Design pattern detection using similarity scoring N Tsantalis, A Chatzigeorgiou, G Stephanides, ST Halkidis IEEE transactions on software engineering 32 (11), 896-909, 2006 | 646 | 2006 |
The concept of security and trust in electronic payments T Tsiakis, G Sthephanides Computers & Security 24 (1), 10-15, 2005 | 356 | 2005 |
Predicting the probability of change in object-oriented systems N Tsantalis, A Chatzigeorgiou, G Stephanides IEEE Transactions on Software Engineering 31 (7), 601-614, 2005 | 153 | 2005 |
The economic approach of information security T Tsiakis, G Stephanides Computers & security 24 (2), 105-108, 2005 | 151 | 2005 |
A novel technique for image steganography based on a high payload method and edge detection A Ioannidou, ST Halkidis, G Stephanides Expert systems with applications 39 (14), 11517-11524, 2012 | 129 | 2012 |
Architectural risk analysis of software systems based on security patterns ST Halkidis, N Tsantalis, A Chatzigeorgiou, G Stephanides IEEE Transactions on Dependable and Secure Computing 5 (3), 129-142, 2008 | 127 | 2008 |
Application of graph theory to OO software engineering A Chatzigeorgiou, N Tsantalis, G Stephanides Proceedings of the 2006 international workshop on Workshop on …, 2006 | 57 | 2006 |
Improved anonymous timed-release encryption K Chalkias, D Hristu-Varsakelis, G Stephanides Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007 | 56 | 2007 |
A new efficient primal dual simplex algorithm K Paparrizos, N Samaras, G Stephanides Computers & Operations Research 30 (9), 1383-1399, 2003 | 51 | 2003 |
Two types of key-compromise impersonation attacks against one-pass key establishment protocols K Chalkias, F Baldimtsi, D Hristu-Varsakelis, G Stephanides E-business and Telecommunications: 4th International Conference, ICETE 2007 …, 2009 | 46 | 2009 |
A qualitative analysis of software security patterns ST Halkidis, A Chatzigeorgiou, G Stephanides computers & security 25 (5), 379-392, 2006 | 46 | 2006 |
Evaluating performance and power of object-oriented vs. procedural programming in embedded processors A Chatzigeorgiou, G Stephanides International Conference on Reliable Software Technologies, 65-75, 2002 | 46 | 2002 |
A qualitative evaluation of security patterns ST Halkidis, A Chatzigeorgiou, G Stephanides Information and Communications Security: 6th International Conference, ICICS …, 2004 | 45 | 2004 |
An efficient simplex type algorithm for sparse and dense linear programs K Paparrizos, N Samaras, G Stephanides European Journal of Operational Research 148 (2), 323-334, 2003 | 43 | 2003 |
Energy consumption analysis of design patterns A Litke, K Zotos, A Chatzigeorgiou, G Stephanides Proceedings of the International Conference on Machine Learning and Software …, 2005 | 42 | 2005 |
Improving technical trading systems by using a new MATLAB-based genetic algorithm procedure S Papadamou, G Stephanides Mathematical and computer modelling 46 (1-2), 189-197, 2007 | 40 | 2007 |
Evaluating object-oriented designs with link analysis A Chatzigeorgiou, S Xanthos, G Stephanides Proceedings. 26th International Conference on Software Engineering, 656-665, 2004 | 32 | 2004 |
A multi-grid graphical password scheme K Chalkias, A Alexiadis, G Stephanides Proceedings of the Sixth International Conference on Artificial Intelligence …, 2006 | 31 | 2006 |
Energy complexity of software in embedded systems K Zotos, A Litke, A Chatzigeorgiou, S Nikolaidis, G Stephanides arXiv preprint nlin/0505007, 2005 | 28 | 2005 |
Energy metric for software systems A Chatzigeorgiou, G Stephanides Software Quality Journal 10, 355-371, 2002 | 28 | 2002 |