Elias Pimenidis
TitleCited byYear
Privacy-preserving collaborative recommendations based on random perturbations
N Polatidis, CK Georgiadis, E Pimenidis, H Mouratidis
Expert Systems with Applications 71, 18-25, 2017
242017
Computer anti-forensics methods and their impact on computer forensic investigation
P Pajek, E Pimenidis
International Conference on Global Security, Safety, and Sustainability, 145-155, 2009
212009
Smart cross-border e-gov systems and applications
AB Sideridis, L Protopappas, S Tsiafoulis, E Pimenidis
International Conference on e-Democracy, 151-165, 2015
142015
The use and challenges of cloud computing services in SMEs in Nigeria
R Otuka, D Preston, E Pimenidis
proceedings of the European Conference on Information Management and …, 2014
142014
Mobile devices and services: bridging the digital divide in rural areas
E Pimenidis, AB Sideridis, E Antonopoulou
International Journal of Electronic Security and Digital Forensics 2 (4 …, 2009
132009
Discovering Speech Acts in Online Discussions: A Tool-supported method.
I Morales-Ramirez, A Perini
CAiSE (Forum/Doctoral Consortium), 137-144, 2014
112014
Web services enabling virtual enterprise transactions
CK Georgiadis, E Pimenidis
Proc. of the IADIS Int. Conf. E-Commerce, 297-302, 2006
112006
Recommender systems meeting security: From product recommendation to cyber-attack prediction
N Polatidis, E Pimenidis, M Pavlidis, H Mouratidis
International Conference on Engineering Applications of Neural Networks, 508-519, 2017
102017
Can e-Government applications contribute to performance improvement in public administration?
E Pimenidis, CK Georgiadis
International Journal of Operations Research and Information Systems (IJORIS …, 2014
92014
An evaluation of the initiatives and the progress made on e-Government services in the EU
AB Sideridis, E Pimenidis, L Protopappas, M Koukouli
Global Security, Safety and Sustainability & e-Democracy, 263-270, 2011
92011
Cultivating trust–an electronic-government development model for addressing the needs of developing countries
SA Mousavi, E Pimenidis, H Jahankhani
International Journal of Electronic Security and Digital Forensics 1 (3 …, 2008
92008
Social media applications in e-government: A risk assessment approach
SA Mousavi, E Pimenidis
European Conference on e-Government, 180, 2014
82014
Can e-Government Systems Bridge the Digital Divide?
E Pimenidis, L Iliadis, CK Georgiadis
Proceedings of the 5th European Conference on Information Management and …, 2011
82011
Simulation of large spiking neural networks on distributed architectures, The “DAMNED” Simulator
A Mouraud, D Puzenat
International Conference on Engineering Applications of Neural Networks, 359-370, 2009
82009
An adaptive temporal-causal network model for stress extinction using fluoxetine
SS Mohammadi Ziabari, L Iliadis, I Maglogiannis, J MacIntyre, ...
Springer New York LLC, 2019
72019
Electronic government enactment in a small developing country–the palestinian authority’s policy and practice
FJF Shat, A Mousavi, E Pimenidis
International Conference on e-Democracy, 83-92, 2013
72013
Vision of Electronic Government implementation in Kurdistan region of Iraq
S Shareef, E Pimenidis, J Arreymbi, H Jahankhani
10th European Conference on e-Government ECEG 2010, National Centre for …, 2010
72010
Developing a computer game for university library induction
E Pimenidis
Proceedings of the European Conference on Game-Based Learning. Reading …, 2007
72007
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks
N Polatidis, E Pimenidis, M Pavlidis, S Papastergiou, H Mouratidis
Evolving Systems, 1-12, 2018
62018
Privacy-preserving recommendations in context-aware mobile environments
N Polatidis, CK Georgiadis, E Pimenidis, E Stiakakis
Information & Computer Security 25 (1), 62-79, 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20