
{"id":5338,"date":"2021-09-22T21:16:55","date_gmt":"2021-09-22T18:16:55","guid":{"rendered":"https:\/\/www.ihu.gr\/ucips\/?page_id=5338"},"modified":"2023-02-01T07:03:01","modified_gmt":"2023-02-01T05:03:01","slug":"dimitrios-baltatzis","status":"publish","type":"page","link":"https:\/\/www.ihu.gr\/ucips\/cv\/dimitrios-baltatzis","title":{"rendered":"Dimitrios Baltatzis"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:10px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><h2 class=\"fusion-responsive-typography-calculated\" data-fontsize=\"34\" data-lineheight=\"49.98px\">Dr Dimitrios Baltatzis<\/h2>\n<p><a href=\"https:\/\/www.ihu.gr\/ucips\/wp-content\/uploads\/sites\/4\/2021\/09\/baltatzis1.jpg\"><img decoding=\"async\" class=\"alignleft size-full wp-image-5339\" src=\"https:\/\/www.ihu.gr\/ucips\/wp-content\/uploads\/sites\/4\/2021\/09\/baltatzis1.jpg\" alt=\"\" width=\"117\" height=\"151\" \/><\/a><\/p>\n<p><strong>Dimitris Baltatzis<\/strong>\u00a0received his PhD from the Faculty of Engineering of Aristotle University of Thessaloniki (2012), a\u00a0 MSc. in Computer Science from University of Goteborg, Sweden (1990) and BSc. from the Department of Mathematics of Aristotle University (1986)<\/p>\n<p>He taught numerous topics related to computer security and programming in: Aristotle University of Thessaloniki Faculty of Engineering Department of Electrical and Computer Engineering, Information Security, MSc Interdepartmental \/ Interdisciplinary Postgraduate Program on Advanced Computer and Communication Systems &#8211; Electronic Payment and Security, Faculty of Medicine, Msc &#8211; Medical Information Systems Security, National and Kapodistrian University of Athens \u2013MSc Medical Information Systems Security et al<\/p>\n<p>His research has been focused on Information Security models, Cybersecurity and mostly on Digital Forensics and Intrusion detection models.<\/p>\n<p>He currently serves as a Faculty Member of the School of Science and Technology in International Hellenic University (IHU), Thessaloniki, Greece.<\/p>\n<p>He is the author of several papers in scientific journals and conference proceedings.<\/p>\n<p><strong>E-mail:<\/strong>\u00a0<a href=\"mailto:d.baltatzis@ihu.edu.gr\">d.baltatzis@ihu.edu.gr<\/a><\/p>\n<p><strong>SCIENTIFIC PUBLICATIONS<\/strong><\/p>\n<p><strong>A)\u00a0<\/strong><strong>Extended<\/strong>\u00a0<strong>abstracts<\/strong>\u00a0<strong>in<\/strong>\u00a0<strong>international<\/strong>\u00a0<strong>journals<\/strong>\u00a0<strong>\u2013 \u0395\u03ba\u03c4\u03b5\u03c4\u03b1\u03bc\u03ad\u03bd\u03b5\u03c2 \u03a0\u03b5\u03c1\u03b9\u03bb\u03ae\u03c8\u03b5\u03b9\u03c2 \u03c3\u03b5 \u0394\u03b9\u03b5\u03b8\u03bd\u03ae \u0395\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03bf\u03bd\u03b9\u03ba\u03ac \u03a0\u03b5\u03c1\u03b9\u03bf\u03b4\u03b9\u03ba\u03ac \u03bc\u03b5 \u03ba\u03c1\u03b9\u03c4\u03ad\u03c2<\/strong><\/p>\n<p>AJ1. Baltatzis J., Georgiadis C. and Pangalos G., &#8220;Role-based Authorizations Using Mobile Agents in Healthcare Organizations&#8221;, INT J TECHNOLOGY &amp; HEALTH CARE Vol. 10, No. 6, 2002, pp. 449-450.<\/p>\n<p><strong>B) International Conference Proceedings \u2013 \u03a0\u03c1\u03b1\u03ba\u03c4\u03b9\u03ba\u03ac \u0394\u03b9\u03b5\u03b8\u03bd\u03ce\u03bd \u0395\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03bf\u03bd\u03b9\u03ba\u03ce\u03bd \u03a3\u03c5\u03bd\u03b5\u03b4\u03c1\u03af\u03c9\u03bd \u03bc\u03b5 \u03ba\u03c1\u03b9\u03c4\u03ad\u03c2<\/strong><\/p>\n<p>\u03921. Georgiadis, C.K, Baltatzis, D., and Pangalos, G., \u201cDynamic Role Management in Secure Distributed e-Government Environments\u201d, in Proceedings of the 3rd Annual International Conference on Global e-Security (ICGeS-2007), London, England, April 2007, pp.222-230.<\/p>\n<p>\u03922. lioudis C., Baltatzis D., Pangalos G., and Georgiadis C., \u201cSecuring Healthgrid Environments\u201d, in Proc. of the International Conference on Security and Cryptography (SECRYPT 2007),.<\/p>\n<p>\u03923. Baltatzis, D., Georgiadis, C.K, and Pangalos, I., \u201cMobile Agents in E-commerce Environments: Supporting Collaborative Activities\u201d, in Proceedings of the IEEE International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2005), Vienna, Austria, November 2005, pp.205-210.<\/p>\n<p>\u03924. Baltatzis, D., Georgiadis, C., and Pangalos, G., \u201cA Flexible Authorization Mechanism for Virtual Organizations\u201d, in Proceedings of the IEEE 39th Annual 2005 International CARNAHAN Conference on Security Technology, Las Palmas de G.C., Spain, October 2005, pp. 97-100.<\/p>\n<p>\u03925. D. Baltatzis, G. Pangalos, et.al, \u201cSecuring grid computing based business environments, New Horizons in Business, Industry and Education,\u201d 4th International Conference, Corfu, August 2005<\/p>\n<p>\u03926. Baltatzis D., Kortesis S., Georgiadis Ch. et. al., \u201cUsing RBAC for the Mobile Agent Authorization Problem\u201d, in the 4th International Network Conference (INC 2004), University of Plymouth, UK, July 2004, ISBN 1-84102-125-3, pp.279-286.<\/p>\n<p>\u03927. Pangalos G., Baltatzis J., Georgiadis C., et al., \u201cSecurity Issues of Electronic Democracy Environments Using Mobile Agents\u201d, 1st National Conference with international participation \u201cElectronic Democracy: Information Society and Citizen&#8217;s rights\u201d, Scientific Council for Information Society (SCIS 2003), Athens, Greece, September 2003.<\/p>\n<p>\u03928. Georgiadis C., Baltatzis D., and Pangalos G., \u201cAccess Control for E-Commerce Using Mobile Agents\u201d, 3rd Annual Information Security South Africa Conference (ISSA 2003), Sandton, July 2003, pp. 217-227.<\/p>\n<p>\u03929. C.K. Georgiadis, J. Baltatzis, and G.I. Pangalos, &#8220;Programming Secure Mobile Agents in Healthcare Environments using Role-based Permissions&#8221;, XVIIIth International Congress of the European Federation for Medical Informatics (MIE 2003), St. Malo, France, May 2003, Studies in Health Technology and Informatics (Vol. 95), R. Baud et. al. (Eds.), IOS Press, pp. 136-140.<\/p>\n<p>\u039210. N Serketzis, V Katos, C Ilioudis, D Baltatzis, GJ Pangalos, \u00abTowards a Threat Intelligence Informed Digital Forensics Readiness Framework\u00bb, Twenty-Fifth European Conference on Information Systems (ECIS), Guimar\u00e3es, Portugal, 2017<\/p>\n<p><strong>J<\/strong>\u00a0<strong>)\u00a0<\/strong><strong>JOURNALS &#8211; \u0391\u03a1\u0398\u03a1\u0391 \u03a3\u0395 \u0394\u0399\u0395\u0398\u039d\u0397 \u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u039f\u039d\u0399\u039a\u0391 \u03a0\u0395\u03a1\u0399\u039f\u0394\u0399\u039a\u0391 (\u03bc\u03b5 \u03ba\u03c1\u03b9\u03c4\u03ad\u03c2)<\/strong><\/p>\n<p>J1. Georgiadis C.K., Baltatzis D., and Pangalos G., \u201cSecure mobile agent environments: modelling role assignments\u201d, in Int. J. Electronic Security and Digital Forensics, Inderscience, Vol. 1, No. 3, 2008, pp. 249-267.<\/p>\n<p>J2. Dimitrios Baltatzis, Christos Ilioudis, and George Pangalos, \u201cA Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments\u201d, in Information Security Journal: A Global Perspective, Taylor &amp; Francis, VOL. 21, ISSUE 1, 2012, ISSN: 1939-3555 DOI: 10.1080\/19393555.2011.624161.<\/p>\n<p>J3. Simos Veloudis, Dimitrios Baltatzis, Christos ilioudis, George Pangalos, \u201cA FORMAL FRAMEWORK TO SUPPORT DYNAMIC AUTHORIZATION TO ONLINE COLLABORATIVE ENVIRONMENTS\u201d, Int. J. Computational Science and Engineering, Vol. 9, No. 4, 2014<\/p>\n<p>J4. Nikolaos Serketzis (Aristotle University of Thessaloniki, Thessaloniki, Greece), Vasilios Katos (Bournemouth University, Poole, UK), Christos Ilioudis (Alexander Technological Educational Institute of Thessaloniki, Thessaloniki, Greece), Dimitrios Baltatzis (International Hellenic University, Thessaloniki, Greece) and George J. Pangalos (Aristotle University of Thessaloniki, Thessaloniki, Greece), A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness,\u00a0<a href=\"https:\/\/www.igi-global.com\/journal\/international-journal-systems-society\/75104\">International Journal of Systems and Society (IJSS)\u00a0<\/a>Volume 4 Issue 2 July-December 2017, DOI: 10.4018\/IJSS.2017070105<\/p>\n<p>J5. D. Baltatzis (International Hellenic University, Thessaloniki, Greece), P. Dinaki (International Hellenic University, Thessaloniki, Greece), N. Serketzis (Aristotle University of Thessaloniki, Greece) Improving Intrusion Detection with Deep Packet Inspection and Regular Expressions, International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 2, February 2018<\/p>\n<p class=\"m_8062473884727323007MsoListParagraphCxSpFirst\">J6.\u00a0 <u><\/u>Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, George J. Pangalos, (2019) &#8220;Actionable threat intelligence for digital forensics readiness&#8221;, Information &amp; Computer Security, Vol. 27 Issue: 2, pp.273-291,\u00a0<a title=\"https:\/\/doi.org\/10.1108\/ICS-09-2018-0110\" href=\"https:\/\/doi.org\/10.1108\/ICS-09-2018-0110\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1108\/ICS-09-2018-0110<\/a><u><\/u><u><\/u><\/p>\n<p class=\"m_8062473884727323007MsoListParagraphCxSpMiddle\"><u><\/u><span class=\"m_8062473884727323007MsoHyperlink\">J7. <\/span><u><\/u>Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, George J. Pangalos \u201cImproving Forensic Triage Efficiency Through Cyber Threat Intelligence\u201d. Future Internet, 2019,\u00a0<em>11<\/em>(7), 162;\u00a0<a title=\"https:\/\/doi.org\/10.3390\/fi11070162\" href=\"https:\/\/doi.org\/10.3390\/fi11070162\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.3390\/fi11070162<\/a><u><\/u><u><\/u><\/p>\n<p class=\"m_8062473884727323007MsoListParagraphCxSpLast\"><u><\/u>J8. <u><\/u>G. Kiachidis, D. Baltatzis, A Comparative Review of Malware Analysis Methodologies, International Journal of Network Security &amp; Its Applications (IJNSA),\u00a0<a name=\"m_8062473884727323007_nov\"><\/a>November 2021, Volume 13, Number 6,\u00a0<a title=\"http:\/\/aircconline.com\/abstract\/ijnsa\/v13n6\/13621ijnsa08.html\" href=\"http:\/\/aircconline.com\/abstract\/ijnsa\/v13n6\/13621ijnsa08.html\" target=\"_blank\" rel=\"noopener\">http:\/\/aircconline.com\/abstract\/ijnsa\/v13n6\/13621ijnsa08.html<\/a><strong>,<br \/>\n<\/strong><u><\/u><u><\/u><a title=\"https:\/\/aircconline.com\/ijnsa\/V13N6\/13621ijnsa08.pdf\" href=\"https:\/\/aircconline.com\/ijnsa\/V13N6\/13621ijnsa08.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/aircconline.com\/ijnsa\/V13N6\/13621ijnsa08.pdf<\/a><u><\/u><u><\/u><br \/>\n<a title=\"https:\/\/airccse.org\/journal\/jnsa21_current.html\" href=\"https:\/\/airccse.org\/journal\/jnsa21_current.html\" target=\"_blank\" rel=\"noopener\">https:\/\/airccse.org\/journal\/jnsa21_current.html<\/a><\/p>\n<p><strong>TEACHING<\/strong><\/p>\n<ul>\n<li>Cybercrime and Incident Response<\/li>\n<li><u><\/u><u><\/u>Computer Forensics<\/li>\n<li><u><\/u><u><\/u>Intrusion Detection and Event Management<\/li>\n<li>Advanced Digital Forensics and Malware Analysis<\/li>\n<\/ul>\n<p><strong>PHD<\/strong><\/p>\n<p><a href=\"http:\/\/invenio.lib.auth.gr\/record\/129106\/files\/GRI-2012-8572.pdf?version=1\">http:\/\/invenio.lib.auth.gr\/record\/129106\/files\/GRI-2012-8572.pdf?version=1<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":3268,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5338","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/pages\/5338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/comments?post=5338"}],"version-history":[{"count":5,"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/pages\/5338\/revisions"}],"predecessor-version":[{"id":9020,"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/pages\/5338\/revisions\/9020"}],"up":[{"embeddable":true,"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/pages\/3268"}],"wp:attachment":[{"href":"https:\/\/www.ihu.gr\/ucips\/wp-json\/wp\/v2\/media?parent=5338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}