Follow
Lilian Mitrou
Title
Cited by
Cited by
Year
Social media profiling: A Panopticon or Omniopticon tool?
L Mitrou, M Kandias, V Stavrou, D Gritzalis
Proc. of the 6th Conference of the Surveillance Studies Network, 1-15, 2014
1602014
Smartphone sensor data as digital evidence
A Mylonas, V Meletiadis, L Mitrou, D Gritzalis
Computers & Security 38, 51-75, 2013
1212013
History of information: the case of privacy and security in social media
D Gritzalis, M Kandias, V Stavrou, L Mitrou
Proc. of the History of Information Conference, 283-310, 2014
1062014
Can we trust this user? Predicting insider's attitude via YouTube usage profiling
M Kandias, V Stavrou, N Bozovic, L Mitrou, D Gritzalis
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
1062013
Revisiting legal and regulatory requirements for secure e-voting
L Mitrou, D Gritzalis, S Katsikas
Security in the Information Society: Visions and Perspectives, 469-480, 2002
1062002
Which side are you on? A new Panopticon vs. privacy
M Kandias, L Mitrou, V Stavrou, D Gritzalis
2013 International Conference on Security and Cryptography (SECRYPT), 1-13, 2013
1052013
Insiders trapped in the mirror reveal themselves in social media
M Kandias, K Galbogini, L Mitrou, D Gritzalis
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
1042013
Smartphone forensics: A proactive investigation scheme for evidence acquisition
A Mylonas, V Meletiadis, B Tsoumas, L Mitrou, D Gritzalis
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
772012
Employees’ privacy vs. employers’ security: Can they be balanced?
L Mitrou, M Karyda
Telematics and Informatics 23 (3), 164-178, 2006
742006
Data protection, artificial intelligence and cognitive services: is the general data protection regulation (GDPR)‘artificial intelligence-proof’?
L Mitrou
Artificial Intelligence and Cognitive Services: Is the General Data …, 2018
692018
Internet forensics: Legal and technical issues
M Karyda, L Mitrou
Second International Workshop on Digital Forensics and Incident Analysis …, 2007
632007
Electronic voting: Constitutional and legal requirements, and their technical implications
L Mitrou, D Gritzalis, S Katsikas, G Quirchmayr
Secure electronic voting, 43-60, 2003
572003
Privacy preservation by k-anonymization of weighted social networks
ME Skarkala, M Maragoudakis, S Gritzalis, L Mitrou, H Toivonen, P Moen
2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012
562012
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual
K Pipyros, C Thraskias, L Mitrou, D Gritzalis, T Apostolopoulos
Computers & Security 74, 371-383, 2018
512018
A cyber attack evaluation methodology
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Proc. of the 13th European Conference on Cyber Warfare and Security, 264-270, 2014
502014
Reengineering the user: privacy concerns about personal data on smartphones
M Tsavli, PS Efraimidis, V Katos, L Mitrou
Information & Computer Security 23 (4), 394-405, 2015
432015
EU's data protection reform and the right to be forgotten: A legal response to a technological challenge?
L Mitrou, M Karyda
5th International Conference of Information Law and Ethics, 29-30, 2012
402012
The impact of communications data retention on fundamental rights and democracy–the case of the EU Data Retention Directive
L Mitrou
Surveillance and democracy, 143-163, 2010
382010
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare
K Pipyros, L Mitrou, D Gritzalis, T Apostolopoulos
Information & Computer Security 24 (1), 38-52, 2016
352016
Data breach notification: issues and challenges for security management
M Karyda, L Mitrou
342016
The system can't perform the operation now. Try again later.
Articles 1–20