Springer International Publishing: Cham BA Schulte, TE Goodwin, MH Ferkin Switzerland, 2016 | 389 | 2016 |
Privacy-preserving collaborative recommendations based on random perturbations N Polatidis, CK Georgiadis, E Pimenidis, H Mouratidis Expert Systems with Applications 71, 18-25, 2017 | 85 | 2017 |
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks N Polatidis, E Pimenidis, M Pavlidis, S Papastergiou, H Mouratidis Evolving Systems 11, 479-490, 2020 | 73 | 2020 |
Mobile recommender systems: Identifying the major concepts E Pimenidis, N Polatidis, H Mouratidis Journal of Information Science 45 (3), 387-397, 2019 | 35 | 2019 |
Recommender systems meeting security: From product recommendation to cyber-attack prediction N Polatidis, E Pimenidis, M Pavlidis, H Mouratidis Engineering Applications of Neural Networks: 18th International Conference …, 2017 | 33 | 2017 |
Computer anti-forensics methods and their impact on computer forensic investigation P Pajek, E Pimenidis Global Security, Safety, and Sustainability: 5th International Conference …, 2009 | 32 | 2009 |
Mobile devices and services: Bridging the digital divide in rural areas E Pimenidis, AB Sideridis, E Antonopoulou International Journal of Electronic Security and Digital Forensics 2 (4 …, 2009 | 27 | 2009 |
The use and challenges of cloud computing services in SMEs in Nigeria R Otuka, D Preston, E Pimenidis Proceedings of the European Conference on Information Management, 325, 2014 | 25 | 2014 |
An overview of chatbot technology I Maglogiannis, L Iliadis, E Pimenidis Artificial Intelligence Applications and Innovations 584 (1), 373-383, 2020 | 22 | 2020 |
Smart cross-border e-Gov systems and applications AB Sideridis, L Protopappas, S Tsiafoulis, E Pimenidis E-Democracy–Citizen Rights in the World of the New Computing Paradigms: 6th …, 2015 | 21 | 2015 |
Geo-AI to aid disaster response by memory-augmented deep reservoir computing K Demertzis, L Iliadis, E Pimenidis Integrated Computer-Aided Engineering 28 (4), 383-398, 2021 | 19 | 2021 |
Variational restricted Boltzmann machines to automated anomaly detection K Demertzis, L Iliadis, E Pimenidis, P Kikiras Neural Computing and Applications 34 (18), 15207-15220, 2022 | 18 | 2022 |
Privacy-preserving recommendations in context-aware mobile environments N Polatidis, CK Georgiadis, E Pimenidis, E Stiakakis Information & Computer Security 25 (1), 62-79, 2017 | 17 | 2017 |
Cultivating trust–an electronic-government development model for addressing the needs of developing countries SA Mousavi, E Pimenidis, H Jahankhani International Journal of Electronic Security and Digital Forensics 1 (3 …, 2008 | 15 | 2008 |
A switching multi-level method for the long tail recommendation problem G Alshammari, JL Jorro-Aragoneses, N Polatidis, S Kapetanakis, ... Journal of Intelligent & Fuzzy Systems 37 (6), 7189-7198, 2019 | 13 | 2019 |
Fuzzy graphs: algebraic structure and syntactic recognition A Kalampakas, S Spartalis, L Iliadis, E Pimenidis Artificial Intelligence Review 42, 479-490, 2014 | 13 | 2014 |
Can e-Government systems bridge the digital divide? E Pimenidis, L Iliadis, CK Georgiadis Proceedings of the 5th European Conference on Information Management and …, 2011 | 13 | 2011 |
An explainable semi-personalized federated learning model K Demertzis, L Iliadis, P Kikiras, E Pimenidis Integrated Computer-Aided Engineering 29 (4), 335-350, 2022 | 12 | 2022 |
Electronic government enactment in a small developing country–the palestinian authority’s policy and practice FJF Shat, A Mousavi, E Pimenidis E-Democracy, Security, Privacy and Trust in a Digital World: 5th …, 2014 | 12 | 2014 |
Can e-Government applications contribute to performance improvement in public administration? E Pimenidis, CK Georgiadis International Journal of Operations Research and Information Systems (IJORIS …, 2014 | 12 | 2014 |