Gritzalis, Dimitris.
Overview
| Works: | 0 works in 5 publications in 1 languages | |
|---|---|---|
Titles
Critical infrastructure security and resiliencetheories, methods, tools and technologies /
by:
Gritzalis, Dimitris.; SpringerLink (Online service); Stergiopoulos, George.; Theocharidou, Marianthi.
(Electronic resources)
Information security practice and experience17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022 : proceedings /
by:
(1998 :); Gritzalis, Dimitris.; Piuri, Vincenzo.; SpringerLink (Online service); Su, Chunhua.
(Electronic resources)
Cryptology and network security13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014 : proceedings /
by:
(1998 :); Askoxylakis, Ioannis.; Gritzalis, Dimitris.; Kiayias, Aggelos.; SpringerLink (Online service)
(Electronic resources)
Information security and privacy research27th IFIP TC 11 information security and privacy conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012 : proceedings /
by:
(1998 :); Furnell, Steven.; Gritzalis, Dimitris.; SpringerLink (Online service); Theoharidou, Marianthi.
(Electronic resources)
Malwarehandbook of prevention and detection /
by:
Choo, Kim-Kwang Raymond.; Gritzalis, Dimitris.; Patsakis, Constantinos.; SpringerLink (Online service)
(Electronic resources)
Computer security - ESORICS 201015th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, proceedings /
by:
(1998 :); Gritzalis, Dimitris.; Preneel, Bart.; SpringerLink (Online service); Theoharidou, Marianthi.
(Electronic resources)
Emerging challenges for security, privacy and trust24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings /
by:
(1998 :); Gritzalis, Dimitris.; Lopez, Javier.; SpringerLink (Online service)
(Electronic resources)
Subjects
Data Structures, Cryptology and Information Theory.
Mobile and Network Security.
Data protection
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Information Systems Applications (incl. Internet)
Security Science and Technology.
Data encryption (Computer science)
Computer Appl. in Administrative Data Processing.
Malware (Computer software)
Internet
Coding and Information Theory.
Data Encryption.
Computer security
Information Systems Applications (incl.Internet)
Cyber intelligence (Computer security)
Security.
Privacy.
Artificial Intelligence.
Computer Communication Networks.
Computer Science.
Systems and Data Security.
Computer networks
Computers
Computers and Society.
Computer science.
Cybercrime.