default search action
Nineta Polemi
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Nineta Polemi, Isabel Praça, Kitty Kioskli, Adrien Bécue:
Challenges and efforts in managing AI trustworthiness risks: a state of knowledge. Frontiers Big Data 7 (2024) - [c28]Spyridon Papastergiou, Shareeful Islam, Eleni-Maria Kalogeraki, Argyro Chatzopoulou, Panagiotis Bountakas, Konstantinos Pournaras, Sreedevi Beena, Nineta Polemi:
Composite Inspection and Certification (CIC) System for Cybersecuity Assessment of ICT Products, Services, and Processes. CSR 2024: 833-838 - [c27]Rauno Pirinen, Paresh Rathod, Emilia Gugliandolo, Kevin Fleming, Nineta Polemi:
Towards the Harmonisation of Cybersecurity Education and Training in the European Union Through Innovation Projects. EDUCON 2024: 1-9 - [c26]Paresh Rathod, Nineta Polemi, Martti Lehto, Kitty Kioskli, Jan Wessels, Ricardo Lugo:
Leveraging the European Cybersecurity Skills Framework(ECSF) in EU Innovation Projects: Workforce Development Through Skilling, Upskilling, and Reskilling. EDUCON 2024: 1-9 - 2023
- [j7]Pinelopi Kyranoud, Nineta Polemi:
Securing small and medium ports and their supply chain services. Frontiers Comput. Sci. 5 (2023) - 2022
- [c25]Alexandra K. Michota, Nineta Polemi:
A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity Act. CSR 2022: 382-387 - 2021
- [c24]Pinelopi Kyranoud, Eleni-Maria Kalogeraki, Alexandra K. Michota, Nineta Polemi:
Cybersecurity Certification Requirements for Supply Chain Services. ISCC 2021: 1-7 - [c23]Vasileios Dimitriadis, Leandros Maglaras, Nineta Polemi, Ioanna Kantzavelou, Nick Ayres:
Uncuffed: A Blockchain-based Secure Messaging System. PCI 2021: 340-345 - 2020
- [c22]Kitty Kioskli, Nineta Polemi:
Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates. ICITST 2020: 1-4
2010 – 2019
- 2018
- [j6]Spyridon Papastergiou, Nineta Polemi, Panayiotis Kotzanikolaou:
Design and validation of the Medusa supply chain risk assessment methodology and system. Int. J. Crit. Infrastructures 14(1): 1-39 (2018) - [c21]Eleni-Maria Kalogeraki, Spyridon Papastergiou, Nineta Polemi, Christos Douligeris, Themis Panayiotopoulos:
Exploring Cyber-Security Issues in Vessel Traffic Services. KSEM (1) 2018: 442-451 - 2015
- [c20]Nineta Polemi, Panayiotis Kotzanikolaou:
Medusa: A Supply Chain Risk Assessment Methodology. CSP Forum 2015: 79-90 - [c19]Spyridon Papastergiou, Nineta Polemi, Athanasios Karantjias:
CYSM: An Innovative Physical/Cyber Security Management System for Ports. HCI (22) 2015: 219-230 - [c18]Spyridon Papastergiou, Nineta Polemi, Ioannis Papagiannopoulos:
Business and Threat Analysis of Ports' Supply Chain Services. HCI (22) 2015: 642-653 - [c17]Christos Ntrigkogias, Nineta Polemi:
Assessment of research efforts in surveillance systems. ICITST 2015: 288-294 - [c16]Nineta Polemi, Spyros Papastergiou:
Current efforts in ports and supply chains risk assessment. ICITST 2015: 349-354 - 2014
- [c15]Athanasios Karantjias, Nineta Polemi, Spyridon Papastergiou:
Advanced security management system for critical infrastructures. IISA 2014: 291-297 - [c14]Spyridon Papastergiou, Nineta Polemi:
Harmonizing commercial port security practices & procedures In Mediterranean Basin. IISA 2014: 292-297 - 2013
- [c13]Georgios Makrodimitris, Nineta Polemi, Christos Douligeris:
Security Risk Assessment Challenges in Port Information Technology Systems. e-Democracy 2013: 24-35 - [e1]Christos Douligeris, Nineta Polemi, Athanasios Karantjias, Winfried Lamersdorf:
Collaborative, Trusted and Privacy-Aware e/m-Services - 12th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2013, Athens, Greece, April 25-26, 2013. Proceedings. IFIP Advances in Information and Communication Technology 399, Springer 2013, ISBN 978-3-642-37436-4 [contents] - 2012
- [j5]Theodoros Ntouskas, Dimitrios Papanikas, Nineta Polemi:
Trusted collaborative services for the IT security management of SMEs/mEs. Int. J. Electron. Secur. Digit. Forensics 4(2/3): 124-137 (2012) - [j4]Giorgos Pentafronimos, Athanasios Karantjias, Nineta Polemi:
Collaborative information and knowledge management environments: The 'what' and 'how'. OR Insight 25(2): 105-123 (2012) - [c12]Theodoros Ntouskas, Nineta Polemi:
Collaborative Security Management Services for Port Information Systems. DCNET/ICE-B/OPTICS 2012: 305-308 - [c11]Nineta Polemi, Theodoros Ntouskas:
Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case. SEC 2012: 567-572 - 2011
- [c10]Nineta Polemi, Giorgos Pentafronimos, Theodoros Ntouskas:
IMP2.0 Migration Collaborative Platform and e-Services. I3E 2011: 44-57 - [c9]Theodoros Ntouskas, Dimitrios Papanikas, Nineta Polemi:
A Collaborative System Offering Security Management Services for SMEs/mEs. ICGS3/e-Democracy 2011: 220-228 - [c8]Giorgos Pentafronimos, Athanasios Karantjias, Nineta Polemi:
Open issues on privacy and trust in collaborative environments. ISCC 2011: 876-880 - 2010
- [j3]Athanasios Karantjias, Nineta Polemi, Teta Stamati, Drakoulis Martakos:
A user-centric and federated Single-Sign-On IAM system for SOA e/m-frameworks. Electron. Gov. an Int. J. 7(3): 216-232 (2010) - [j2]Athanasios Karantjias, Nineta Polemi:
Assessment of advanced cryptographic antiviral techniques. Int. J. Electron. Secur. Digit. Forensics 3(1): 60-72 (2010)
2000 – 2009
- 2009
- [j1]Athanasios Karantjias, Nineta Polemi:
An innovative platform architecture for complex secure e/m-governmental services. Int. J. Electron. Secur. Digit. Forensics 2(4): 338-354 (2009) - [c7]Athanasios Karantjias, Nineta Polemi:
Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems. e-Democracy 2009: 141-150 - [c6]Giorgos Pentafronimos, Thanos Karantjias, Nineta Polemi:
OPSIS: An Open, Preventive and Scalable Migration Information System. e-Democracy 2009: 341-350 - 2008
- [c5]Giorgos Pentafronimos, Spyridon Papastergiou, Nineta Polemi:
Interoperability testing for e-government web services. ICEGOV 2008: 316-321 - [c4]Katerina Papadaki, Nineta Polemi:
Towards a knowledge-sharing approach for Information Security Risk Management. JCKBSE 2008: 453-461 - 2007
- [c3]Katerina Papadaki, Nineta Polemi:
Towards a Systematic Approach for Improving Information Security Risk Management Methods. PIMRC 2007: 1-4 - 2006
- [c2]Maria Virvou, Nineta Polemi, Katerina Kabassi:
Completeness, Security and Privacy in User Modelling for Web-Based Learning. WEBIST (2) 2006: 293-298 - 2001
- [c1]Athena Bourka, Nineta Polemi, Dimitris Koutsouris:
An Overview in Healthcare Information Systems Security. MedInfo 2001: 1242-1246
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint