关注
Elias Pimenidis
标题
引用次数
引用次数
年份
Springer International Publishing: Cham
BA Schulte, TE Goodwin, MH Ferkin
Switzerland, 2016
3892016
Privacy-preserving collaborative recommendations based on random perturbations
N Polatidis, CK Georgiadis, E Pimenidis, H Mouratidis
Expert Systems with Applications 71, 18-25, 2017
852017
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks
N Polatidis, E Pimenidis, M Pavlidis, S Papastergiou, H Mouratidis
Evolving Systems 11, 479-490, 2020
732020
Mobile recommender systems: Identifying the major concepts
E Pimenidis, N Polatidis, H Mouratidis
Journal of Information Science 45 (3), 387-397, 2019
352019
Recommender systems meeting security: From product recommendation to cyber-attack prediction
N Polatidis, E Pimenidis, M Pavlidis, H Mouratidis
Engineering Applications of Neural Networks: 18th International Conference …, 2017
332017
Computer anti-forensics methods and their impact on computer forensic investigation
P Pajek, E Pimenidis
Global Security, Safety, and Sustainability: 5th International Conference …, 2009
322009
Mobile devices and services: Bridging the digital divide in rural areas
E Pimenidis, AB Sideridis, E Antonopoulou
International Journal of Electronic Security and Digital Forensics 2 (4 …, 2009
272009
The use and challenges of cloud computing services in SMEs in Nigeria
R Otuka, D Preston, E Pimenidis
Proceedings of the European Conference on Information Management, 325, 2014
252014
An overview of chatbot technology
I Maglogiannis, L Iliadis, E Pimenidis
Artificial Intelligence Applications and Innovations 584 (1), 373-383, 2020
222020
Smart cross-border e-Gov systems and applications
AB Sideridis, L Protopappas, S Tsiafoulis, E Pimenidis
E-Democracy–Citizen Rights in the World of the New Computing Paradigms: 6th …, 2015
212015
Geo-AI to aid disaster response by memory-augmented deep reservoir computing
K Demertzis, L Iliadis, E Pimenidis
Integrated Computer-Aided Engineering 28 (4), 383-398, 2021
192021
Variational restricted Boltzmann machines to automated anomaly detection
K Demertzis, L Iliadis, E Pimenidis, P Kikiras
Neural Computing and Applications 34 (18), 15207-15220, 2022
182022
Privacy-preserving recommendations in context-aware mobile environments
N Polatidis, CK Georgiadis, E Pimenidis, E Stiakakis
Information & Computer Security 25 (1), 62-79, 2017
172017
Cultivating trust–an electronic-government development model for addressing the needs of developing countries
SA Mousavi, E Pimenidis, H Jahankhani
International Journal of Electronic Security and Digital Forensics 1 (3 …, 2008
152008
A switching multi-level method for the long tail recommendation problem
G Alshammari, JL Jorro-Aragoneses, N Polatidis, S Kapetanakis, ...
Journal of Intelligent & Fuzzy Systems 37 (6), 7189-7198, 2019
132019
Fuzzy graphs: algebraic structure and syntactic recognition
A Kalampakas, S Spartalis, L Iliadis, E Pimenidis
Artificial Intelligence Review 42, 479-490, 2014
132014
Can e-Government systems bridge the digital divide?
E Pimenidis, L Iliadis, CK Georgiadis
Proceedings of the 5th European Conference on Information Management and …, 2011
132011
An explainable semi-personalized federated learning model
K Demertzis, L Iliadis, P Kikiras, E Pimenidis
Integrated Computer-Aided Engineering 29 (4), 335-350, 2022
122022
Electronic government enactment in a small developing country–the palestinian authority’s policy and practice
FJF Shat, A Mousavi, E Pimenidis
E-Democracy, Security, Privacy and Trust in a Digital World: 5th …, 2014
122014
Can e-Government applications contribute to performance improvement in public administration?
E Pimenidis, CK Georgiadis
International Journal of Operations Research and Information Systems (IJORIS …, 2014
122014
系统目前无法执行此操作,请稍后再试。
文章 1–20