Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Dimitris A. GritzalisProfessor of Cybersecurity, Athens University of Economics & BusinessVerified email at aueb.gr
- Panayiotis KotzanikolaouDepartment of Informatics, University of Piraeus, GreeceVerified email at unipi.gr
- Marianthi TheocharidouCybersecurity Officer, EU Agency for CybersecurityVerified email at enisa.europa.eu
- Panagiotis DedousisPh.D., Athens University of Economics & BusinessVerified email at aueb.gr
- Panagiotis KatsarosProfessor of Computer Science, Aristotle University of Thessaloniki, GreeceVerified email at csd.auth.gr
- Thomas K. DasaklisHellenic Open University, School of Social SciencesVerified email at eap.gr
- Christos DouligerisProfessorVerified email at unipi.gr
- Bill TsoumasResearcher, Athens University of Economics and BusinessVerified email at aueb.gr
- Evangelos BitsikasDoctoral Researcher, Northeastern UniversityVerified email at northeastern.edu
- Vasilis StavrouSenior Researcher, Athens University of Economics and Business, GreeceVerified email at aueb.gr
- Theodore ApostolopoulosProfessor, Dept. of Informatics, Athens University of Economics & Business, GreeceVerified email at aueb.gr
Follow
George Stergiopoulos
Assistant Professor, Inf. and Comm. Systems Engineering, University of the Aegean
Verified email at aegean.gr