default search action
Ioanna Dionysiou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Leonidas Efthymiou, Epaminondas Epaminonda, Despo Ktoridou, Ioanna Dionysiou:
Societal and Ethical Implications of Technology in Education. EDUCON 2023: 1-5 - [c23]Maria Zambas, Alisa Illarionova, Nikoletta Christou, Ioanna Dionysiou:
Exploring User Attitude Towards Personal Data Privacy and Data Privacy Economy. ICR 2023: 237-244 - 2022
- [j7]Amir Salar Hajy Sheikhi, Elias Iosif, Oleg Basov, Ioanna Dionysiou:
SmartMinutes - A Blockchain-Based Framework for Automated, Reliable, and Transparent Meeting Minutes Management. Big Data Cogn. Comput. 6(4): 133 (2022) - [c22]Efi Siapiti, Ioanna Dionysiou, K. Harald Gjermundrød:
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy. SEC 2022: 398-411 - 2021
- [c21]Ioanna Dionysiou, K. Harald Gjermundrød:
SmartTeV - Leveraging eVoting with Smart Voting Ballots. IDC 2021: 385-394
2010 – 2019
- 2019
- [c20]Michel B. Verwer, Ioanna Dionysiou, K. Harald Gjermundrød:
TrustedEVoting (TeV) a Secure, Anonymous and Verifiable Blockchain-Based e-Voting Framework. e-Democracy 2019: 129-143 - [e1]Yannis Manolopoulos, George Angelos Papadopoulos, Athena Stassopoulou, Ioanna Dionysiou, Ioannis Kyriakides, Nicolas Tsapatsoulis:
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, PCI 2019, Nicosia, Cyprus, November 28-30, 2019. ACM 2019, ISBN 978-1-4503-7292-3 [contents] - 2016
- [c19]K. Harald Gjermundrød, Ioanna Dionysiou, Kyriakos Costa:
privacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls. ICWE Workshops 2016: 3-15 - [c18]K. Harald Gjermundrød, Ioanna Dionysiou, Marianne Baumberger, Marc Pattinson:
An assessment of the ICT Security Skills in the Industrial Sector as Provided Through Education and Training. MCIS 2016: 9 - [c17]K. Harald Gjermundrød, Konstantinos Chalkias, Ioanna Dionysiou:
Going Beyond the Coinbase Transaction Fee: Alternative Reward Schemes for Miners in Blockchain Systems. PCI 2016: 35 - [c16]Athanasios Plessas, Ioanna Dionysiou:
An Investigation on the Application Developer Attitude Towards Greek Open Government Data. PCI 2016: 44 - 2015
- [j6]K. Harald Gjermundrød, Ioanna Dionysiou:
A conceptual framework for configurable privacy-awareness in a citizen-centric eGovernment. Electron. Gov. an Int. J. 11(4): 258-282 (2015) - [c15]Andreas Christoforou, K. Harald Gjermundrød, Ioanna Dionysiou:
HoneyCY: a configurable unified management framework for open-source honeypot services. Panhellenic Conference on Informatics 2015: 161-164 - [c14]K. Harald Gjermundrød, Ioanna Dionysiou:
CloudHoneyCY - An Integrated Honeypot Framework for Cloud Infrastructures. UCC 2015: 630-635 - 2014
- [c13]K. Harald Gjermundrød, Ioanna Dionysiou:
Recirculating Lost Coins in Cryptocurrency Systems. BIS (Workshops) 2014: 229-240 - [c12]George Violaris, Ioanna Dionysiou:
Out-of-Band Authentication Model with Hashcash Brute-Force Prevention. HPCC/CSS/ICESS 2014: 794-801 - [p1]David E. Bakken, K. Harald Gjermundrød, Ioanna Dionysiou:
GridStat: High Availability, Low Latency, and Adaptive Sensor Data Delivery for Smart Generation and Transmission. Smart Grids 2014: 55-114 - 2013
