H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 40 Citations 5,941 254 World Ranking 4598 National Ranking 24

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer network

Computer security, Computer network, Intrusion detection system, Information privacy and Cryptography are his primary areas of study. He has researched Computer security in several fields, including Cloud computing security and Mobile device. His work is dedicated to discovering how Computer network, Voice over IP are connected with Session Initiation Protocol, Implementation, Electronic messaging and Internet service and other disciplines.

His research integrates issues of Wireless, Wireless network and Rendering in his study of Intrusion detection system. His study in the field of Cryptographic protocol is also linked to topics like Petroleum industry and Industrial Internet. His study explores the link between Privacy software and topics such as Privacy by Design that cross with problems in Cloud computing.

His most cited work include:

  • Addressing privacy requirements in system design: the PriS method (177 citations)
  • Survey of security vulnerabilities in session initiation protocol (175 citations)
  • Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset (157 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Internet privacy, Computer network, Information privacy and Privacy software. His Computer security study frequently links to adjacent areas such as Cloud computing security. His Cloud computing security study incorporates themes from Security service and Computer security model.

The Internet privacy study combines topics in areas such as Data Protection Act 1998 and Personally identifiable information. His Computer network study combines topics from a wide range of disciplines, such as Wireless and Heterogeneous network. The concepts of his Privacy software study are interwoven with issues in Data security and Anonymity.

He most often published in these fields:

  • Computer security (51.80%)
  • Internet privacy (15.27%)
  • Computer network (14.97%)

What were the highlights of his more recent work (between 2016-2021)?

  • Internet privacy (15.27%)
  • Cloud computing (9.58%)
  • Computer security (51.80%)

In recent papers he was focusing on the following fields of study:

His main research concerns Internet privacy, Cloud computing, Computer security, Order and Order. His Internet privacy research incorporates elements of Variety, General Data Protection Regulation and Personally identifiable information. His study in Cloud computing is interdisciplinary in nature, drawing from both Software, Process, Data science and Identification.

His Computer security research integrates issues from Requirements engineering and Cloud computing security. His Order research incorporates themes from Distributed computing, Multi dimensional data, Set, Range and Process management. His research in Distributed computing focuses on subjects like Data structure, which are connected to Computer network and Symmetric-key algorithm.

Between 2016 and 2021, his most popular works were:

  • Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities (59 citations)
  • A critical review of 13 years of mobile game-based learning (32 citations)
  • Evolution and Trends in IoT Security (24 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Computer network

Stefanos Gritzalis mostly deals with Computer security, Information privacy, Cloud computing, Personally identifiable information and Internet privacy. Computer security is closely attributed to Public sector in his study. In general Information privacy, his work in Privacy software and Privacy by Design is often linked to Petroleum industry linking many areas of study.

The various areas that Stefanos Gritzalis examines in his Privacy software study include Software system, Requirements engineering, Structured systems analysis and design method, Software security assurance and Process patterns. His work on Cloud computing security as part of general Cloud computing study is frequently linked to Sustainability, therefore connecting diverse disciplines of science. His Personally identifiable information research includes themes of Privacy awareness, Order and Social network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Addressing privacy requirements in system design: the PriS method

Christos Kalloniatis;Evangelia Kavakli;Stefanos Gritzalis.
Requirements Engineering (2008)

269 Citations

Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset

Constantinos Kolias;Georgios Kambourakis;Angelos Stavrou;Stefanos Gritzalis.
IEEE Communications Surveys and Tutorials (2016)

250 Citations

Survey of security vulnerabilities in session initiation protocol

Dimitris Geneiatakis;Tasos Dagiuklas;Georgios Kambourakis;Costas Lambrinoudakis.
IEEE Communications Surveys and Tutorials (2006)

244 Citations

Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy

Costas Lambrinoudakis;Stefanos Gritzalis;Fredj Dridi;GüNther Pernul.
Computer Communications (2003)

214 Citations

Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method.

Georgia Frantzeskou;Efstathios Stamatatos;Stefanos Gritzalis;Carole E. Chaski.
International Journal of Digital Evidence (2007)

174 Citations

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification

S Gritzalis;D Spinellis;P Georgiadis.
Computer Communications (1999)

157 Citations

A framework to support selection of cloud providers based on security and privacy requirements

Haralambos Mouratidis;Shareeful Islam;Christos Kalloniatis;Stefanos Gritzalis.
Journal of Systems and Software (2013)

150 Citations

Detecting DNS amplification attacks

Georgios Kambourakis;Tassos Moschos;Dimitris Geneiatakis;Stefanos Gritzalis.
critical information infrastructures security (2007)

120 Citations

Effective identification of source code authors using byte-level information

Georgia Frantzeskou;Efstathios Stamatatos;Stefanos Gritzalis;Sokratis Katsikas.
international conference on software engineering (2006)

113 Citations

Enhancing Web privacy and anonymity in the digital era

Stefanos Gritzalis.
Information Management & Computer Security (2004)

111 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Stefanos Gritzalis

Georgios Kambourakis

Georgios Kambourakis

University of the Aegean

Publications: 36

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 25

Dimitris Gritzalis

Dimitris Gritzalis

Athens University of Economics and Business

Publications: 17

Jan Jürjens

Jan Jürjens

University of Koblenz and Landau

Publications: 17

Javier Lopez

Javier Lopez

University of Malaga

Publications: 16

Roman V. Yampolskiy

Roman V. Yampolskiy

University of Louisville

Publications: 10

Paolo Giorgini

Paolo Giorgini

University of Trento

Publications: 10

Ali Dehghantanha

Ali Dehghantanha

University of Guelph

Publications: 9

Steven Furnell

Steven Furnell

University of Nottingham

Publications: 9

Nathan Clarke

Nathan Clarke

Plymouth University

Publications: 8

Kwangjo Kim

Kwangjo Kim

Korea Advanced Institute of Science and Technology

Publications: 8

Guojun Wang

Guojun Wang

Guangzhou University

Publications: 7

Eduardo B. Fernandez

Eduardo B. Fernandez

Florida Atlantic University

Publications: 7

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 7

Nor Badrul Anuar

Nor Badrul Anuar

University of Malaya

Publications: 7

Maode Ma

Maode Ma

Nanyang Technological University

Publications: 6

Something went wrong. Please try again later.