default search action
Ioannis Mavridis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Georgios Sakellariou, Panagiotis E. Fouliras, Ioannis Mavridis:
A Methodology for Developing & Assessing CTI Quality Metrics. IEEE Access 12: 6225-6238 (2024) - [j23]Nikolaos Tsinganos, Panagiotis E. Fouliras, Ioannis Mavridis, Dimitris Gritzalis:
CSE-ARS: Deep Learning-Based Late Fusion of Multimodal Information for Chat-Based Social Engineering Attack Recognition. IEEE Access 12: 16072-16088 (2024) - [j22]Menelaos N. Katsantonis, Athanassios Manikas, Ioannis Mavridis, Panagiotis E. Fouliras:
tCOFELET: Conceptual Framework for Team-Centric e-Learning and Training. IEEE Access 12: 78878-78894 (2024) - [j21]Dionysios Stamatopoulos, Menelaos Katsantonis, Panagiotis E. Fouliras, Ioannis Mavridis:
Exploring the Architectural Composition of Cyber Ranges: A Systematic Review. Future Internet 16(7): 231 (2024) - 2023
- [j20]Athanasios Dimitriadis, Efstratios Lontzetidis, Boonserm Kulvatunyou, Nenad Ivezic, Dimitris Gritzalis, Ioannis Mavridis:
Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks. IEEE Access 11: 728-743 (2023) - [j19]Menelaos N. Katsantonis, Athanassios Manikas, Ioannis Mavridis, Dimitris Gritzalis:
Cyber range design framework for cyber security education and training. Int. J. Inf. Sec. 22(4): 1005-1027 (2023) - [c39]Argiro Anagnostopoulou, Ioannis Mavridis, Dimitris Gritzalis:
Risk-Based Illegal Information Flow Detection in the IIoT. SECRYPT 2023: 377-384 - 2022
- [j18]Nikolaos Tsinganos, Ioannis Mavridis, Dimitris Gritzalis:
Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks. IEEE Access 10: 108517-108529 (2022) - [c38]Leonidas-Sotirios Kyrgiakos, Georgios Kleftodimos, Stylianos Kartakis, Ioannis Mavridis, George Vlontzos, Thanasis Korakis:
Assessing Input Use Efficiency of PGI Potatoes - Abstract. HAICTA 2022: 427-428 - 2021
- [j17]Menelaos N. Katsantonis, Ioannis Mavridis, Dimitris Gritzalis:
Design and Evaluation of COFELET-based Approaches for Cyber Security Learning and Training. Comput. Secur. 105: 102263 (2021) - [j16]Menelaos Katsantonis, Ioannis Mavridis:
Evaluation of HackLearn COFELET Game User Experience for Cybersecurity Education. Int. J. Serious Games 8(3): 3-24 (2021) - [j15]Athanasios Dimitriadis, Christos Prassas, Jose Luis Flores, Boonserm Kulvatunyou, Nenad Ivezic, Dimitris Gritzalis, Ioannis Mavridis:
Contextualized Filtering for Shared Cyber Threat Information. Sensors 21(14): 4890 (2021) - [c37]Athanasios Dimitriadis, Efstratios Lontzetidis, Ioannis Mavridis:
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics. CSR 2021: 318-323 - 2020
- [j14]Athanasios Dimitriadis, Nenad Ivezic, Boonserm Kulvatunyou, Ioannis Mavridis:
D4I - Digital forensics framework for reviewing and investigating cyber attacks. Array 5: 100015 (2020) - [j13]Athanasios Dimitriadis, Jose Luis Flores, Boonserm Kulvatunyou, Nenad Ivezic, Ioannis Mavridis:
ARES: Automated Risk Estimation in Smart Sensor Environments. Sensors 20(16): 4617 (2020)
2010 – 2019
- 2019
- [c36]Menelaos N. Katsantonis, Isabella Kotini, Panayotis E. Fouliras, Ioannis Mavridis:
Conceptual Framework for Developing Cyber Security Serious Games. EDUCON 2019: 872-881 - [c35]Menelaos Katsantonis, Ioannis Mavridis:
Ontology-Based Modelling for Cyber Security E-Learning and Training. ICWL 2019: 15-27 - [p1]Stavros Salonikias, Antonios Gouglidis, Ioannis Mavridis, Dimitris Gritzalis:
Access Control in the Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 95-114 - 2018
- [c34]Nikolaos Tsinganos, Georgios Sakellariou, Panagiotis E. Fouliras, Ioannis Mavridis:
Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments. ARES 2018: 53:1-53:10 - 2017
- [c33]Menelaos Katsantonis, Panayotis E. Fouliras, Ioannis Mavridis:
Conceptual analysis of cyber security education based on live competitions. EDUCON 2017: 771-779 - [c32]Menelaos N. Katsantonis, Panayotis E. Fouliras, Ioannis Mavridis:
Conceptualization of Game Based Approaches for Learning and Training on Cyber Security. PCI 2017: 36:1-36:2 - 2015
- [j12]Aristeidis Chatzipoulidis, Dimitrios Michalopoulos, Ioannis Mavridis:
Information infrastructure risk prediction through platform vulnerability analysis. J. Syst. Softw. 106: 28-41 (2015) - [c31]Stavros Salonikias, Ioannis Mavridis, Dimitris Gritzalis:
Access Control Issues in Utilizing Fog Computing for Transport Infrastructure. CRITIS 2015: 15-26 - 2014
- [j11]Dimitrios Michalopoulos, Ioannis Mavridis, Marija Jankovic:
GARS: Real-time system for identification, assessment and control of cyber grooming attacks. Comput. Secur. 42: 177-190 (2014) - [j10]Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu:
Security policy verification for multi-domains in cloud systems. Int. J. Inf. Sec. 13(2): 97-111 (2014) - 2013
- [j9]Dimitrios Michalopoulos, Ioannis Mavridis:
A method to calculate social networking hazard probability in definite time. Inf. Manag. Comput. Secur. 21(1): 16-29 (2013) - [c30]Antonios Gouglidis, Ioannis Mavridis:
A Methodology for the Development and Verification of Access Control Systems in Cloud Computing. I3E 2013: 88-99 - [c29]Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu:
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems. SERE (Companion) 2013: 35-44 - 2012
- [j8]Antonios Gouglidis, Ioannis Mavridis:
domRBAC: An access control model for modern collaborative systems. Comput. Secur. 31(4): 540-556 (2012) - [j7]Merkourios Margaritopoulos, Thomas Margaritopoulos, Ioannis Mavridis, Athanasios Manitsaris:
Quantifying and measuring metadata completeness. J. Assoc. Inf. Sci. Technol. 63(4): 724-737 (2012) - [c28]Christos Grompanopoulos, Ioannis Mavridis:
Challenging issues of UCON in modern computing environments. BCI 2012: 156-161 - [c27]Dimitrios Michalopoulos, Ioannis Mavridis:
Utilizing Survival Analysis for Modeling Child Hazards of Social Networking. HAISA 2012: 195-204 - [c26]Dimitrios Michalopoulos, Eustathios Papadopoulos, Ioannis Mavridis:
Artemis: Protection from Sexual Exploitation Attacks via SMS. Panhellenic Conference on Informatics 2012: 19-24 - [c25]Christos Grompanopoulos, Ioannis Mavridis:
Towards Use-Based Usage Control. SEC 2012: 585-590 - [c24]Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis:
A Use-Based Approach for Enhancing UCON. STM 2012: 81-96 - 2011
- [j6]Ioannis Mavridis:
Deploying Privacy Improved RBAC in Web Information Systems. Int. J. Inf. Technol. Syst. Approach 4(2): 70-87 (2011) - [j5]George Zardas, Odysseas Moschidis, Ioannis Mavridis, Athanasios Manitsaris:
A methodology for evaluating web-based educational systems using statistical multidimensional analysis. Int. J. Learn. Technol. 6(4): 409-432 (2011) - [c23]Apostolos K. Provatidis, Christos K. Georgiadis, Ioannis Mavridis:
Towards Colored Petri Net Modeling of Expanded C-TMAC. ICGS3/e-Democracy 2011: 88-95 - [c22]Dimitrios Michalopoulos, Ioannis Mavridis:
Utilizing document classification for grooming attack recognition. ISCC 2011: 864-869 - [c21]Anastasios Politis, Ioannis Mavridis, Athanasios Manitsaris, Constantinos S. Hilas:
X-EDCA: A cross-layer MAC-centric mechanism for efficient multimedia transmission in congested IEEE 802.11e infrastructure networks. IWCMC 2011: 1724-1730 - [c20]Antonios Gouglidis, Ioannis Mavridis:
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems. WISTP 2011: 38-53 - 2010
- [c19]Christos Grompanopoulos, Ioannis Mavridis:
Towards Differentiated Utilization of Attribute Mutability for Access Control in Ubiquitous Computing. Panhellenic Conference on Informatics 2010: 118-123 - [c18]Aristeidis Chatzipoulidis, Ioannis Mavridis:
A Study on User Behavior and Acceptance of Electronic Banking Services. Panhellenic Conference on Informatics 2010: 180-183 - [c17]Dimitrios Michalopoulos, Ioannis Mavridis:
Surveying Privacy Leaks Through Online Social Network. Panhellenic Conference on Informatics 2010: 184-187 - [c16]Dimitrios Michalopoulos, Ioannis Mavridis:
Towards Risk based Prevention of Grooming Attacks. SECRYPT 2010: 217-220 - [c15]Aristeidis Chatzipoulidis, Ioannis Mavridis:
An ICT Security Management Framework. SECRYPT 2010: 459-462
2000 – 2009
- 2009
- [j4]Tania Kerkiri, Athanasios Manitsaris, Ioannis Mavridis:
How e-learning systems may benefit from ontologies and recommendation methods to efficiently personalise resources. Int. J. Knowl. Learn. 5(3/4): 347-370 (2009) - [c14]Antonios Gouglidis, Ioannis Mavridis:
On the Definition of Access Control Requirements for Grid and Cloud Computing Systems. GridNets 2009: 19-26 - [c13]Aristeidis Chatzipoulidis, Ioannis Mavridis:
Evolving Challenges In Information Security Compliance. MCIS 2009: 75 - [c12]Thomas Margaritopoulos, Merkourios Margaritopoulos, Ioannis Mavridis, Athanasios Manitsaris:
A Fine-Grained Metric System for the Completeness of Metadata. MTSR 2009: 83-94 - [c11]Antonios Gouglidis, Ioannis Mavridis:
A Foundation for Defining Security Requirements in Grid Computing. Panhellenic Conference on Informatics 2009: 180-184 - 2008
- [j3]Ioannis Mavridis, Andreas K. Mattas, Ioannis Pagkalos, Isabella Kotini, Christos Ilioudis:
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time. Int. J. Inf. Comput. Secur. 2(4): 328-352 (2008) - [c10]Thomas Margaritopoulos, Merkourios Margaritopoulos, Ioannis Mavridis, Athanasios Manitsaris:
A Conceptual Framework for Metadata Quality Assessment. Dublin Core Conference 2008: 104-113 - 2007
- [c9]Merkourios Margaritopoulos, Isabella Kotini, Athanasios Manitsaris, Ioannis Mavridis:
Identifying Inference Rules for Automatic Metadata Generation from Pre-existing Metadata of Related Resources. MTSR 2007: 155-165 - [c8]Tania Kerkiri, Athanasios Manitsaris, Ioannis Mavridis:
A Learner-centered Semantic Web-based Architecture. WEBIST (3) 2007: 563-566 - 2006
- [j2]Christos K. Georgiadis, Panayotis E. Fouliras, Ioannis Mavridis, Athanasios Manitsaris:
Web services and multimedia in m-business applications: Opportunities and concerns. Int. J. Web Inf. Syst. 2(1): 51-62 (2006) - [c7]Anastasios Politis, Athanasios Manitsaris, Ioannis Mavridis:
Implementation and Evaluation of TCP Enhancements over Satellite Links. ICWMC 2006: 24 - [c6]Andreas K. Mattas, Ioannis Mavridis, Iason Pagkalos:
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. SEC 2006: 196-207 - 2003
- [j1]Christos K. Georgiadis, Ioannis Mavridis, George Pangalos:
Healthcare teams over the Internet: programming a certificate-based approach. Int. J. Medical Informatics 70(2-3): 161-171 (2003) - [c5]Andreas K. Mattas, Ioannis Mavridis, George Pangalos:
Towards Dynamically Administered Role-Based Access Control. DEXA Workshops 2003: 494-498 - 2001
- [c4]Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas:
Flexible team-based access control using contexts. SACMAT 2001: 21-27 - 2000
- [b1]Ioannis Mavridis:
Ασφάλεια πληροφοριακών συστημάτων και συστημάτων βάσεων δεδομένων σε περιβάλλον mobile computing. Aristotle University Of Thessaloniki, Greece, 2000
1990 – 1999
- 1999
- [c3]Ioannis Mavridis, George Pangalos, Marie Khair:
eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. DBSec 1999: 63-78 - [c2]Ioannis Mavridis, George Pangalos, Triadafyllos Koukouvinos, Sead Muftic:
A Secure Payment System for Electronic Commerce. DEXA Workshop 1999: 832-836 - 1998
- [c1]Marie Khair, Ioannis Mavridis, George Pangalos:
Design of Secure Distributed Medical Database Systems. DEXA 1998: 492-500
Coauthor Index
aka: Panayotis E. Fouliras
aka: Menelaos N. Katsantonis
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint