default search action
Marianthi Theoharidou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j10]Laura Petersen, David Lange, Marianthi Theocharidou:
Who cares what it means? Practical reasons for using the word resilience with critical infrastructure operators. Reliab. Eng. Syst. Saf. 199: 106872 (2020) - [e8]Lynette Drevin, Suné von Solms, Marianthi Theocharidou:
Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings. IFIP Advances in Information and Communication Technology 579, Springer 2020, ISBN 978-3-030-59290-5 [contents]
2010 – 2019
- 2019
- [e7]Lynette Drevin, Marianthi Theocharidou:
Information Security Education. Education in Proactive Information Security - 12th IFIP WG 11.8 World Conference WISE 12, Lisbon, Portugal, June 25-27, 2019, Proceedings. IFIP Advances in Information and Communication Technology 557, Springer 2019, ISBN 978-3-030-23450-8 [contents] - 2018
- [e6]Lynette Drevin, Marianthi Theocharidou:
Information Security Education - Towards a Cybersecure Society - 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. IFIP Advances in Information and Communication Technology 531, Springer 2018, ISBN 978-3-319-99733-9 [contents] - 2017
- [j9]George Stergiopoulos, Vasilis Kouktzoglou, Marianthi Theocharidou, Dimitris Gritzalis:
A process-based dependency risk analysis methodology for critical infrastructures. Int. J. Crit. Infrastructures 13(2/3): 184-205 (2017) - [e5]Matt Bishop, Lynn Futcher, Natalia G. Miloslavskaya, Marianthi Theocharidou:
Information Security Education for a Global Digital Society - 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology 503, Springer 2017, ISBN 978-3-319-58552-9 [contents] - 2016
- [j8]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Georgia Lykou, Dimitris Gritzalis:
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. Int. J. Crit. Infrastructure Prot. 12: 46-60 (2016) - [c21]Amélie Grangeat, Julie Sina, Vittorio Rosato, Aurélia Bony, Marianthi Theocharidou:
Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers. CRITIS 2016: 100-110 - [e4]Erich Rome, Marianthi Theocharidou, Stephen D. Wolthusen:
Critical Information Infrastructures Security - 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9578, Springer 2016, ISBN 978-3-319-33330-4 [contents] - 2015
- [j7]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Dimitris Gritzalis:
Risk mitigation strategies for critical infrastructures based on graph centrality analysis. Int. J. Crit. Infrastructure Prot. 10: 34-44 (2015) - [j6]Rafal Kozik, Michal Choras, Adam Flizikowski, Marianthi Theocharidou, Vittorio Rosato, Erich Rome:
Advanced services for critical infrastructures protection. J. Ambient Intell. Humaniz. Comput. 6(6): 783-795 (2015) - [c20]Jingquan Xie, Marianthi Theocharidou, Yohan Barbarin:
Knowledge-Driven Scenario Development for Critical Infrastructure Protection. CRITIS 2015: 91-102 - [c19]George Stergiopoulos, Marianthi Theocharidou, Dimitris Gritzalis:
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures. HCI (22) 2015: 672-683 - [c18]George Stergiopoulos, Marianthi Theocharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation. Critical Infrastructure Protection 2015: 299-314 - [e3]Matt Bishop, Natalia G. Miloslavskaya, Marianthi Theocharidou:
Information Security Education Across the Curriculum - 9th IFIP WG 11.8 World Conference, WISE9, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 453, Springer 2015, ISBN 978-3-319-18499-9 [contents] - 2013
- [j5]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Assessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastructures 9(1/2): 93-110 (2013) - [c17]Nikolaos Tsalis, Marianthi Theoharidou, Dimitris Gritzalis:
Return on Security Investment for Cloud Platforms. CloudCom (2) 2013: 132-137 - [c16]Marianthi Theoharidou, Nick Papanikolaou, Siani Pearson, Dimitris Gritzalis:
Privacy Risk, Security, Accountability in the Cloud. CloudCom (1) 2013: 177-184 - [c15]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Cascading Effects of Common-Cause Failures in Critical Infrastructures. Critical Infrastructure Protection 2013: 171-182 - [c14]Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis:
In Cloud We Trust: Risk-Assessment-as-a-Service. IFIPTM 2013: 100-110 - [c13]Despoina Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, Christos Douligeris, Marianthi Theoharidou, Dimitris Gritzalis:
S-Port: Collaborative security management of Port Information systems. IISA 2013: 1-6 - [c12]Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis:
Assessing Privacy Risks in Android: A User-Centric Approach. RISK@ICTSS 2013: 21-37 - 2012
- [c11]Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis:
A Risk Assessment Method for Smartphones. SEC 2012: 443-456 - [e2]Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou:
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology 376, Springer 2012, ISBN 978-3-642-30435-4 [contents] - 2011
- [c10]Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis:
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. CRITIS 2011: 104-115 - [c9]Marianthi Theoharidou, Miltiadis Kandias, Dimitris Gritzalis:
Securing Transportation-Critical Infrastructures: Trends and Perspectives. ICGS3/e-Democracy 2011: 171-178 - [c8]Miltiadis Kandias, Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis:
Exploitation of auctions for outsourcing security-critical projects. ISCC 2011: 646-651 - 2010
- [j4]Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
A multi-layer Criticality Assessment methodology based on interdependencies. Comput. Secur. 29(6): 643-658 (2010) - [c7]Miltiadis Kandias, Alexios Mylonas, Nikos Virvilis, Marianthi Theoharidou, Dimitris Gritzalis:
An Insider Threat Prediction Model. TrustBus 2010: 26-37 - [p1]Lizzie Coles-Kemp, Marianthi Theoharidou:
Insider Threat and Information Security Management. Insider Threats in Cyber Security 2010: 45-71 - [e1]Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou:
Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings. Lecture Notes in Computer Science 6345, Springer 2010, ISBN 978-3-642-15496-6 [contents]
2000 – 2009
- 2009
- [c6]Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Risk-Based Criticality Analysis. Critical Infrastructure Protection 2009: 35-49 - 2008
- [j3]Marianthi Theoharidou, Dimitra Xidara, Dimitris Gritzalis:
A CBK for Information Security and Critical Information and Communication Infrastructure Protection. Int. J. Crit. Infrastructure Prot. 1: 81-96 (2008) - [c5]Stelios Dritsas, Yannis Soupionis, Marianthi Theoharidou, Yannis Mallios, Dimitris Gritzalis:
SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. SEC 2008: 381-395 - 2007
- [j2]Marianthi Theoharidou, Dimitris Gritzalis:
Common Body of Knowledge for Information Security. IEEE Secur. Priv. 5(2): 64-67 (2007) - [c4]Giannis F. Marias, Stelios Dritsas, Marianthi Theoharidou, John Mallios, Dimitris Gritzalis:
SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment. ICCCN 2007: 597-604 - [c3]Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis:
A CBK for Information Security and Critical Infrastructure Protection. World Conference on Information Security Education 2007: 49-56 - [c2]Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis:
Threat Analysis of the Session Initiation Protocol Regarding Spam. IPCCC 2007: 426-433 - [c1]Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis:
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33 - 2005
- [j1]Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
The insider threat to information systems and the effectiveness of ISO17799. Comput. Secur. 24(6): 472-484 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint