Elias Pimenidis
Title
Cited by
Cited by
Year
Privacy-preserving collaborative recommendations based on random perturbations
N Polatidis, CK Georgiadis, E Pimenidis, H Mouratidis
Expert Systems with Applications 71, 18-25, 2017
342017
Computer anti-forensics methods and their impact on computer forensic investigation
P Pajek, E Pimenidis
International Conference on Global Security, Safety, and Sustainability, 145-155, 2009
212009
Mobile devices and services: bridging the digital divide in rural areas
E Pimenidis, AB Sideridis, E Antonopoulou
International Journal of Electronic Security and Digital Forensics 2 (4 …, 2009
182009
Smart cross-border e-Gov systems and applications
AB Sideridis, L Protopappas, S Tsiafoulis, E Pimenidis
International Conference on e-Democracy, 151-165, 2015
152015
The use and challenges of cloud computing services in SMEs in Nigeria
R Otuka, D Preston, E Pimenidis
proceedings of the European Conference on Information Management and …, 2014
152014
Discovering Speech Acts in Online Discussions: A Tool-supported method.
I Morales-Ramirez, A Perini
CAiSE (Forum/Doctoral Consortium), 137-144, 2014
112014
Web services enabling virtual enterprise transactions
CK Georgiadis, E Pimenidis
Proc. of the IADIS Int. Conf. E-Commerce, 297-302, 2006
112006
Recommender systems meeting security: From product recommendation to cyber-attack prediction
N Polatidis, E Pimenidis, M Pavlidis, H Mouratidis
International Conference on Engineering Applications of Neural Networks, 508-519, 2017
102017
Can e-Government applications contribute to performance improvement in public administration?
E Pimenidis, CK Georgiadis
International Journal of Operations Research and Information Systems (IJORIS …, 2014
102014
Can e-Government Systems Bridge the Digital Divide?
E Pimenidis, L Iliadis, CK Georgiadis
Proceedings of the 5th European Conference on Information Management and …, 2011
102011
Cultivating trust–an electronic-government development model for addressing the needs of developing countries
SA Mousavi, E Pimenidis, H Jahankhani
International Journal of Electronic Security and Digital Forensics 1 (3 …, 2008
102008
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks
N Polatidis, E Pimenidis, M Pavlidis, S Papastergiou, H Mouratidis
Evolving Systems, 1-12, 2018
92018
Financial Assessment of London Plan Policy 4A. 2 by probabilistic inference and influence diagrams
A Hosseinian-Far, E Pimenidis, H Jahankhani, DC Wijeyesekera
Artificial intelligence applications and innovations, 51-60, 2011
92011
An evaluation of the initiatives and the progress made on e-Government services in the EU
AB Sideridis, E Pimenidis, L Protopappas, M Koukouli
Global Security, Safety and Sustainability & e-Democracy, 263-270, 2011
92011
An adaptive temporal-causal network model for stress extinction using fluoxetine
SSM Ziabari
IFIP International Conference on Artificial Intelligence Applications and …, 2019
82019
Fuzzy graphs: algebraic structure and syntactic recognition
A Kalampakas, S Spartalis, L Iliadis, E Pimenidis
Artificial Intelligence Review 42 (3), 479-490, 2014
82014
Vision of Electronic Government implementation in Kurdistan region of Iraq
S Shareef, E Pimenidis, J Arreymbi, H Jahankhani
10th European Conference on e-Government ECEG 2010, National Centre for …, 2010
82010
Simulation of large spiking neural networks on distributed architectures, The “DAMNED” Simulator
A Mouraud, D Puzenat
International Conference on Engineering Applications of Neural Networks, 359-370, 2009
82009
Privacy-preserving recommendations in context-aware mobile environments
N Polatidis, CK Georgiadis, E Pimenidis, E Stiakakis
Information & Computer Security, 2017
72017
Social media applications in e-government: A risk assessment approach
SA Mousavi, E Pimenidis
European Conference on e-Government, 180, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20