484 results on '"Kalloniatis, Christos"'
Search Results
2. Architecture for Protecting Data Privacy in Decentralized Social Networks
3. Designing Secure and Privacy-Aware IoT Services in the Health Sector
4. Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments: Developers’ mindset on Self-Adaptive...
5. Review on Privacy and Trust Methodologies in Cloud Computing
6. Review on Privacy and Trust Methodologies in Cloud Computing
7. A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems
8. AegeanDigital Tourism Tank: Experiences and Products for Enhancing the Sustainable Preservation of Digital Heritage of Cultural Organizations of North Aegean
9. Disclosing Social and Location Attributes on Social Media: The Impact on Users’ Privacy
10. Understanding the role of users’ socio-location attributes and their privacy implications on social media
11. Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things
12. Uncovering patterns of public perceptions towards biodiversity crime using conservation culturomics
13. A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems
14. Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts
15. Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport Systems
16. Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy
17. Disclosing Social and Location Attributes on Social Media: The Impact on Users’ Privacy
18. A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services
19. Securing User eXperience: A Review for the End-Users’ Software Robustness
20. Measuring Users’ Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments
21. A Chebyshev polynomial feedforward neural network trained by differential evolution and its application in environmental case studies
22. Gamification: A Necessary Element for Designing Privacy Training Programs
23. Preface
24. Location—Allocation Modeling for Emergency Evacuations in the Aegean Sea
25. The Interrelation of Game Elements and Privacy Requirements for the Design of a System: A Metamodel
26. Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing
27. E-Governance in educational settings : Greek educational organizations leadership’s perspectives towards social media usage for participatory decision-making
28. Designing Privacy-Aware Intelligent Transport Systems
29. The Role of Gamification in Privacy Protection and User Engagement
30. Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy
31. A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness
32. Modeling Data Center Temperature Profile in Terms of a First Order Polynomial RBF Network Trained by Particle Swarm Optimization
33. A framework for designing cloud forensic-enabled services (CFeS)
34. 'I Have Learned that I Must Think Twice Before…'. An Educational Intervention for Enhancing Students’ Privacy Awareness in Facebook
35. Supporting Privacy by Design Using Privacy Process Patterns
36. Modelling Cloud Forensic-Enabled Services
37. Managing User Experience: Usability and Security in a New Era of Software Supremacy
38. Control Centers for the Wellbeing of Elders with Intellectual Disabilities
39. Measuring Users’ Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments
40. Contributors
41. Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing
42. Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts
43. Securing User eXperience: A Review for the End-Users’ Software Robustness
44. Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport Systems
45. Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE).
46. A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services
47. Incorporating privacy in the design of cloud-based systems: a conceptual meta-model
48. Apparatus: Reasoning About Security Requirements in the Internet of Things
49. Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems
50. Modelling Secure Cloud Computing Systems from a Security Requirements Perspective
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.