- [c11]Philippos Pouyioutas, Ioanna Dionysiou, K. Harald Gjermundrød:
ReProTool Version 3.0 - The Faculty Module for designing and enhancing university programmes to comply with the ECTS Label. EDUCON 2013: 16-22 - 2012
- [j5]Ioanna Dionysiou, Despo Ktoridou:
Enhancing Dynamic-Content Courses with Student-Oriented Learning Strategies: The Case of Computer Security Course. Int. J. Cyber Ethics Educ. 2(2): 24-33 (2012) - [j4]Philippos Pouyioutas, K. Harald Gjermundrød, Ioanna Dionysiou:
ReProTool Version 2.0 - Re-engineering Academic Curriculum Using Learning Outcomes, ECTS and Bologna Process Concepts. Interact. Technol. Smart Educ. 9(3): 136-152 (2012) - [c10]Philippos Pouyioutas, K. Harald Gjermundrød, Ioanna Dionysiou:
E-Learning - The Bologna Process, the European Credit Transfer System (ECTS), Learning Outcomes and ReProTool. ICWL 2012: 334-342 - 2011
- [j3]Ioanna Dionysiou:
An investigation on compliance with ISO 27001 in Cypriot private and public organisations. Int. J. Serv. Stand. 7(3/4): 197-234 (2011) - [c9]Philippos Pouyioutas, K. Harald Gjermundrød, Ioanna Dionysiou:
The Development of MapQFTool - A Software Tool for National Qualifications Frameworks. CSEDU (2) 2011: 273-279 - 2010
- [j2]Ioanna Dionysiou, David E. Bakken:
A Conceptual Framework for Adaptive and Configurable Activity-Aware Trust in Collaborative Environments. Int. J. Dependable Trust. Inf. Syst. 1(1): 25-44 (2010) - [c8]Philippos Pouyioutas, K. Harald Gjermundrød, Ioanna Dionysiou:
The Development of TunTool - A Software Tool for the Tuning Methodology. CSEDU (2) 2010: 401-406 - [c7]Wendy M. Maiden, Ioanna Dionysiou, Deborah A. Frincke, Glenn A. Fink, David E. Bakken:
DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems. DPM/SETOP 2010: 188-202 - [c6]Daniel Germanus, Ioanna Dionysiou, K. Harald Gjermundrød, Abdelmajid Khelil, Neeraj Suri, David E. Bakken, Carl Hauser:
Leveraging the next-generation power grid: Data sharing and associated partnerships. ISGT Europe 2010: 1-8 - [c5]Ioanna Dionysiou, Angelika I. Kokkinaki, Skevi Magirou:
Preliminary Survey Results on IT Security Practices in Cyprus Private and Public Sectors. MCIS 2010: 25 - [c4]Ioanna Dionysiou, K. Harald Gjermundrød, David E. Bakken:
GUTS: A Framework for Adaptive and Configureable Grid User Trust Service. STM 2010: 84-99
2000 – 2009
- 2008
- [j1]Carl H. Hauser, David E. Bakken, Ioanna Dionysiou, K. Harald Gjermundrød, Venkata S. Irava, Joel Helkey, Anjan Bose:
Security, trust, and QoS in next-generation control and communication for large power systems. Int. J. Crit. Infrastructures 4(1/2): 3-16 (2008) - [c3]Ioanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke:
Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. SECRYPT 2008: 546-553 - 2007
- [c2]Ioanna Dionysiou, Deborah A. Frincke, David E. Bakken, Carl Hauser:
An Approach to Trust Management Challenges for Critical Infrastructures. CRITIS 2007: 173-184 - 2005
- [c1]Ovidiu Valentin Drugan, Ioanna Dionysiou, David E. Bakken, Thomas Plagemann, Carl H. Hauser, Deborah A. Frincke:
On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management. ISAS 2005: 149-163
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint