1. N. Sklavos, "Privacy in a Digital, Networked World: Technologies, Implications and Solutions", Book Review, Cryptography Journal, Multidisciplinary Digital Publishing Institute, Volume 1, Issue 1, 2017.
  2. N. Sklavos, "Web Application Security, A Beginner’s Guide", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  3. N. Sklavos, "Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  4. N. Sklavos, "Security Metrics, A Beginner’s Guide", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  5. N. Sklavos, "Cryptography and Network Security: Principles and Practice", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  6. N. Sklavos, "Securing the Clicks: Network Security in the Age of Social Media", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  7. N. Sklavos, "CompTIA Security + Certification Passport (Exam SY0-301)", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  8. N. Sklavos, "Introduction to Computer Networks and Cybersecurity", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  9. N. Sklavos, "C(I)SO, And Now What? How to Successfully Build Security by Design", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2013.
  10. N. Sklavos, S. Zeadally, C. Alcaraz, Introduction to Special Issue "Modern trends in Applied Security: Architectures, Implementations, and Applications", Computers & Electrical Engineering, Elsevier Science Press, Vol. 37, Number 2, pp. 127-128, 2011.
  11. N. Sklavos, M. McLoone, X. Zhang, Introduction to Special Issue "Next Generation Hardware Architectures for Secure Mobile Computing", Mobile, Networks and Applications (MONET), Springer-Verlag Publishers, Issue 12, pp. 229-230 2007.
  12. P. Kitsos, N. Sklavos, Introduction to Special Issue "Security of Computers & Networks", Computers & Electrical Engineering, Elsevier Science Press, Vol. 33, Numbers 5-6, September-November, 2007.
  13. N. Sklavos, "Data Network Engineer - A Review", IEEE Circuits and Devices, Vol. 21, Issue: 6, pp. 53-53, 2006.
  14. N. Sklavos, "System Level Design Model with Reuse of System IP - A Review", IEEE Circuits and Devices, Vol. 22, Issue: 3, pp. 37-37, 2006.
  15. N. Sklavos, "Synthesis Techniques and Optimizations for Reconfigurable Systems - A Review", IEEE Circuits and Devices, Vol. 22, Issue: 4, pp. 31-31, 2006.
  16. Chr. Rechberger, V. Rijmen, N. Sklavos, "NIST Cryptographic Workshop on Hash Functions - A Report", IEEE Security and Privacy, Vol. 4, No 1, Issue: January/February, pp. 54-56, 2006.
  17. N. Sklavos, N.A. Moldovyan, V. Gorodetsky, and O. Koufopavlou, "Computer Network Security - A Report", IEEE Security and Privacy, Vol. 2, No 1, Issue: January/February, pp. 49-52, 2004.

Who's online

We have 30 guests and no members online