiveness approaches in spatial data collection of vrisa after lesvos earthquake

Conferences
D. Kavroudakis, N. Soulakellis, K. Topouzelis, S. Chatzistamatis, C. Vasilakos, A. Papakostantinou, G. Tataris, C. Kalloniatis, O. Rousou, M. Batsaris, K. Chaidas, and P. Kalaitzis
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci.

Synergistic exploitation of geoinformation methods for post-earthquake 3d mapping of vrisa traditional settlement, Lesvos island, Greece

Conferences
N. Soulakellis, S. Chatzistamatis, C. Vasilakos, G. Tataris, A. Papakonstan-tinou, D. Kavroudakis, K. Topouzelis, O. Roussou, C. Kalloniatis, E. Papado-poulou, K. Chaidas, and P. Kalaitzis
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci., XLII-3/W4, 491-498, https://doi.org/10.5194/isprs-archives-XLII-3-W4-491-2018, 2018

Interpretability Constraints for Fuzzy Modelling Implemented by Constrained Particle Swarm Optimization

Journal
G. Tsekouras, Tsimikas I., C. Kalloniatis, S. Gritzalis
IEEE Transactions on Fuzzy Systems, 2017, IEEE

A Risk Management Approach for a Sustainable Cloud Migration

Journal
A.A.L.A. Rahman, S. Islam, C. Kalloniatis, S. Gritzalis
Journal of Risk and Financial Management, Vol. 10, No. 20, doi:10.3390/jrfm10040020

Designing Secure and Privacy Aware Information Systems

Journal
C. Kalloniatis, A. Pattakou, E. Kavakli, S. Gritzalis
International Journal of Secure Software Engineering, Vol. 8, No. 2, pp. 1-25, doi: 10.4018/IJSSE.2017040101, IGI Global

A Conceptual Model to Support Security Analysis in the Internet of Things

Journal
O. Mavropoulos, H. Mouratidis, A. Fish, E. Panaousis and C. Kalloniatis
Computer Science and Information Systems Journal, Vol. 14, No. 2, pp. 557-578, doi: 10.2298/CSIS160110016M, ComSIS

Incorporating Privacy in the Design of Cloud-Based Systems: A Conceptual Metamodel

Journal
C. Kalloniatis
Information and Computer Security Journal, Vol. 25, No. 5, pp. 614-633, doi: https://doi.org/10.1108/ICS-06-2016-0044, Emerald

Sharing secrets, revealing thoughts and feelings: perceptions about disclosure practices and anonymity in a FB university students’ community

Journal
M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis
International Journal of Electronic Governance, Vol. 9, No. 3/4, pp. 361-384, doi: http://dx.doi.org/10.1504/IJEG.2017.10006251, International Journal of Electronic Governance, Inderscience Publishers

The role of Gender Privacy in the use of Cloud Computing Services

Conferences
P. Michalopoulou, C. Kalloniatis
PCI 2017 21st Pan-Hellenic Conference on Informatics, I. Anagnostopoulos et al., (eds), September 2017, Larisa, Greece, ACM Press

Machine Learning and Images For Malware Detection and Classification

Conferences
K. Kosmidis, C. Kalloniatis
PCI 2017 21st Pan-Hellenic Conference on Informatics, I. Anagnostopoulos et al., (eds), September 2017, Larisa, Greece, ACM Press

I have learned that I must think twice before. An educational intervention for enhancing students’ privacy awareness in FB

Conferences
M. Sideri, A. Kitsiou , E. Tzortzaki, C. Kalloniatis, S. Gritzalis
e-Democracy 2017 7th International Conference on e-Democracy, S. Katsikas, V. Zorkadis, (eds), pp. 79-95, December 2017, Athens, Greece, Springer CCIS Communications in Computer and Information Science, Vol.792

Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts

Conferences
C. Kalloniatis, D. Kavroudakis, A. Polydoropoulou, S. Gritzalis
2nd SMART-MED Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean, C. Nikolaides, (ed), September 2017, Heraklion, Greece, Springer 

Modelling Cloud Forensic-Enabled Services

Conferences
S. Simou, C. Kalloniatis, S. Gritzalis
Proceedings of the TRUSTBUS 2017 14th International Conference on Trust Privacy and Security in Digital Business, S. Fischer-Huebner, C. Lambrinoudakis, (eds), August 2017, Lyon, France, Springer LNCS Lecture Notes in Computer Science

Supporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns

Conferences
V. Diamantopoulou, N. Argyropoulos, C. Kalloniatis, S. Gritzalis
Proceedings of the IEEE RCIS 2017 11th International Conference on Research Challenges in Information Science, May 2017, Brighton, UK, IEEE Press

Supporting Privacy by Design using Privacy Process Patterns

Conferences
V. Diamantopoulou, C. Kalloniatis, S. Gritzalis, H. Mouratidis
Proceedings of the IFIP SEC 2017 32nd IFIP International Information Security Conference, S. De Capitani di Vimercati, F. Martinelli, (eds), pp. 491-505, May 2017, Rome, Italy, Springer LNCS

Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review

Conferences
A. Pattakou, C. Kalloniatis, S. Gritzalis
CLOUD COMPUTING 2017 8th International Conference on Cloud Computing, GRIDs, and Virtualization, P. Dini, (ed), February 2017, Athens, Greece, IARIA

Managing User Experience: Usability and Security in a new era of Software Supremacy

Conferences
P. Zagouras, C. Kalloniatis, S. Gritzalis
Proceedings of Human Aspects of Information Security, Privacy and Trust, HAS 2017, T. Tryfonas (ed), in the context of the 19th International Conference on Human-Computer Interaction (HCI 2017), July 2017, Vancouver, Canada, Springer LNCS Lecture Notes in Computer Science

A Survey on Cloud Forensics Challenges and Solutions

Journal
S. Simou, C. Kalloniatis, S. Gritzalis, H. Mouratidis
Security and Communication Networks, Vol. 9, No. 18, pp. 6285-6314, doi: 10.1002/sec.1688, Wiley

Increasing Internet Users Trust in the Cloud Computing Era: The Role of Privacy

Journal
C. Kalloniatis
Journal of Mass Communication and Journalism, Vol. 6, No. 3, doi:10.4172/2165-7912.1000306, OMICS

A methodology to carry out voting classification tasks using a particle swarm optimization-based neuro-fuzzy competitive learning network

Journal
A. Tamvakis, G. Tsekouras, A. Rigos, C. Kalloniatis, C-N Anagnostopoulos, G. Anastassopoulos
Evolving Systems, Vol. 8, No. 1, pp. 49-69, Springer

Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners

Journal
S. Islam, S. Fenz, E. Weippl, C. Kalloniatis
International Journal of Secure Software Engineering, Vol. 7, No. 3, pp. 44-73, IGI Global

Social media use for decision making process in educational settings: The Greek case for Leadership’s views and attitude in Secondary and Tertiary Education

Conferences
M. Sideri, A. Filippopoulou, G. Rouvalis, C. Kalloniatis, S. Gritzalis
HICSS-50 2017 Hawaii International Conference on System Sciences, pp. 2875-2884, T. Bui, R. Sprague, (eds), January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services

A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements

Conferences
N. Argyropoulos, S. Shei, C. Kalloniatis, C. Mouratidis, A. Delaney, A. Fish, S. Gritzalis
HICSS-50 2017 Hawaii International Conference on System Sciences, pp. 4827-4836, T. Bui, R. Sprague, (eds), January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services

Migrating eGovernment Services in the Cloud: A Capability Modelling Approach

Conferences
E. Gongolidis, E. Kavakli, P. Loucopoulos, C. Kalloniatis
PCI 2016 20th Pan-Hellenic Conference on Informatics, V. Verykios et al., (eds), November 2016, Patras, Greece, ACM Press

Privacy and Facebook Universities Students’ Communities for Confessions and Secrets: The Greek Case

Conferences
M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis
eDemocracy 2016 6th Inetrantional Confrence on e-Democracy- Citizen Rights in the World of the New Computing Paradigms, in S. Katsikas & A. Sideridis, (eds), Spring-er International Publishing, pp. 77-94.

Modelling Secure Cloud Computing Systems from a Security Requirements Perspective

Conferences
S. Shei, C. Kalloniatis, H. Mouratidis, A. Delaney
TrustBus 2016 13th International Conference on Trust Privacy and Security in Digital Business, S. Furnell, S. Katsikas, C. Lambrinoudakis (eds), September 2016, Porto, Portugal, Springer LNCS Lecture Notes in Computer Science.

Towards a Model-Based Framework for Forensic- Enabled Cloud Information Systems

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
TrustBus 2016 13th International Conference on Trust Privacy and Security in Digital Business, S. Furnell, S. Katsikas, C. Lambrinoudakis (eds), September 2016, Porto, Portugal, Springer LNCS Lecture Notes in Computer Science.

Reasoning about security and privacy in cloud computing under a unified meta-model

Conferences
A. Pattakou, C. Kalloniatis, S. Gritzalis
HAISA 2016 10th International Symposium on Human Aspects of Information Security & Assurance, Furnell-Clarke (eds), July 2016, Frankfurt, Germany

Incorporating Privacy Patterns into Semi-Automatic Business Process Derivation

Conferences
N. Argyropoulos, C. Kalloniatis, H. Mouratidis and A. Fish
RCIS 2016 10th International Conference on Research Challenges in Information Science

APPARATUS: Reasoning About Security Requirements in the Internet of Things

Conferences
O. Mavropoulos, H. Mouratidis, A. Fish, E. Panaousis and C. Kalloniatis
WISSE 2016 6th International Workshop on Information Systems Security Engineering, D. Rosado, (eds), June 2016, Ljubljana, Slovenia, Springer LNCS Lecture Notes in Computer Science

A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments

Journal
P. Drogkaris, S. Gritzalis, C. Kalloniatis, C. Lambrinoudakis
Future Internet , Vol. 7, No. 4, pp. 500-515, MDPI

Assurance of Security and Privacy Requirements for Cloud Deployment Model

Journal
S. Islam, M. Ouedraogo, C. Kalloniatis, H. Mouratidis, S, Gritzalis
IEEE Transactions on Cloud Computing, DOI: 10.1109/TCC.2015.2511719, IEEE Press

Privacy as an integral part for the implementation of cloud solutions

Journal
E. Kavakli, C. Kalloniatis, H. Mouratidis, S. Gritzalis
The Computer Journal, Vol. 58, No. 10, pp. 2213-2224, Oxford University Press

Free expression, privacy and social control enforcement in social media: The Greek Students’ online community on Facebook case

Chapter in Book
M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis
Chapter In E. Theodoropoulou, P. Fokiali, V. Papavasiliou, M. Kaila (Ed.), Environmentl Training and Sustainable Development. Concern Texts with innovative approaches, pp. 65-98, Diadrasi (Pub), Athens, 2015 (in Greek)

Designing Privacy-Aware Systems in the Cloud

Conferences
C. Kalloniatis
TrustBus 2015 12th International Conference on Trust Privacy and Security in Digital Business, S. Hubner, C. Lambrinoudakis (eds), September 2015, Valencia, Spain, Springer LNCS Lecture Notes in Computer Science

Addressing Privacy and Trust Issues in Cultural Heritage Modelling

Conferences
M. Pavlidis, H. Mouratidis, C. Gonzales-Perez, C. Kalloniatis
CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems, A. Gabillon, (ed), July 2015, Mytilene, Greece, Springer LNCS Lecture Notes in Computer Science

A Meta-model for assisting a Cloud Forensics Process

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems, A. Gabillon, (ed), July 2015, Mytilene, Greece, Springer LNCS Lecture Notes in Computer Science

Towards the development of a Cloud Forensics Methodology: A Conceptual Model

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
WISSE 2015 5th International Workshop on Information Systems Security Engineering, D. Rosado, (eds), June 2015, Stockholm, Sweden, Springer LNCS Lecture Notes in Computer Science

Towards the Design of Trustworthy Websites for Cultural Organizations: A Visitor’s perspective

Conferences
E. Kavakli, F. Bantimaroudis, C. Kalloniatis, S. Gritzalis, K. Avgeri
EMCIS 2015 12th Mediterranean and Middle Eastern Conference on Information Systems, V. Morabito, (ed), June 2015, Athens, Greece, EMCIS

Building an innovative solution for wildfire prevention and management: the “aegis” platfor

Conferences
N. Athanasis, C. Kalloniatis, M. Vaitis, C. Vasilakos, K. Kalabokidis
EMCIS 2015 12th Mediterranean and Middle Eastern Conference on Information Systems, V. Morabito, (ed), June 2015, Athens, Greece, EMCIS

Addressing Privacy in Traditional and Cloud-based Systems

Journal
C. Kalloniatis, E. Kavakli, S. Gritzalis
International Journal of Applied Industrial Engineering, Vol. 2, No.1, pp. 14-40, IGI Global

Privacy-Aware Cloud Deployment Scenario Selection

Conferences
R. Meis, C. Beckers, S. Faßbender , M. Heisel, C. Kalloniatis, S. Gritzalis
TRUSTBUS ‘14 11th International Conference on Trust, Privacy and Security in Digital Business, G. Pernull, S. Katsikas (Eds.), pp. 94-105, August 2014, Munich, Germany, Springer LNCS Lecture Notes in Computer Science 8647

Cloud Forensics Solutions: A Review

Conferences
S. Simou, C. Kalloniatis, E. Kavakli, S. Gritzalis
WISSE 2014 4th International Workshop on Information Systems Security Engineering, L. Iliadis, M. Papazoglou, K. Pohl (Eds.), pp. 299-309, June 2014, Thessaloniki, Greece, Springer LNBIP 178

Cloud Forensics: Identifying the Major Issues and Challenges

Conferences
S. Simou, C. Kalloniatis, E. Kavakli, S. Gritzalis
CAiSE 2014 26th International Conference on Advanced Information Systems Engineering, M. Jarke, J. Mylopoulos, C. Quix (Eds), pp. 271-284, June 2014, Thessaloniki, Greece, Springer Lecture Notes in Computer Science 8484

Requirements identification for migrating egovernment applications to the cloud

Conferences
E. Gongolidis, C. Kalloniatis, E. Kavakli
ICT-EurAsia 2014 Information & Communication Technology-EurAsia Conference 2014, Ir. Linawati, Made Sudiana Mahendra, Erich Neuhold, A Min Tjoa, Ilsun You (Eds.), pp. 150-158, April 2014, Bali, Indonesia, Springer Lecture Notes in Computer Science LNCS 8407

Towards the design of secure and privacy-oriented Information Systems in the Cloud: Identifying the major concepts

Journal
C. Kalloniatis, H. Mouratidis, V. Manousakis, S. Islam, S. Gritzalis, E. Kavakli
Computer, Standards and Interfaces, Elsevier, Vol. 36, No. 4, pp. 759-775, Elsevier

Evaluating Cloud Deployment Scenarios Based on Security and Privacy Requirements

Journal
C. Kalloniatis, H. Mouratidis, S. Islam
Requirements Engineering, Vol 18, No. 4, pp. 299-319, Springer

A framework to support selection of cloud providers based on security and privacy requirements

Journal
H. Mouratidis, S. Islam, C. Kalloniatis, S. Gritzalis
Journal of Systems and Software, Vol. 86, pp. 2276-2293, Elsevier

The role of trust for the development of cultural internet-based systems

Conferences
M. Pavlidis, E. Kavakli, F. Bantimaroudis, H. Mouratidis, C. Kalloniatis, S. Gritzalis
EMCIS 2013 European, Mediterranean, and Middle Eastern Conference on Information Systems, A. Ghoneim, M. Kamal, (Eds), October 2013, London, UK, EMCIS (Best paper Award)

Privacy in the Cloud: Bridging the Gap between Design and Implementation

Conferences
V. Manousakis, C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the WISSE 2013 3rd International Workshop on Information Systems Security Engineering, in conjunction with CAiSE 2013 25th International Conf erence on Advanced Information Systems Engineering, X. Franch and P. Soffer (Eds.), June 2013, Valencia, Spain, Springer Lecture Notes in Business Information Processing 148

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns

Conferences
C. Kalloniatis, V. Manousakis, C. Mouratidis, S. Gritzalis
Proceedings of the I3E 2013 12th IFIP Conference on e-Business, e-Services, e-Society, C. Douligeris, N. Polemi (eds.), April 2013, Piraeus, Greece, Springer

Aligning Security and Privacy to support the development of Secure Information Systems

Journal
H. Mouratidis, C. Kalloniatis, S. Islam, M. P. Huget, S. Gritzalis
Journal of Universal Computer Science, Vol. 18, No. 12, pp. 1608-1627

Model based Process to Support Security and Privacy Requirements Engineering

Journal
S. Islam, H. Mouratidis, C. Kalloniatis, A. Hudic, L. Zechner
International Journal of Secure Software Engineering, Vol. 3, No 3, IGI Global

Applying soft computing technologies for implementing privacy-aware systems

Conferences
C. Kalloniatis, P. Belsis, E. Kavakli, S. Gritzalis
Proceedings of the WISSE 2012 2nd International Workshop on Information Systems Security Engineering, in conjunction with CAiSE 2012 24th International Conference on Advanced Information Systems Engineering, M. Bajec and J. Eder (Eds.), June 2012, Gdask, Poland, Springer Lecture Notes in Business Information Processing

The ‘‘Panopticon’’ of search engines: the response of the European data protection framework

Journal
E. Kosta, C. Kalloniatis, L. Mitrou, E. Kavakli
Requirements Engineering, Vol. 16, No. 1, pp. 47-54, Springer

A Soft Computing approach for Privacy Requirements Engineering

Journal
C. Kalloniatis, P. Belsis, S. Gritzalis
Journal of Applied Soft Computing, Vol. 11, No. 7, pp. 4341-4348, Elsevier

Designing Privacy Aware Information Systems

Chapter in Book
C. Kalloniatis, E. Kavakli, S. Gritzalis
chapter in: Software Engineering for Secure Systems: Industrial and Research Perspectives, Mouratidis H. (Ed.), 212-231, 2011, Hershey, USA, IGI Global

Data Protection Issues pertaining to Social Networking under EU law

Journal
E. Kosta, C. Kalloniatis, L. Mitrou, S. Gritzalis
Transforming Government: People, Process, and Policy, Vol. 4, No. 2, pp. 193-201, Emerald

PRIS tool: A case tool for privacy-oriented Requirements Engineering

Journal
C. Kalloniatis, E. Kavakli, E.Kontellis
Journal of Information Systems Security, Vol. 6, No. 1, pp. 3-19, AIS SIGSEC

Privacy Requirements Engineering for Trustworthy e-Government Services

Conferences
N. Vrakas, C. Kalloniatis, A.Tsohou, C. Lambrinoudakis
Proceedings of the TRUST 2010 3rd International Conference on Trust and Trustworthy Computing, pp.298-307, A. Acquisti, S. W. Smith, A.-R. Sadeghi (Eds.) June 2010, Berlin, Germany, Springer Lecture Notes in Computer Science 6101

Incorporating Privacy during system design: Requirement Engineering Methods for protecting privacy during electronic communications

Chapter in Book
C. Kalloniatis, E. Kavakli
chapter in: Privacy Protection: Technical and Legal Issues, Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S. (Eds.), pp. 331-355, Papasotiriou Pub., Athens (in Greek)

Methods for Designing Privacy Aware Information Systems: A review

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics, pp.185-194, V. Chrysikopoulos, N. Alexandris, C. Douligeris, S. Sioutas (Eds.), September 2009, Corfu, Greece, IEEE CPS Conference Publishing Services

Search engines: gateway to a new “Panopticon”?

Conferences
E. Kosta, C. Kalloniatis, L. Mitrou, E. Kavakli
Proceedings of the TrustBus’09 6th International Conference on Trust, Privacy and Security in Digital Business, pp.11-21, S. Fischer-Huebner et al. (Eds.), September 2009, Linz, Austria, Springer Lecture Notes in Computer Science 5695

PriS Tool: A Case Tool for Privacy-Oriented RE

Conferences
C. Kalloniatis, E. Kavakli, E. Kontellis
Proceedings of the MCIS 2009 4th Mediterranean Conference on Information Systems, pp.913-925, G. Doukidis et al. (Eds.), September 2009, Athens Greece

Addressing Privacy Requirements in System Design: The PriS Method

Journal
C. Kalloniatis, E. Kavakli, S. Gritzalis
Requirements Engineering, Vol.13, No.3, pp.241-255, 2008, Springer

Protecting and Managing Digital Rights

Chapter in Book
E. Kavakli, C. Kalloniatis
chapter in: Aspects of Representation, Studies on Art and Technology, New Technologies in Contemporary Cultural Expression, Evi Sampanikou and Evangelia Kavakli (Eds.), pp. 241-249, Mytilene, Greece

Protecting Privacy in System Design: The Electronic Voting Case

Journal
E. Kavakli, S. Gritzalis, C. Kalloniatis
Transforming Government: People, Process, and Policy journal, Vol.1, No.4, pp.307-332, 2007, Emerald

Intelligent modification for the daltonization process of digitized paintings

Conferences
C.-N. Anagnostopoulos, G.E. Tsekouras, I. Anagnostopoulos, C. Kalloniatis
Proceedings of the ICVS 2007 5th International Conference of Computer Vision Systems, Applied Computer Science Group, March 2007, Bielefeld University, Germany

Using Privacy Process Patterns for incorporating Privacy requirements into the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the SecSE 2007 Secure Software Engineering Workshop (in conjunction with ARES 2007 The International Conference on Availability, Reliability, and Security), pp. 1009-1016, T. Skramstad et al. (Eds.), Vienna, Austria, April 2007, IEEE CPS Conference Publishing Services

Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework

Journal
E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis
Internet Research, Vol.16, No.2, pp.140-158, 2006, Emerald

Dealing with Privacy Issues during the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the ISSPIT’05 5th IEEE International Symposium on Signal Processing and Information Technology, pp.546-551, D. Serpanos et al. (Eds.), December 2005, Athens, Greece, IEEE CPS Conference Publishing Services

Addressing Privacy: Matching user Privacy Requirements with Implementation Techniques

Conferences
E. Kavakli, C. Kalloniatis, S. Gritzalis
Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, I. Lypitakis (Ed.), September 2005, Athens, Greece, LEA Publisher

A Learning Vector Quantizer Based on Fuzzy Clustering Analysis and its Use in Lossy Image Compression

Conferences
A. Samonas, C. Kalloniatis, G.E. Tsekouras
Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Math-ematics and its Applications Conference, I. Lypitakis (Ed.), September 2005, Athens, Greece, LEA Publisher

PriS Methodology: Incorporating Privacy Requirements into the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the SREIS 2005 Symposium on Requirements Engineering for Information Security, in conjunction with 13th IEEE International Requirements Engineering Conference, J. Mylopoulos, G. Spafford (Eds.) Paris, France, August 2005, IEEE CPS Conference Publishing Services

A Fuzzy Logic-Based Approach for Detecting Shifting Patterns in Cross-Cultural Data

Conferences
G.E. Tsekouras, D. Papageorgiou, S. Kotsiantis, C. Kalloniatis, P. Pintelas
Proceedings of the 18th International Conference on Innovations in Applied Artificial Intelligence, pp. 705-708, June 2005, Springer Lecture Notes in Computer Science, LNCS 3533

Analysis of Cross-Cultural Data using Hierarchical Fuzzy Logic Clustering

Conferences
G.E. Tsekouras, D. Papageorgiou, C. Kalloniatis
Proceedings of the IASTED International Conference on Artificial Intelligence and Ap-plications, International Association of Science and Technology for Development, Artificial Intelligence and Applications IASTED/ACTA Press, pp. 262-267, February 2005, Innsbruck, Austria

Fuzzy Clustering of Categorical Attributes and its Use in Analyzing Cultural Data

Journal
G. E. Tsekouras, D. Papageorgiou, S. Kotsiantis, C. Kalloniatis, and P. Pintelas
International Journal of Computational Intelligence

Fuzzy Modelling via Optimal Fuzzy Clustering

Journal
G. E. Tsekouras, C. Kalloniatis, T. Mavrofides
WSEAS Transactions on Systems, Vol. 3, No 5, pp. 1958-1963, 2004, WSEAS

A Fuzzy Clustering-Based Algorithm for Fuzzy Modeling

Journal
G. E. Tsekouras, C. Kalloniatis, E. Kavakli, T. Mavrofides
WSEAS Transactions on Systems, Vol. 3, No 5, pp. 1977-1982, 2004, WSEAS

Security Requirements Engineering for eGovernment Applications: Analysis of Current Frameworks

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the DEXA’04 EGOV’04 3rd International Conference on Electronic Government, R. Traunmuller (Ed.), pp.66-71, September 2004, Zaragoza, Spain, Springer Lecture Notes in Computer Science LNCS 3183

A Fuzzy Clustering Algorithm for Generating Fuzzy Rules from Numerical Data

Conferences
G.E. Tsekouras, G. Pavlogeorgatos, C. Kalloniatis
Proceedings of the ISDA IEEE International Conference on Intelligent Systems Design and Applications, August 2004, Budapest, Hungary