Lilian Mitrou
Lilian Mitrou
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Social media profiling: A Panopticon or Omniopticon tool?
L Mitrou, M Kandias, V Stavrou, D Gritzalis
Proc. of the 6th Conference of the Surveillance Studies Network, 1-15, 2014
Smartphone sensor data as digital evidence
A Mylonas, V Meletiadis, L Mitrou, D Gritzalis
Computers & Security 38, 51-75, 2013
History of information: the case of privacy and security in social media
D Gritzalis, M Kandias, V Stavrou, L Mitrou
Proc. of the History of Information Conference, 283-310, 2014
Insiders trapped in the mirror reveal themselves in social media
M Kandias, K Galbogini, L Mitrou, D Gritzalis
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
Can we trust this user? Predicting insider's attitude via YouTube usage profiling
M Kandias, V Stavrou, N Bozovic, L Mitrou, D Gritzalis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
Revisiting legal and regulatory requirements for secure e-voting
L Mitrou, D Gritzalis, S Katsikas
Security in the Information Society: Visions and Perspectives, 469-480, 2002
Which side are you on? A new Panopticon vs. privacy
M Kandias, L Mitrou, V Stavrou, D Gritzalis
2013 International Conference on Security and Cryptography (SECRYPT), 1-13, 2013
Data protection, artificial intelligence and cognitive services: is the general data protection regulation (GDPR)‘artificial intelligence-proof’?
L Mitrou
Artificial Intelligence and Cognitive Services: Is the General Data …, 2018
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
Employees’ privacy vs. employers’ security: Can they be balanced?
L Mitrou, M Karyda
Telematics and Informatics 23 (3), 164-178, 2006
Internet forensics: Legal and technical issues
M Karyda, L Mitrou
Second international workshop on digital forensics and incident analysis …, 2007
Privacy preservation by k-anonymization of weighted social networks
ME Skarkala, M Maragoudakis, S Gritzalis, L Mitrou, H Toivonen, P Moen
2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012
Electronic voting: Constitutional and legal requirements, and their technical implications
L Mitrou, D Gritzalis, S Katsikas, G Quirchmayr
Secure electronic voting, 43-60, 2003
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos
Computers & Security 74, 371-383, 2018
A cyber attack evaluation methodology
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014
Reengineering the user: privacy concerns about personal data on smartphones
M Tsavli, PS Efraimidis, V Katos, L Mitrou
Information & Computer Security 23 (4), 394-405, 2015
EU's data protection reform and the right to be forgotten: A legal response to a technological challenge?
L Mitrou, M Karyda
5th International Conference of Information Law and Ethics, 29-30, 2012
Data breach notification: issues and challenges for security management
M Karyda, L Mitrou
The impact of communications data retention on fundamental rights and democracy–the case of the EU Data Retention Directive
L Mitrou
Surveillance and democracy, 143-163, 2010
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Information & Computer Security 24 (1), 38-52, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20