J101. E. Vasilellis, V. Botsos, A. Anagnostopoulou, D. Gritzalis, "Gaming the system: Tetromino-based covert channels and their impact on mobile security", International Journal of Information Security, Springer, June 2024 (to appear)

J100. Leventopoulos S., Pipyros K., Gritzalis D., "Retaliating cyberattacks: A decision-taking framework for policy-makers and International and Cybersecurity Law enforcers", International Cybersecurity Law Review, February 2024.


J99. Gounari M., Stergiopoulos G., Pipyros K., Gritzalis D., “Harmonizing open banking in the European Union: An analysis of PSD2 compliance and interrelation with cybersecurity frameworks & standards”, International Cybersecurity Law Review, Vol. 5, pp. 79-120, January 2024.

J98. Tsinganos N., Fouliras P., Mavridis I., Gritzalis D., "CSE-ARS: Deep learning-based late fusion of multimodal information for chat-based social engineering attack recognition", IEEE Access, January 2024 (to appear).

J97. Allen A., Mylonas A., Vidalis S., Gritzalis D., "Smart homes under siege: Assessing the robustness of physical security against wireless networks attacks", Computers & Security, Vol. 139, pp. 103687, April 2024.

J96.  Dedousis P., Stergiopoulos G., Arampatzis G., Gritzalis D., “Enhancing Operational Resilience of Critical Infrastructure Processes through Chaos Engineering”, IEEE Access, Vol. 11, pp. 106172-89, September 2023.

J95. Adamos K., Stergiopoulos G., Karamousadakis M., Gritzalis D., "Enhancing attack resilience of Cyber-Physical Systems through state dependency graph models", International Journal of Information Security, Vol. 22, July 2023.

J94. Katsantonis Μ., Manikas Α., Mavridis Ι., Gritzalis D., "Cyber Range Design Framework for Cyber Security Education and Training", International Journal of Information Security, Vol. 22, pp. 1005-27, March 2023.

J93. Dimitriadis Α., Lontzetidis Ε., Kulvatunyou Β., Ivezic Ν., Gritzalis D., Mavridis I., "Fronesis: Digital forensics-based early detection of ongoing cyber-attacks", ΙEEE Access, Vol. 11, pp. 728-43, January 2023.


J92. Tsigganos N., Mavridis I., Gritzalis D., "Utilizing convolutional neural networks and word embeddings for early-stage recognition of persuasion in chat-based social engineering attacks", ΙEEE Access, Vol. 10, pp. 108517-29, October 2022.

J91. Lygerou I., Srinivasa S., Vasilomanolakis E., Stergiopoulos G., Gritzalis D., "A decentralized honeypot for IoT Protocols based on Android devices", Ιnternational Journal of Information Security, Vol. 21, pp. 1211-21, December 2022.

J90. Stergiopoulos G., Dedousis P., Gritzalis D. "Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0", International Journal of Information Security, Vol. 21, pp. 37-59, February 2022.


J89. Dedousis P., Stergiopoulos G., Arampatzis G., Gritzalis D., "A security-aware framework for designing industrial engineering processes", IEEE Access, Vol. 9, pp. 163065-85, December 2021.

J88. Xarhoulacos C.-G., Anagnostopoulou A., Stergiopoulos G., Gritzalis D., "Misinformation vs. situational awareness: The art of deception and the need for cross-domain detection", Sensors (Special Issue: Cyber Situational Awareness in Computer Networks), Vol. 21(16), pp. 5496, 2021.

J87. Iakovakis G., Xarhoulacos C.-G, Giovas K., Gritzalis D., "Analysis and classification of mitigation tools against cyber-attacks in the COVID-19 era", Security & Communication Networks (Special Issue: Advances in Cyber Threat Intelligence), Vol. 2021, No. 3187205, August 2021.

J86. Dimitriadis A., Prassas C., Flores J.-L., Kulvatunyou B., Ivezic N., Gritzalis D., Mavridis I., "Contextualized Filtering for Shared Cyber Threat Information", Sensors (Special Issue: Cyber Situational Awareness in Computer Networks), Vol. 21(14), pp. 4890, 2021.

J85. Katsantonis M., Mavridis I., Gritzalis D., "Design and Evaluation of COFELET-based approaches for cyber security learning and training", Computers & Security, Vol. 105 (102263), June 2021.

J84. Stergiopoulos G., Gritzalis D., Anagnostopoulou A., Vasilellis E., "Dropping malware through sound injection: A comparative analysis on Android operating systems", Computers & Security, Vol. 105 (102228), June 2021.


J83. Lykou G., Dedousis P., Stergiopoulos G., Gritzalis D., "Assessing Interdependencies and Congestion Delays in the Aviation Network", IEEE Access, Vol. 8, pp. 223234-54, December 2020.

J82. Stergiopoulos G., Gritzalis D., Limnaios E., "Cyber-attacks on the Oil & Gas sector: A survey on incident assessment and attack patterns", IEEE Access, Vol. 8, pp. 128440-128475, July 2020. 

J81. Lykou G., Moustakas D., Gritzalis D., "Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies", Sensors, Vol. 20 (3537), June 2020. 

J80. Stergiopoulos G., Dedousis P., Gritzalis D., "Automatic network restructuring and risk mitigation through business process asset dependency analysis", Computers and Security, Vol. 96 (101869), October 2020.


J79. Stergiopoulos G., Chronopoulou G., Bitsikas E., Tsalis N., Gritzalis D., “Using side channel TCP features for real-time detection of malware connections”, Journal of Computer Security, Vol. 27, no. 5, pp. 507-520, September 2019.

J78. Stergiopoulos G., Kapetanas N., Vasilellis E., Gritzalis D., "Leaking SCADA commands over unpadded TCP/IP encryption through differential packet size analysis", Security & Privacy, Volume 3, No. 4, 2019. 

J77. Lykou G., Anagnostopoulou A., Gritzalis D., "Smart Airports Cybersecurity: Threat Mitigation and Cyber Resilience", Sensors, 19, 19, pp. 1-27, January 2019.


J76. Stergiopoulos G., Valvis E., Mitrodimas D., Lekkas D., Gritzalis D., "Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure." IEEE Access, Vol. 6, pp. 63823-63832, December 2018.

J75. Stergiopoulos, G., Gritzalis D., Kouktzoglou V., "Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment." Computer Networks, Vol. 134, pp. 23-45, 2018.

J74. Lykou, G., Mentzelioti, D., Gritzalis, D., "A new methodology toward effectively assessing data center sustainability." Computers & Security (Special Issue), Vol. 76, pp. 327-340, 2018.

J73. Gkritzali A., Gritzalis D., Stavrou V., “Is Xenios Zeus still alive? Destination image of Athens in the years of Recession”, Journal of Travel Research, Vol. 57, No. 4, pp. 540-554, April 2018.

J72. Gritzalis D., Iseppi G., Mylonas A., Stavrou V., "Exiting the risk assessment maze: A meta-survey", ACM Computing Surveys, Vol. 51, No. 1, pp. 11.1-11.30, January 2018.

J71. Pipyros K., Thraskias C., Mitrou L., Gritzalis D., Apostolopoulos T., “A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual”, Computers & Security (Special Issue), Vol. 74, pp. 371-383, 2018 (preprint version). 


J70. Stergiopoulos G., Valvis E., Anagnou-Misyris F., Bozovic N., Gritzalis D., “Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures”, ACM SIGMETRICS PER Review, Vol. 45, No. 2, pp. 119-124, 2017.

J69. Stergiopoulos G., Gritzalis D., Kotzanikolaou P., Magkos M., Lykou G., "Holistic Protection of Critical Infrastructures", Maritime Interdiction Operations Journal, Vol. 14, No. 1, pp. 29-41, 2017.

J68. Stergiopoulos G., Kouktzoglou V., Theocharidou M., Gritzalis D., "A process-based dependency risk analysis methodology for critical infrastructures", International Journal of Critical Infrastructures, Vol. 13,  No. 2/3, pp. 184-205, 2017. 

J67. Tsalis N., Mylonas A., Nisioti A., Gritzalis D., Katos V., “Exploring the protection of private browsing in desktop browsers”, Computers & Security, Vol. 67, pp. 181-197, 2017 (preprint version).

J66. Stergiopoulos G., Katsaros P., Gritzalis D., "Program analysis with risk-based classification of dynamic invariants for logical error detection", Computers & Security (Special Issue), Vol. 71, pp. 36-50, 2017 (preprint version).

J65. Kandias M., Mitrou L, Stavrou V., Gritzalis D., “Profiling Online Social Networks users: An Omniopticon tool”, International Journal of Social Media Mining, Vol. 2, No. 4, pp. 293-313, 2017.

J64. Kandias M., Gritzalis D., Stavrou V., Nikoloulis K., “Stress level detection via OSN usage pattern and chronicity analysis: Αn OSINT threat intelligence module”, Computers & Security (Special Issue), Vol. 69, pp. 3-17, 2017 (preprint version).


J63. Stergiopoulos G., Kotzanikolaou P., Theocharidou M., Lykou G., Gritzalis D., “Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures”, Ιnternational Journal of Critical Infrastructure Protection, Vol. 12,  pp. 46-60, March 2016.  

J62. Tsavli M., Efraimidis P., Katos V., Mitrou L., "Reengineering the user: Privacy concerns about personal data on smartphones", Information & Computer Security, Vol. 23, No. 4, pp. 394-405, 2015.

J61. Pipyros K., Mitrou L., Gritzalis D., Apostolopoulos T., "Cyberoperations and International Humanitarian Law: A review of obstacles in applying International Law rules in Cyber Warfare", Information & Computer Security, Vol. 24, No. 1, pp. 38-52, 2016 (preprint version).


J60. Andriotis P., Oikonomou G., Mylonas A., Tryfonas T., “A study on usability and security features of the Android pattern lock screen”, Information and Computer Security, 2015.

J59. Kozik R., Choras M., Flizikowski A., Theocharidou M., Rosato V., Rome E., Advanced services for critical infrastructures protection, Journal of Ambient Intelligence and Humanized Computing, Springer, Vol. 6, Issue 6, pp. 783-795, December 2015.

J58. Stergiopoulos G., Kotzanikolaou P., Theoharidou M., Gritzalis D., "Risk mitigation strategies for Critical Infrastructures based on graph centrality analysis", International Journal of Critical Infrastructure Protection, Vol. 10, pp. 34-44, September 2015. 

J57. Virvilis N., Tsalis N., Mylonas A., Gritzalis D., “Security Busters: Web browser secu­ri­­­ty vs. suspicious sites”, Computers & Security, Vol. 52, pp. 90-105, July 2015 (preprint version).

J56. Ntalampiras S., Soupionis Y., Giannopoulos G., “A Fault Diagnosis System For Interdependent Critical Infrastructures Based On HMMs”, Reliability Engineering and System Safety, 2015.  


J55. Marangos N., Rizomiliotis P., Mitrou L., "Time synchronization: Pivotal element in Cloud Forensics", Security and Communication Networks, Vol. 9, No. 6, pp. 571-582, 2014.

J54. Katos V., Psaroudakis I., Saragiotis P., Mitrou L., "A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description Protocol (SDP)", International Journal of Electronic Security and Digital Forensics, Vol. 6, No. 4, 2014. 

J53. Virvilis N., Serrano O., Dandurand L., "Big Data analytics for sophisticated attack detection", ISACA Journal, Vol. 3, 2014.

J52. Soupionis Y., Koutsiamanis A.-R., Efraimidis P., Gritzalis D., “A game-theoretic analysis of preventing spam over Internet Τelephony with audio CAPTCHA-based authentication”, Journal of Computer Security, Vol. 22, No. 3, pp. 383-413, 2014.


J51. Mylonas A., Meletiadis V., Mitrou L., Gritzalis D., “Smartphone sensor data as digital evidence”, Computers & Security (Special Issue: Cybercrime in the Digital Economy), Vol. 38, pp. 51-75, October 2013.

J50. Kotzanikolaou P., Theoharidou M., Gritzalis D., "Accessing n-order dependencies between critical infrastructures", International Journal of Critical Infrastructures, Vol. 9, Nos. 1-2, pp. 93-110, 2013.

J49. Mylonas A., Kastania A., Gritzalis D., “Delegate the smartphone user? Security awareness in smartphone platforms”, Computers & Security, Vol. 34, pp. 47-66, May 2013.


J48. Tsiakis T., Katsaros P., Gritzalis D., “Economic assessment for externalities for interactive audio me­­dia anti-SPIT protection of Internet services”, International Journal of Electronic Security & Digital Foren­sics, Vol. 4, Nos. 2/3, pp. 164-177, 2012.

J47. Gritzalis D., Katsaros P., Basagiannis S., Soupionis Y., “Formal analysis for robust anti-SPIT protection using model-checking”, International Journal of Information Security, Vol. 11, No. 2, pp. 121-135, 2012.


J46. Theoharidou M., Kotzanikolaou P., Gritzalis D., “Risk assessment methodology for interdependent critical infrastructures”, International Journal of Risk Assessment and Management (Special Issue on Risk Analysis of Critical Infrastructures), Vol. 15, Nos. 2/3, pp. 128-148, 2011.

J45. Gritzalis D., Marias G., Rebahi Y., Soupionis Y., Ehlert S., “SPIDER: A platform for ma­­na­­ging SIP-based spam over Internet Telephony”, Journal of Computer Security, Vol. 19, No. 5, pp. 835-867, 2011.


J44. Lekkas D., Gritzalis D., “e-Passports as a means towards a globally interoperable Public Key Infrastructure”, Journal of Computer Security, Vol. 18, No. 3, pp. 379-396, 2010.

J43. Soupionis Y., Gritzalis D., “Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony”, Computers & Security, Vol. 29, Νο. 5, pp. 603-618, 2010.

J42. Theoharidou M., Kotzanikolaou P., Gritzalis D., “A multi-layer Criticality Assessment methodology based on interdependencies”, Computers & Security, Vol. 29, No. 6, pp. 643-658, 2010. 


J41. Stamatiou P., Gritzalis D., "Countering Unsolicited Calls in the Internet Telephony: An anti-SPIT Architecture", Hellenic Open University Journal of Informatics, Vol. 2, No. 1, pp. 49-63, 2009.

J40. Dritsas S., Tsoumas B., Dritsou V., Konstantopoulos P., Gritzalis D., "OntoSPIT: SPIT Management through Ontologies", Computer Communications, Vol. 32, No. 2, pp. 203-212, 2009.


J39. Theoharidou M., Xidara D., Gritzalis D., "A Common Body of Knowledge for Information Security and Critical Information and Communication Infrastructure Protection", International Journal of Critical Infrastructure Protection, Vol. 1, No. 1, pp. 81-96, 2008.

J38. Gritzalis D., Mallios Y., "A SIP-oriented SPIT management framework", Computers & Security, Vol. 27, Nos. 5-6, pp.136-153, October 2008.


J37. Theoharidou M., Gritzalis D., "A Common Body of Knowledge for Information Security", IEEE Security & Privacy, Vol. 4, No. 2, pp. 64-67, March/April 2007. 


J36. Lekkas D., Gritzalis D., "Long-term verifiability of healthcare records authenticity", International Journal of Medical Informatics, Vol. 76, Issue 5-6, pp. 442-448, 2006.

J35. Dritsas S., Gritzalis D., Lambrinoudakis C., "Protecting privacy and anonymity in pervasive computing: trends and perspectives", Telematics and Informatics, Vol. 23, No. 3, pp. 196-210, 2006.

J34. A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, "Formulating Information Systems Risk Management Strategies through Cultural Theory", Information Management and Computer Security, Vol. 14, No. 3, pp. 198-217, 2006, Emerald.

J33. L. Kazatzopoulos, C. Delakouridis, G. F. Marias, P. Georgiadis, "ISSON: An Incentive-based Architecture to Enable Privacy in Dynamic Environments," Emerald, Internet Research Journal, Special Issue Privacy and Anonymity in the Digital Era: Theory, Technologies, and Practice, Vol. 16 No. 2, 2006, pp. 170-188.

J32. G. F. Marias, D. Flitzanis, and K. Mandalas, "Cooperation Enforcement Schemes for MANETs: A Survey," Wiley's Journal of Wireless Communications and Mobile Computing (WCMC), Special Issue on Wireless Networks Security, Vol.6, Issue 3, pp. 319-332, 2006.

J31. G. F. Marias, L. Kazatzopoulos, C. Delakouridis, P. Georgiadis, "Applying Privacy on the Dis­semination of Location Information," Elsevier Telematics and Informatics Journal, Special Issue "Privacy and Anonymity in the Global Village", Vol.23, No.3, pp. 211-219, Aug. 2006 


J30. Karyda M., Kiountouzis E., Kokolakis S., "Information systems security: A contextual perspective", Computers & Security, Vol. 24, no. 3, pp.246-260, 2005.

J29. Theoharidou M., Kokolakis S., Karyda M., Kiountouzis E., "The insider threat to Information Systems and the effectiveness of ISO 17799" , Computers & Security, Vol. 24, no. 6, pp. 472-484, 2005.


J28. Gritzalis D., "Embedding privacy in IT applications development", Information Management and Computer Security Journal, Vol. 12, No. 1, pp. 8-26, MCB University Press, 2004.

J27. Gritzalis D., Lambrinoudakis C., "A Security Architecture for Interconnecting Health Information Systems", International Journal of Medical Informatics, Vol. 73, pp. 305-9, 2004.

J26. Lekkas D., Gritzalis D., Cumulative Notarization for Long-term Preservation of Digital Signatures, Computers & Security, Vol. 23, No. 5, pp. 413-424, 2004.

J25. Moulinos K., Iliadis J., Tsoumas V., "Towards secure sealing of privacy policies", Information Management & Computer Security , Vol. 12 , No. 4, pp. 350-360, 2004.


J24. Iliadis J., Gritzalis S., Gritzalis D., "ADoCSI: A transparent mechanism for disseminating Certificate Status Information", Computer Communications, Vol. 26, No. 16, pp. 1851-1862, October 2003.

J23. Iliadis J., Gritzalis S., Spinellis D., de Cock D., Preneel B., Gritzalis D., "Towards a framework for evaluating Certificate Status Information mechanism", Computer Communications, Vol.26, No.16, pp. 1839-1850, October 2003.


J22. Gritzalis D., "Principles and requirements for a secure e-voting system", Computers & Security, Vol. 21, No. 6, pp. 539-556, 2002.

J21. Spinellis D., Gritzalis D., " PANOPTIS: Intrusion detection using process accounting records", Journal of Computer Security, Vol. 10, No. 2, pp. 159-176, IOS Press, 2002.

J20. Spinellis D., Moulinos K., Iliadis J., Gritzalis D., Gritzalis S., Katsikas S., "Deploying a secure cyberbazaar by adding trust to commercial applications", eJournal for Electronic Commerce Tools and Applications, Vol. 1, Νο . 2, November 2002. 


J19. Gritzalis S., Gritzalis D., "A digital seal solution for deploying trust on commercial transactions", Information Management and Computer Security Journal, Vol. 9, No. 2, pp. 71-79, MCB University Press, March 2001.

J18. Gritzalis S., Gritzalis D., Moulinos K., Iliadis J., "An integrated architecture for deploying a vir­tual private medical network over the Web", Medical Informatics Journal, Vol. 26, No.1, pp. 49-72, Cambridge University Press, March 2001.


J17. Gritzalis D., Lambrinoudakis C., "A data protection scheme for a remote vital signs monitoring healthcare service", Medical Informatics Journal, Vol. 25, No. 2, pp. 207-224, Taylor & Francis, July 2000.

J16. Gritzalis S., Katsikas S., Lekkas D., Moulinos K., Polydorou E., "Securing the electronic market:The KEYSTONE Public Key Infrastructure architecture",Computers & Security, Vol. 19, No 8, p. 731-746, 2000. 


J15. Gritzalis S., Iliadis J., Gritzalis D., Spinellis D., Katsikas S., "Developing secure web-based medical applications", Medical Informatics, Vol. 24, No. 1, pp. 75-90, 1999.

J14. Kokolakis S., Gritzalis D., Katsikas S., "Generic Security Policies for Healthcare Information Systems", Health Informatics Journal, Vol. 4, No. 4.3/4.4, pp. 142-159, 1999.

J13. Spinellis D., Gritzalis S., Iliadis J., Gritzalis D., Katsikas S., "Trusted Third Party services for deploying secure telemedical applications over the WWW", Computers & Security , Vol. 18, No. 7, pp. 627-639, 1999.


J12. Gritzalis D., "Enhancing security and improving interoperability in healthcare information systems", Medical Informatics , Vol. 23, No. 4, pp. 309-324, 1998.


J11. Gritzalis D., "A baseline security policy for distributed healthcare information systems", Computers & Security, Vol. 16, No. 8, pp. 709-719, 1997. 


J10. Gritzalis D., Katsikas S., "Towards a formal system-to-system authentication protocol", Computer Communications, Vol. 19, No. 8, pp. 954-961, 1996.

J09. Katsikas S., Spyrou T., Gritzalis D., Darzentas J., "Model for network behaviour under viral attack", Computer Communications, Vol. 19, No. 2, pp. 124-132, 1996.


J08. Doumas A., Mavroudakis K., Gritzalis D., Katsikas S., "Design of a neural network for recognition and classification of computer viruses", Computers & Security, Vol. 14, No. 5, pp. 435-448, October 1995.


J07. Denault M., Gritzalis D., Karagiannis D., Spirakis P., "Intrusion detection: Evaluation and performance issues of the SECURENET system", Computers & Security, Vol. 13, No. 6, pp. 495-508, October 1994.

J06. Katsikas S., Gritzalis D., "The need for a security policy in Health Care Institutions", Journal of Biomedical Computing, Vol. 35, pp. 73-80, 1994. 


J05. Gritzalis D., Katsikas S., Gritzalis S., "A zero-knowledge probabilistic login protocol", Computers & Security, Vol. 11, No. 8, pp. 733-745, December 1992.

J04 .Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Determining access rights in medical information systems", Computers & Security, Vol. 11, No. 2, pp. 149-162, April 1992.


J03. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Data security in medical information systems: Technical aspects of a proposed legislation", Medical Informatics, Vol. 16, No. 4, pp. 371-383, September 1991.

J02. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Data security in medical information systems: The Greek case", Computers & Security, Vol. 10, No. 2, pp. 141-159, April 1991.


J01. Gritzalis D., Katsikas S., Keklikoglou J., Tomaras A., "Medical data protection: A proposal for a deontology code", Medical Systems Journal, Vol. 14, No. 6, pp. 375-386, December 1990 (also in: Berleur J., Brunnstein K. (Eds.), Ethics of Computing, Chapman & Hall, United Kingdom, February 1997 (2nd edition)).