Filter by type:

Sort by year:

A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems

Conferences
C. Lyvas, K. Maliatsos, A. Menegatos, T. Giannakopoulos, C. Lambrinoudakis, C. Kalloniatis and A. Kanatas
CyberICPS 2022 8th Workshop on Security of Industrial Control Systems and Cyber-Physical Systems in conjunction with 27th European Symposium on Research in Computer Security (ESORICS), Sokratis Katsikas et al. (eds), September 2022, Copenhagen, Denmark, Springer Lecture Notes in Computer Science

Object Relational Mapping vs. Event-Sourcing: Systematic review

Conferences
M. Pantelelis, C. Kalloniatis
EGOVIS 2022, 11th International Conference on Electronic Government and the Information Systems Perspective, A. Kő and E. Francesconi (eds), August 2022, Vienna, Austria, Springer Lecture Notes in Computer Science

Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things

Conferences
S. Stavrinos, K. Kotis, C. Kalloniatis
AIAI 2022, 18th Artificial Intelligence Applications and Innovations Conference, I. Maglogiannis, L. Iliadis, J. Macintyre, P. Cortez (eds), June 2022, Crete, Greece IFIP Advances in Information and Communication Technology

Can social gamification and privacy co-exist? Identifying the major concerns

Conferences
K. Vgena, A-G Mavroeidi, A. Kitsiou, C. Kalloniatis
PCI 2021 25th Pan-Hellenic Conference on Informatics, M. Vassilakopoulos, N. Karanikolas, G. Stamoulis, V. Verykios, C. Sgouropou-lou, (eds), pp. 178–183 November 2021, Volos, Greece, ACM Press

Disclosing Social and Location Attributes on Social Media: The Impact on Users’ Privacy

Conferences
K. Vgena, A. Kitsiou, C. Kalloniatis, D. Kavroudakis
SECPRE 2021 5th International Workshop on Security and Privacy Requirements En-gineering in conjunction with 26th European Symposium on Research in Computer Se-curity (ESORICS), C. Kalloniatis, J. Mylopoulos, A. Anton and S. Gritzalis (eds), October 2021, Darmstadt: Germany, Springer LNCS Lecture Notes in Computer Science Vol.12501

Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts

Conferences
A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis
CyberICPS 2020 6th Workshop on Security of Industrial Control Systems and Cyber-Physical Systems in conjunction with 25th European Symposium on Research in Com-puter Security (ESORICS), S. K. Katsikas, F. Cuppens, N. Cuppens, C. Lambrin-oudakis, (eds), pp. 117-132, September 2020, Guildford: UK, Springer LNCS Lecture Notes in Computer Science Vol.12501

Aligning the concepts of Risk, Security and Privacy towards the design of Secure Intelligent Transport Systems

Conferences
V. Diamantopoulou, C. Kalloniatis, C. Lyvas, K. Maliatsos, M. Gay, A. Kana-tas, and C. Lambrinoudakis
SECPRE 2020 4th International Workshop on Security and Privacy Requirements En-gineering in conjunction with 25th European Symposium on Research in Computer Se-curity (ESORICS), C. Kalloniatis, J. Mylopoulos, A. Anton and S. Gritzalis (eds), pp. 170-184, September 2020, Guildford: UK, Springer LNCS Lecture Notes in Computer Science Vol.12501

Securing User eXperience (SUX): A Review For the End-Users’ Software Robust-ness

Conferences
P. Zagouras, C. Kalloniatis
HAISA 2020 14th International Symposium on Human Aspects of Information Secu-rity & Assurance, Furnell-Clarke (eds), July 2020, Mytilene, Lesvos Island, Greece, IFIP

Measuring users’ socio-contextual attributes for Self-Adaptive Privacy within Cloud-Computing Environments

Conferences
A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis
TRUSTBUS 2020 17th International Conference on Trust, Privacy and Security in Digital Business, S. K. Katsikas, S. Gritzalis, E. Weippl, (eds), September 2020, Bratislava: Slovakia, Springer LNCS Lecture Notes in Computer Science

A Revised Forensic Process for Aligning the Investigation Process with the De-sign of Forensic-Enabled Cloud Services

Conferences
S. Simou, C. Kalloniatis, S. Gritzalis, V. Katos
E-Democracy 2019 – Safeguarding Democracy and Human Rights in the Digital Age, In: Katsikas S., Zorkadis V. (eds) December 2019, Communications in Computer and Information Science, vol 1111. Springer

Do Identity and Location Data Interrelate? New Affiliations and Privacy Con-cerns in Social-Driven Sharing

Conferences
K. Vgena, A. Kitsiou, C. Kalloniatis, D. Kavroudakis
TRUSTBUS 2019 16th International Conference on Trust, Privacy and Security in Digital Bussiness, S. Gritzalis, E. Weippl, S. K. Katsikas, (eds), pp. 3-16, Septem-ber 2019, Linz: Austria, Springer LNCS Lecture Notes in Computer Science Vol.11711

The interrelation of game elements and privacy requirements for the design of a system: A metamodel

Conferences
A.G. Mavroeidi, A. Kitsiou, C. Kalloniatis
TRUSTBUS 2019 16th International Conference on Trust, Privacy and Security in Digital Bussiness, S. Gritzalis, E. Weippl, S. K. Katsikas, (eds), pp. 110-125, Sep-tember 2019, Linz: Austria, Springer LNCS Lecture Notes in Computer Science Vol.11711

Secure and Privacy-Aware Intelligent Transport Systems and their Role on Smart Cities Development

Conferences
A. Polydoropoulou, C. Kalloniatis, D. Kavroudakis, S. Gritzalis
TRB 2019 Transportation Research Board TRB’s 98th Meeting, K. Turnbull et al., (eds), January 2019, Washington, USA, TRB

Towards the Design of Usable Privacy by Design Methodologies

Conferences
A. Pattakou, A. G. Mavroeidi, V. Diamantopoulou, C. Kalloniatis, S. Gritzalis
ESPRE 2018 5th International Workshop on Evolving Security and Privacy Require-ments Engineering (in conjunction with the RE'18 26th IEEE Requirements Engineer-ing Conference), K. Beckers, S. Faily, S.-W. Lee, N. Mead, (eds), August 2018, Banff, Canada, IEEE CPS Conference Publishing Services

Enhancing Cultural Tourism Experiences in Albania through Mobile Augmented Reality Applications

Conferences
A. Dhembi, D. Kavroudakis, C. Kalloniatis
3rd ’SmartBlueCity’ Euro-Mediterranean Conference and Exhibition 2018 on “Featur-ing Territorial Intelligence of Small and Medium-sized Cities and Insular Communities in the Mediterranean Scenery – Building Bridges between Local Endeavors and Global Developments”, A. Stratigea, (ed), October 2018, Larnaca, Cyprus, Springer

Modeling Data Center Temperature Profile in Terms of a First Order Polynomial RBF Network Trained by Particle Swarm Optimization

Conferences
J. Troumbis, G. Tsekouras, C. Kalloniatis, P. Papachiou, D. Haralambopoulos
ICANN 2018 27th International Conference on Artificial Neural Networks, Věra KůrkováYannis ManolopoulosBarbara HammerLazaros IliadisIlias Maglogi-annis (eds), October 2018, Rhodes, Greece, LNCS, Volume 11140, Springer

A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness

Conferences
S. Simou, J. Troumbis, C. Kalloniatis, D. Kavroudakis, S. Gritzalis
TRUSTBUS 2018 14th International Conference on Trust, Privacy and Security, G. Pernul, S. Furnell, (eds), pp. 150-164, September 2018, Regensburg, Germany, Springer LNCS Lecture Notes in Computer Science, Springer

The use of Internet οf Things in cultural sites: A critical overview (abstract)

Conferences
D. Kavroudakis, S. Stavridis, M. Batsaris, C. Kalloniatis
CICMS 2018 1st International Conference on Cultural Informatics & Communication-Media Studies, May 2018, Kusadasi, Turkey

Smart Spatial Network Paths: The case of cultural routes (abstract)

Conferences
A. Agourogiannis, D. Kavroudakis, C. Kalloniatis
CICMS 2018 1st International Conference on Cultural Informatics & Communication-Media Studies, May 2018, Kusadasi, Turkey

The role of Social Software Engineering in the design of Privacy-Aware Infor-mation System

Conferences
A. Vgena, A. Kitsiou, D. Kavroudakis, C. Kalloniatis
CICMS 2018 1st International Conference on Cultural Informatics & Communication-Media Studies, May 2018, Kusadasi, Turkey

The role of Gamification in Cultural Informatics

Conferences
A.G. MAvroeidi, A. Kitsiou, C. Kalloniatis, S. Gritzalis
CICMS 2018 1st International Conference on Cultural Informatics & Communication-Media Studies, May 2018, Kusadasi, Turkey

Towards a Security Assurance Framework for Connected Vehicles

Conferences
P. Pantazopoulos, S. Haddad, C. Lambrinoudakis, C. Kalloniatis, K. Maliatsos, A. Kanatas, A. Varádi, M. Gay, A. Amditis
The 5th IEEE WoWMoM Workshop on Smart Vehicles: Connectivity Technologies and ITS Applications, At Chania, Greece

Efficiency and effectiveness approaches in spatial data collection of vrisa after lesvos earthquake

Conferences
D. Kavroudakis, N. Soulakellis, K. Topouzelis, S. Chatzistamatis, C. Vasilakos, A. Papakostantinou, G. Tataris, C. Kalloniatis, O. Rousou, M. Batsaris, K. Chaidas, and P. Kalaitzis
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci.

Synergistic exploitation of geoinformation methods for post-earthquake 3d mapping of vrisa traditional settlement, Lesvos island, Greece

Conferences
N. Soulakellis, S. Chatzistamatis, C. Vasilakos, G. Tataris, A. Papakonstan-tinou, D. Kavroudakis, K. Topouzelis, O. Roussou, C. Kalloniatis, E. Papado-poulou, K. Chaidas, and P. Kalaitzis
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci., XLII-3/W4, 491-498, https://doi.org/10.5194/isprs-archives-XLII-3-W4-491-2018, 2018

The role of Gender Privacy in the use of Cloud Computing Services

Conferences
P. Michalopoulou, C. Kalloniatis
PCI 2017 21st Pan-Hellenic Conference on Informatics, I. Anagnostopoulos et al., (eds), September 2017, Larisa, Greece, ACM Press

Machine Learning and Images For Malware Detection and Classification

Conferences
K. Kosmidis, C. Kalloniatis
PCI 2017 21st Pan-Hellenic Conference on Informatics, I. Anagnostopoulos et al., (eds), September 2017, Larisa, Greece, ACM Press

I have learned that I must think twice before. An educational intervention for enhancing students’ privacy awareness in FB

Conferences
M. Sideri, A. Kitsiou , E. Tzortzaki, C. Kalloniatis, S. Gritzalis
e-Democracy 2017 7th International Conference on e-Democracy, S. Katsikas, V. Zorkadis, (eds), pp. 79-95, December 2017, Athens, Greece, Springer CCIS Communications in Computer and Information Science, Vol.792

Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts

Conferences
C. Kalloniatis, D. Kavroudakis, A. Polydoropoulou, S. Gritzalis
2nd SMART-MED Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean, C. Nikolaides, (ed), September 2017, Heraklion, Greece, Springer 

Modelling Cloud Forensic-Enabled Services

Conferences
S. Simou, C. Kalloniatis, S. Gritzalis
Proceedings of the TRUSTBUS 2017 14th International Conference on Trust Privacy and Security in Digital Business, S. Fischer-Huebner, C. Lambrinoudakis, (eds), August 2017, Lyon, France, Springer LNCS Lecture Notes in Computer Science

Supporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns

Conferences
V. Diamantopoulou, N. Argyropoulos, C. Kalloniatis, S. Gritzalis
Proceedings of the IEEE RCIS 2017 11th International Conference on Research Challenges in Information Science, May 2017, Brighton, UK, IEEE Press

Supporting Privacy by Design using Privacy Process Patterns

Conferences
V. Diamantopoulou, C. Kalloniatis, S. Gritzalis, H. Mouratidis
Proceedings of the IFIP SEC 2017 32nd IFIP International Information Security Conference, S. De Capitani di Vimercati, F. Martinelli, (eds), pp. 491-505, May 2017, Rome, Italy, Springer LNCS

Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review

Conferences
A. Pattakou, C. Kalloniatis, S. Gritzalis
CLOUD COMPUTING 2017 8th International Conference on Cloud Computing, GRIDs, and Virtualization, P. Dini, (ed), February 2017, Athens, Greece, IARIA

Managing User Experience: Usability and Security in a new era of Software Supremacy

Conferences
P. Zagouras, C. Kalloniatis, S. Gritzalis
Proceedings of Human Aspects of Information Security, Privacy and Trust, HAS 2017, T. Tryfonas (ed), in the context of the 19th International Conference on Human-Computer Interaction (HCI 2017), July 2017, Vancouver, Canada, Springer LNCS Lecture Notes in Computer Science

Social media use for decision making process in educational settings: The Greek case for Leadership’s views and attitude in Secondary and Tertiary Education

Conferences
M. Sideri, A. Filippopoulou, G. Rouvalis, C. Kalloniatis, S. Gritzalis
HICSS-50 2017 Hawaii International Conference on System Sciences, pp. 2875-2884, T. Bui, R. Sprague, (eds), January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services

A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements

Conferences
N. Argyropoulos, S. Shei, C. Kalloniatis, C. Mouratidis, A. Delaney, A. Fish, S. Gritzalis
HICSS-50 2017 Hawaii International Conference on System Sciences, pp. 4827-4836, T. Bui, R. Sprague, (eds), January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services

Migrating eGovernment Services in the Cloud: A Capability Modelling Approach

Conferences
E. Gongolidis, E. Kavakli, P. Loucopoulos, C. Kalloniatis
PCI 2016 20th Pan-Hellenic Conference on Informatics, V. Verykios et al., (eds), November 2016, Patras, Greece, ACM Press

Privacy and Facebook Universities Students’ Communities for Confessions and Secrets: The Greek Case

Conferences
M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis
eDemocracy 2016 6th Inetrantional Confrence on e-Democracy- Citizen Rights in the World of the New Computing Paradigms, in S. Katsikas & A. Sideridis, (eds), Spring-er International Publishing, pp. 77-94.

Modelling Secure Cloud Computing Systems from a Security Requirements Perspective

Conferences
S. Shei, C. Kalloniatis, H. Mouratidis, A. Delaney
TrustBus 2016 13th International Conference on Trust Privacy and Security in Digital Business, S. Furnell, S. Katsikas, C. Lambrinoudakis (eds), September 2016, Porto, Portugal, Springer LNCS Lecture Notes in Computer Science.

Towards a Model-Based Framework for Forensic- Enabled Cloud Information Systems

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
TrustBus 2016 13th International Conference on Trust Privacy and Security in Digital Business, S. Furnell, S. Katsikas, C. Lambrinoudakis (eds), September 2016, Porto, Portugal, Springer LNCS Lecture Notes in Computer Science.

Reasoning about security and privacy in cloud computing under a unified meta-model

Conferences
A. Pattakou, C. Kalloniatis, S. Gritzalis
HAISA 2016 10th International Symposium on Human Aspects of Information Security & Assurance, Furnell-Clarke (eds), July 2016, Frankfurt, Germany

Incorporating Privacy Patterns into Semi-Automatic Business Process Derivation

Conferences
N. Argyropoulos, C. Kalloniatis, H. Mouratidis and A. Fish
RCIS 2016 10th International Conference on Research Challenges in Information Science

APPARATUS: Reasoning About Security Requirements in the Internet of Things

Conferences
O. Mavropoulos, H. Mouratidis, A. Fish, E. Panaousis and C. Kalloniatis
WISSE 2016 6th International Workshop on Information Systems Security Engineering, D. Rosado, (eds), June 2016, Ljubljana, Slovenia, Springer LNCS Lecture Notes in Computer Science

Designing Privacy-Aware Systems in the Cloud

Conferences
C. Kalloniatis
TrustBus 2015 12th International Conference on Trust Privacy and Security in Digital Business, S. Hubner, C. Lambrinoudakis (eds), September 2015, Valencia, Spain, Springer LNCS Lecture Notes in Computer Science

Addressing Privacy and Trust Issues in Cultural Heritage Modelling

Conferences
M. Pavlidis, H. Mouratidis, C. Gonzales-Perez, C. Kalloniatis
CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems, A. Gabillon, (ed), July 2015, Mytilene, Greece, Springer LNCS Lecture Notes in Computer Science

A Meta-model for assisting a Cloud Forensics Process

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems, A. Gabillon, (ed), July 2015, Mytilene, Greece, Springer LNCS Lecture Notes in Computer Science

Towards the development of a Cloud Forensics Methodology: A Conceptual Model

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
WISSE 2015 5th International Workshop on Information Systems Security Engineering, D. Rosado, (eds), June 2015, Stockholm, Sweden, Springer LNCS Lecture Notes in Computer Science

Towards the Design of Trustworthy Websites for Cultural Organizations: A Visitor’s perspective

Conferences
E. Kavakli, F. Bantimaroudis, C. Kalloniatis, S. Gritzalis, K. Avgeri
EMCIS 2015 12th Mediterranean and Middle Eastern Conference on Information Systems, V. Morabito, (ed), June 2015, Athens, Greece, EMCIS

Building an innovative solution for wildfire prevention and management: the “aegis” platfor

Conferences
N. Athanasis, C. Kalloniatis, M. Vaitis, C. Vasilakos, K. Kalabokidis
EMCIS 2015 12th Mediterranean and Middle Eastern Conference on Information Systems, V. Morabito, (ed), June 2015, Athens, Greece, EMCIS

Privacy-Aware Cloud Deployment Scenario Selection

Conferences
R. Meis, C. Beckers, S. Faßbender , M. Heisel, C. Kalloniatis, S. Gritzalis
TRUSTBUS ‘14 11th International Conference on Trust, Privacy and Security in Digital Business, G. Pernull, S. Katsikas (Eds.), pp. 94-105, August 2014, Munich, Germany, Springer LNCS Lecture Notes in Computer Science 8647

Cloud Forensics Solutions: A Review

Conferences
S. Simou, C. Kalloniatis, E. Kavakli, S. Gritzalis
WISSE 2014 4th International Workshop on Information Systems Security Engineering, L. Iliadis, M. Papazoglou, K. Pohl (Eds.), pp. 299-309, June 2014, Thessaloniki, Greece, Springer LNBIP 178

Cloud Forensics: Identifying the Major Issues and Challenges

Conferences
S. Simou, C. Kalloniatis, E. Kavakli, S. Gritzalis
CAiSE 2014 26th International Conference on Advanced Information Systems Engineering, M. Jarke, J. Mylopoulos, C. Quix (Eds), pp. 271-284, June 2014, Thessaloniki, Greece, Springer Lecture Notes in Computer Science 8484

Requirements identification for migrating egovernment applications to the cloud

Conferences
E. Gongolidis, C. Kalloniatis, E. Kavakli
ICT-EurAsia 2014 Information & Communication Technology-EurAsia Conference 2014, Ir. Linawati, Made Sudiana Mahendra, Erich Neuhold, A Min Tjoa, Ilsun You (Eds.), pp. 150-158, April 2014, Bali, Indonesia, Springer Lecture Notes in Computer Science LNCS 8407

Trustworthy Selection of Cloud Providers based on Security and Privacy Re-quirements: Justifying Trust Assumptions

Conferences
M. Pavlidis, H. Mouratidis, C. Kalloniatis, S. Islam, S. Gritzalis
Proceedings of the TRUSTBUS 2013 10th International Conference on Trust, Privacy and Security in Digital Business, S. Furnell, C. Lambrinoudakis, (eds), pp. 185-198, August 2013, Prague, Czech, Springer LNCS Lecture Notes in Computer Science

The role of trust for the development of cultural internet-based systems

Conferences
M. Pavlidis, E. Kavakli, F. Bantimaroudis, H. Mouratidis, C. Kalloniatis, S. Gritzalis
EMCIS 2013 European, Mediterranean, and Middle Eastern Conference on Information Systems, A. Ghoneim, M. Kamal, (Eds), October 2013, London, UK, EMCIS (Best paper Award)

Privacy in the Cloud: Bridging the Gap between Design and Implementation

Conferences
V. Manousakis, C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the WISSE 2013 3rd International Workshop on Information Systems Security Engineering, in conjunction with CAiSE 2013 25th International Conf erence on Advanced Information Systems Engineering, X. Franch and P. Soffer (Eds.), June 2013, Valencia, Spain, Springer Lecture Notes in Business Information Processing 148

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns

Conferences
C. Kalloniatis, V. Manousakis, C. Mouratidis, S. Gritzalis
Proceedings of the I3E 2013 12th IFIP Conference on e-Business, e-Services, e-Society, C. Douligeris, N. Polemi (eds.), April 2013, Piraeus, Greece, Springer

Applying soft computing technologies for implementing privacy-aware systems

Conferences
C. Kalloniatis, P. Belsis, E. Kavakli, S. Gritzalis
Proceedings of the WISSE 2012 2nd International Workshop on Information Systems Security Engineering, in conjunction with CAiSE 2012 24th International Conference on Advanced Information Systems Engineering, M. Bajec and J. Eder (Eds.), June 2012, Gdask, Poland, Springer Lecture Notes in Business Information Processing

Privacy Requirements Engineering for Trustworthy e-Government Services

Conferences
N. Vrakas, C. Kalloniatis, A.Tsohou, C. Lambrinoudakis
Proceedings of the TRUST 2010 3rd International Conference on Trust and Trustworthy Computing, pp.298-307, A. Acquisti, S. W. Smith, A.-R. Sadeghi (Eds.) June 2010, Berlin, Germany, Springer Lecture Notes in Computer Science 6101

Methods for Designing Privacy Aware Information Systems: A review

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics, pp.185-194, V. Chrysikopoulos, N. Alexandris, C. Douligeris, S. Sioutas (Eds.), September 2009, Corfu, Greece, IEEE CPS Conference Publishing Services

Search engines: gateway to a new “Panopticon”?

Conferences
E. Kosta, C. Kalloniatis, L. Mitrou, E. Kavakli
Proceedings of the TrustBus’09 6th International Conference on Trust, Privacy and Security in Digital Business, pp.11-21, S. Fischer-Huebner et al. (Eds.), September 2009, Linz, Austria, Springer Lecture Notes in Computer Science 5695

PriS Tool: A Case Tool for Privacy-Oriented RE

Conferences
C. Kalloniatis, E. Kavakli, E. Kontellis
Proceedings of the MCIS 2009 4th Mediterranean Conference on Information Systems, pp.913-925, G. Doukidis et al. (Eds.), September 2009, Athens Greece

Intelligent modification for the daltonization process of digitized paintings

Conferences
C.-N. Anagnostopoulos, G.E. Tsekouras, I. Anagnostopoulos, C. Kalloniatis
Proceedings of the ICVS 2007 5th International Conference of Computer Vision Systems, Applied Computer Science Group, March 2007, Bielefeld University, Germany

Using Privacy Process Patterns for incorporating Privacy requirements into the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the SecSE 2007 Secure Software Engineering Workshop (in conjunction with ARES 2007 The International Conference on Availability, Reliability, and Security), pp. 1009-1016, T. Skramstad et al. (Eds.), Vienna, Austria, April 2007, IEEE CPS Conference Publishing Services

Dealing with Privacy Issues during the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the ISSPIT’05 5th IEEE International Symposium on Signal Processing and Information Technology, pp.546-551, D. Serpanos et al. (Eds.), December 2005, Athens, Greece, IEEE CPS Conference Publishing Services

Addressing Privacy: Matching user Privacy Requirements with Implementation Techniques

Conferences
E. Kavakli, C. Kalloniatis, S. Gritzalis
Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, I. Lypitakis (Ed.), September 2005, Athens, Greece, LEA Publisher

A Learning Vector Quantizer Based on Fuzzy Clustering Analysis and its Use in Lossy Image Compression

Conferences
A. Samonas, C. Kalloniatis, G.E. Tsekouras
Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Math-ematics and its Applications Conference, I. Lypitakis (Ed.), September 2005, Athens, Greece, LEA Publisher

PriS Methodology: Incorporating Privacy Requirements into the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the SREIS 2005 Symposium on Requirements Engineering for Information Security, in conjunction with 13th IEEE International Requirements Engineering Conference, J. Mylopoulos, G. Spafford (Eds.) Paris, France, August 2005, IEEE CPS Conference Publishing Services

A Fuzzy Logic-Based Approach for Detecting Shifting Patterns in Cross-Cultural Data

Conferences
G.E. Tsekouras, D. Papageorgiou, S. Kotsiantis, C. Kalloniatis, P. Pintelas
Proceedings of the 18th International Conference on Innovations in Applied Artificial Intelligence, pp. 705-708, June 2005, Springer Lecture Notes in Computer Science, LNCS 3533

Analysis of Cross-Cultural Data using Hierarchical Fuzzy Logic Clustering

Conferences
G.E. Tsekouras, D. Papageorgiou, C. Kalloniatis
Proceedings of the IASTED International Conference on Artificial Intelligence and Ap-plications, International Association of Science and Technology for Development, Artificial Intelligence and Applications IASTED/ACTA Press, pp. 262-267, February 2005, Innsbruck, Austria

Security Requirements Engineering for eGovernment Applications: Analysis of Current Frameworks

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the DEXA’04 EGOV’04 3rd International Conference on Electronic Government, R. Traunmuller (Ed.), pp.66-71, September 2004, Zaragoza, Spain, Springer Lecture Notes in Computer Science LNCS 3183

A Fuzzy Clustering Algorithm for Generating Fuzzy Rules from Numerical Data

Conferences
G.E. Tsekouras, G. Pavlogeorgatos, C. Kalloniatis
Proceedings of the ISDA IEEE International Conference on Intelligent Systems Design and Applications, August 2004, Budapest, Hungary