{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
"Guidelines on a Mobile Security Lab Course." \i Information & Security: An International Journal\i0  37 (2017): 35-44.\par \par "Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training." \i Information & Security: An International Journal\i0  35, no. 1 (2016): 99-120.\par \par \i PBX Security and Forensics: A Practical Approach\i0 . Springer, 2013.\par \par "PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure." \i Information & Security: An International Journal\i0  28, no. 1 (2012): 89-97.\par \par \i Cybercrime in Fixed Telephony Systems\i0  In \i Seminar 62/2011, High Tech & Cyber Crime\i0 . Brdo near Kranj, Slovenia: European Police College (CEPOL), 2011.\par \par \i Detecting Cybercrime in Modern Telecommunication Systems\i0  In \i Seminar 64/2010, Cyber Crime & High Tech\i0 . Athens: European Police College (CEPOL), 2010.\par \par Androulidakis, Iosif. \i PBX security\i0  In \i 2nd Pan-Hellenic Conference on Electronic Crime\i0 . Athens, 2004.\par \par }