J74. Lykou G., Mentzelioti D., Gritzalis D., "A methodology for effectively assessing Data Center sustainability", Computers & Security (Special Issue), 2018 (to appear).

J73. Stergiopoulos G., Valvis E., Anagnou-Misyris F., Bozovic N., Gritzalis D., “Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures”, ACM SIGMETRICS PER Review, Vol. 45, No. 2, pp. 119-124, 2017.

J72. Stergiopoulos G., Gritzalis D., Kotzanikolaou P., Magkos M., Lykou G., "Holistic Protection of Critical Infrastructures", Maritime Interdiction Operations Journal, Vol. 14, No. 1, pp. 29-41, 2017.

J71. Gritzalis D., Iseppi G., Mylonas A., Stavrou V., "Exiting the risk assessment maze: A meta-survey", ACM Computing Surveys, September 2017 (accepted for publication).

J70. Stergiopoulos G., Kouktzoglou V., Theocharidou M., Gritzalis D., "A process-based dependency risk analysis methodology for critical infrastructures", International Journal of Critical Infrastructures (Special Issue), April 2017 (to appear) (preprint version).

J69. Pipyros K., Thraskias C., Mitrou L., Gritzalis D., Apostolopoulos T., “A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual”, Computers & Security (Special Issue), April 2017(preprint version).

J68. Tsalis N., Mylonas A., Nisioti A., Gritzalis D., Katos V., “Exploring the protection of private browsing in desktop browsers”, Computers & Security, Vol. 67, pp. 181-197, 2017 (preprint version).

J67. Gkritzali A., Gritzalis D., Stavrou V., “Is Xenios Zeus still alive? Destination image of Athens in the years of Recession”, Journal of Travel Research, February 2017 (accepted for publication).

J66. Stergiopoulos G., Katsaros P., Gritzalis D., "Program analysis with risk-based classification of dynamic invariants for logical error detection", Computers & Security (Special Issue), Vol. 71, pp. 36-50, 2017. (preprint version).


J65. Kandias M., Gritzalis D., Stavrou V., Nikoloulis K., “Stress level detection via OSN usage pattern and chronicity analysis: Αn OSINT threat intelligence module”, Computers & Security, December 2016 (accepted for publication) (preprint version).

J64. Kandias M., Mitrou L., Stavrou V., Gritzalis D., “Profiling Online Social Networks Users as an Omniopticon Tool”, International Journal of Social Networks Mining, 2016 (to appear) (preprint version).

J63. Stergiopoulos G., Kotzanikolaou P., Theocharidou M., Lykou G., Gritzalis D., “Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures”, Ιnternational Journal of Critical Infrastructure Protection, March 2016 (to appear) (preprint version).

J62. Tsavli M., Efraimidis P., Katos V., Mitrou L., "Reengineering the user: Privacy concerns about personal data on smartphones", Information & Computer Security, Vol. 23, No. 4, pp. 394-405, 2015.

J61. Pipyros K., Mitrou L., Gritzalis D., Apostolopoulos T., "Cyberoperations and International Humanitarian Law: A review of obstacles in applying International Law rules in Cyber Warfare", Information & Computer Security, Vol. 24, No. 1, pp. 38-52, 2016 (preprint version).


J60. Andriotis P., Oikonomou G., Mylonas A., Tryfonas T., “A study on usability and security features of the Android pattern lock screen”, Information and Computer Security, 2015.

J59. Kozik R., Choras M., Flizikowski A., Theocharidou M., Rosato V., Rome E., Advanced services for critical infrastructures protection, Journal of Ambient Intelligence and Humanized Computing, Springer, Vol. 6, Issue 6, pp. 783-795, December 2015.

J58. Stergiopoulos G., Kotzanikolaou P., Theoharidou M., Gritzalis D., "Risk mitigation strategies for Critical Infrastructures based on graph centrality analysis", International Journal of Critical Infrastructure Protection, Vol. 10, pp. 34-44, September 2015 (preprint version).

J57. Virvilis N., Tsalis N., Mylonas A., Gritzalis D., “Security Busters: Web browser secu­ri­­­ty vs. suspicious sites”, Computers & Security, Vol. 52, pp. 90-105, July 2015 (preprint version).

J56. Ntalampiras S., Soupionis Y., Giannopoulos G., “A Fault Diagnosis System For Interdependent Critical Infrastructures Based On HMMs”, Reliability Engineering and System Safety, 2015.  


J55. Marangos N., Rizomiliotis P., Mitrou L., "Time synchronization: Pivotal element in Cloud Forensics", Security and Communication Networks, 2014 (to appear).

J54. Katos V., Psaroudakis I., Saragiotis P., Mitrou L., "A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description Protocol (SDP)", International Journal of Electronic Security and Digital Forensics, 2014 (to appear).

J53. Virvilis N., Serrano O., Dandurand L., "Big Data analytics for sophisticated attack detection", ISACA Journal, Vol. 3, 2014 (to appear).

J52. Soupionis Y., Koutsiamanis A.-R., Efraimidis P., Gritzalis D., “A game-theoretic analysis of preventing spam over Internet Τelephony with audio CAPTCHA-based authentication”, Journal of Computer Security, Vol. 22, pp. 383-413, 2014.


J51. Mylonas A., Meletiadis V., Mitrou L., Gritzalis D., “Smartphone sensor data as digital evidence”, Computers & Security (Special Issue: Cybercrime in the Digital Economy), Vol. 38, pp. 51-75, October 2013.

J50. Kotzanikolaou P., Theoharidou M., Gritzalis D., "Accessing n-order dependencies between critical infrastructures", International Journal of Critical Infrastructures, Vol. 9, Nos. 1-2, pp. 93-110, 2013.

J49. Mylonas A., Kastania A., Gritzalis D., “Delegate the smartphone user? Security awareness in smartphone platforms”, Computers & Security, Vol. 34, pp. 47-66, May 2013.


J48. Tsiakis T., Katsaros P., Gritzalis D., “Externality cost assessment for interactive audio me­­dia protection of Internet services”, Journal of Electronic Security & Digital Foren­sics, Vol. 4, Nos. 2/3, pp. 164-177, 2012.

J47. Gritzalis D., Katsaros P., Basagiannis S., Soupionis Y., “Formal analysis for robust anti-SPIT protection using model-checking”, International Journal of Information Security, Vol. 11, No. 2, pp. 121-135, 2012.


J46. Theoharidou M., Kotzanikolaou P., Gritzalis D., “Risk assessment methodology for interdependent critical infrastructures”, International Journal of Risk Assessment and Management (Special Issue on Risk Analysis of Critical Infrastructures), Vol. 15, Nos. 2/3, pp. 128-148, 2011.

J45. Gritzalis D., Marias G., Rebahi Y., Soupionis Y., Ehlert S., “SPIDER: A platform for ma­­na­­ging SIP-based spam over Internet Telephony”, Journal of Computer Security, Vol. 19, No. 5, pp. 835-867, 2011.


J44. Lekkas D., Gritzalis D., “e-Passports as a means towards a globally interoperable Public Key Infrastructure”, Journal of Computer Security, Vol. 18, No. 3, pp. 379-396, 2010.

J43. Soupionis Y., Gritzalis D., “Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony”, Computers & Security, Vol. 29, Νο. 5, pp. 603-618, 2010.

J42. Theoharidou M., Kotzanikolaou P., Gritzalis D., “A multi-layer Criticality Assessment methodology based on interdependencies”, Computers & Security, Vol. 29, No. 6, pp. 643-658, 2010. 


J41. Stamatiou P., Gritzalis D., "Countering Unsolicited Calls in the Internet Telephony: An anti-SPIT Architecture", Hellenic Open University Journal of Informatics, Vol. 2, No. 1, pp. 49-63, 2009.

J40. Dritsas S., Tsoumas B., Dritsou V., Konstantopoulos P., Gritzalis D., "OntoSPIT: SPIT Management through Ontologies", Computer Communications, Vol. 32, No. 2, pp. 203-212, 2009.


J39. Theoharidou M., Xidara D., Gritzalis D., "A Common Body of Knowledge for Information Security and Critical Information and Communication Infrastructure Protection", International Journal of Critical Infrastructure Protection, Vol. 1, No. 1, pp. 81-96, 2008.

J38. Gritzalis D., Mallios Y., "A SIP-based SPIT management framework", Computers & Security, 2008, Vol. 27, Nos. 5-6, pp.136-153, October 2008.


J37. Theoharidou M., Gritzalis D., "A Common Body of Knowledge for Information Security", IEEE Security & Privacy, Vol. 4, No. 2, pp. 64-67, March/April 2007. 


J36. Lekkas D., Gritzalis D., "Long-term verifiability of healthcare records authenticity", International Journal of Medical Informatics, Vol. 76, Issue 5-6, pp. 442-448, 2006.

J35. Dritsas S., Gritzalis D., Lambrinoudakis C., "Protecting privacy and anonymity in pervasive computing trends and perspectives", Telematics and Informatics Journal, Special Issue on Privacy and Anonymity in the Global Village, Vol. 23, No. 3, pp.196-210, 2006, Elsevier Science.

J34. A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, "Formulating Information Systems Risk Management Strategies through Cultural Theory", Information Management and Computer Security, Vol. 14, No. 3, pp. 198-217, 2006, Emerald.

J33. L. Kazatzopoulos, C. Delakouridis, G. F. Marias, P. Georgiadis, "ISSON: An Incentive-based Architecture to Enable Privacy in Dynamic Environments," Emerald, Internet Research Journal, Special Issue Privacy and Anonymity in the Digital Era: Theory, Technologies, and Practice, Vol. 16 No. 2, 2006, pp. 170-188.

J32. G. F. Marias, D. Flitzanis, and K. Mandalas, "Cooperation Enforcement Schemes for MANETs: A Survey," Wiley's Journal of Wireless Communications and Mobile Computing (WCMC), Special Issue on Wireless Networks Security, Vol.6, Issue 3, pp. 319-332, 2006.

J31. G. F. Marias, L. Kazatzopoulos, C. Delakouridis, P. Georgiadis, "Applying Privacy on the Dis­semination of Location Information," Elsevier Telematics and Informatics Journal, Special Issue "Privacy and Anonymity in the Global Village", Vol.23, No.3, pp. 211-219, Aug. 2006 


J30. Karyda M., Kiountouzis E., Kokolakis S., "Information systems security: A contextual perspective", Computers & Security, Vol. 24, no. 3, pp.246-260, 2005.

J29. Theoharidou M., Kokolakis S., Karyda M., Kiountouzis E., "The insider threat to Information Systems and the effectiveness of ISO 17799" , Computers & Security, Vol. 24, no. 6, pp. 472-484, 2005.


J28. Gritzalis D., "Embedding privacy in IT applications development", Information Management and Computer Security Journal, Vol. 12, no. 1, pp. 8-26, MCB University Press, 2004.

J27. Gritzalis D., Lambrinoudakis C., "A Security Architecture for Interconnecting Health Information Systems", International Journal of Medical Informatics, Vol. 73, pp. 305-9, 2004.

J26. Lekkas D., Gritzalis D., Cumulative Notarization for Long-term Preservation of Digital Signatures, Computers & Security, Vol. 23, no. 5, pp. 413-424, 2004.

J25. Moulinos K., Iliadis J., Tsoumas V., "Towards secure sealing of privacy policies", Information Management & Computer Security , Vol. 12 , No. 4, pp. 350-360, 2004.


J24. Iliadis J., Gritzalis S., Gritzalis D., "ADoCSI: A transparent mechanism for disseminating Certificate Status Information", Computer Communications ,Vol. 26, No. 16, pp. 1851-1862, October 2003.

J23. Iliadis J., Gritzalis S., Spinellis D., De Cock D., Preneel B., Gritzalis D., "Towards a framework for evaluating Certificate Status Information mechanism", Computer Communications, Vol.26, No.16, pp. 1839-1850, October 2003.


J22. Gritzalis D., "Principles and requirements for a secure e-voting system", Computers & Security, Vol. 21, No. 6, pp. 539-556, 2002.

J21. Spinellis D., Gritzalis D., " PANOPTIS: Intrusion detection using process accounting records", Journal of Computer Security, Vol. 10, No. 2, pp. 159-176, IOS Press, 2002.

J20. Spinellis D., Moulinos K., Iliadis J., Gritzalis S., Gritzalis D., Katsikas S., "Deploying a secure cyberbazaar by adding trust to commercial applications", eJournal for Electronic Commerce Tools and Applications, Vol. 1, Νο . 2, November 2002. 


J19. Gritzalis S., Gritzalis D., "A digital seal solution for deploying trust on commercial transactions", Information Management and Computer Security Journal, MCB University Press, Vol. 9, No. 2, pp. 71-79, March 2001.

J18. Gritzalis S., Gritzalis D., Moulinos K., Iliadis J., "An integrated architecture for deploying a vir­tual private medical network over the Web", Medical Informatics Journal, Vol. 26, No.1, pp. 49-72, March 2001, Cambridge University Press.


J17. Gritzalis D., Lambrinoudakis C., "A data protection scheme for a remote vital signs monitoring service", Medical Informatics Journal, Vol. 25, No. 2, pp. 207-224, Taylor & Francis, July 2000.

J16. Gritzalis S., Katsikas S., Lekkas D., Moulinos K., Polydorou E., "Securing the electronic market:The KEYSTONE Public Key Infrastructure architecture",Computers & Security, Vol. 19, No 8, p. 731-746, 2000. 


J15. Gritzalis S., Iliadis J., Gritzalis D., Spinellis D., Katsikas S., "Developing secure web-based medical applications", Medical Informatics, Vol. 24, No. 1, pp. 75-90, 1999.

J14. Kokolakis S., Gritzalis D., Katsikas S., "Generic Security Policies for Healthcare Information Systems", Health Informatics Journal, Vol. 4, No. 3 . 4, pp. 142-159, 1999.

J13. Spinellis D., Gritzalis S., Iliadis J., Gritzalis D., Katsikas S., "Trusted Third Party services for deploying secure telemedical applications over the WWW", Computers & Security , Vol. 18, No. 7, pp. 627-639, 1999.


J12. Gritzalis D., "Enhancing security and improving interoperability in healthcare information systems" , Medical Informatics , Vol. 23, No. 4, pp. 309-324, 1998.


J11. Gritzalis D., "A baseline security policy for distributed healthcare information systems", Computers & Security, Vol. 16, No. 8, pp. 709-719, 1997. 


J10. Gritzalis D., Katsikas S., "Towards a formal system to system authentication protocol", Computer Communications , Vol. 19, No. 8, pp. 954-961, 1996.

J09. Katsikas S., Spyrou T., Gritzalis D., Darzentas J., "Model for network behaviour under viral attack", Computer Communications, Vol. 19, No. 2, pp. 124-132, 1996.


J08. Doumas A., Mavroudakis K., Gritzalis D., Katsikas S., "Design of a neural network for recognition and classification of computer viruses", Computers & Security,Vol. 14, No. 5, pp. 435-448, October 1995.


J07. Denault M., Gritzalis D., Karagiannis D., Spirakis P., "Intrusion detection: Evaluation and performance issues of the SECURENET system", Computers & Security,Vol. 13, No. 6, pp. 495-508, October 1994.

J06. Katsikas S., Gritzalis D., "The need for a security policy in Health Care Institutions", Journal of Biomedical Computing, Vol. 35, pp. 73-80, 1994. 


J05. Gritzalis D., Katsikas S., Gritzalis S., "A zero-knowledge probabilistic login protocol", Computers & Security, Vol. 11, No. 8, pp. 733-745, December 1992.

J04 .Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Determining access rights in medical information systems", Computers & Security, Vol. 11, No. 2, pp. 149-162, April 1992.


J03. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Data security in medical information systems: Technical aspects of a proposed legislation", Medical Informatics, Vol. 16, No. 4, pp. 371-383, September 1991.

J02. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Data security in medical information systems: The Greek case", Computers & Security, Vol. 10, No. 2, pp. 141-159, April 1991.


J01. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Medical data protection: A proposal for a deontology code", Medical Systems Journal, Vol. 14, No. 6, pp. 375-386, December 1990 (also in: Berleur J.J., Brunnstein K. (Eds.), Ethics of Computing, Chapman & Hall, February 1997 (2nd edition)).