George Stephanides
George Stephanides
Professor
Verified email at uom.gr
Title
Cited by
Cited by
Year
Design pattern detection using similarity scoring
N Tsantalis, A Chatzigeorgiou, G Stephanides, ST Halkidis
IEEE transactions on software engineering 32 (11), 896-909, 2006
5062006
The concept of security and trust in electronic payments
T Tsiakis, G Sthephanides
Computers & Security 24 (1), 10-15, 2005
2092005
Predicting the probability of change in object-oriented systems
N Tsantalis, A Chatzigeorgiou, G Stephanides
IEEE Transactions on Software Engineering 31 (7), 601-614, 2005
1332005
The economic approach of information security
T Tsiakis, G Stephanides
Computers & security 24 (2), 105-108, 2005
1312005
Architectural risk analysis of software systems based on security patterns
ST Halkidis, N Tsantalis, A Chatzigeorgiou, G Stephanides
IEEE Transactions on Dependable and Secure Computing 5 (3), 129-142, 2008
1022008
A novel technique for image steganography based on a high payload method and edge detection
A Ioannidou, ST Halkidis, G Stephanides
Expert systems with applications 39 (14), 11517-11524, 2012
952012
Application of graph theory to OO software engineering
A Chatzigeorgiou, N Tsantalis, G Stephanides
Proceedings of the 2006 international workshop on Workshop on …, 2006
542006
A new efficient primal dual simplex algorithm
K Paparrizos, N Samaras, G Stephanides
Computers & Operations Research 30 (9), 1383-1399, 2003
462003
Improved anonymous timed-release encryption
K Chalkias, D Hristu-Varsakelis, G Stephanides
European Symposium on Research in Computer Security, 311-326, 2007
442007
An efficient simplex type algorithm for sparse and dense linear programs
K Paparrizos, N Samaras, G Stephanides
European Journal of Operational Research 148 (2), 323-334, 2003
442003
Evaluating performance and power of object-oriented vs. procedural programming in embedded processors
A Chatzigeorgiou, G Stephanides
International Conference on Reliable Software Technologies, 65-75, 2002
422002
A qualitative analysis of software security patterns
ST Halkidis, A Chatzigeorgiou, G Stephanides
computers & security 25 (5), 379-392, 2006
402006
A qualitative evaluation of security patterns
ST Halkidis, A Chatzigeorgiou, G Stephanides
International Conference on Information and Communications Security, 132-144, 2004
402004
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
K Chalkias, F Baldimtsi, D Hristu-Varsakelis, G Stephanides
International Conference on E-Business and Telecommunications, 227-238, 2007
372007
Improving technical trading systems by using a new MATLAB-based genetic algorithm procedure
S Papadamou, G Stephanides
Mathematical and computer modelling 46 (1-2), 189-197, 2007
322007
A multi-grid graphical password scheme
K Chalkias, A Alexiadis, G Stephanides
Proceedings of the 6th International Conference on Artificial Intelligence …, 2006
302006
Energy consumption analysis of design patterns
A Litke, K Zotos, A Chatzigeorgiou, G Stephanides
Proceedings of the International Conference on Machine Learning and Software …, 2005
252005
Facilitating software extension with design patterns and Aspect-Oriented Programming
KG Kouskouras, A Chatzigeorgiou, G Stephanides
Journal of Systems and Software 81 (10), 1725-1737, 2008
242008
Measuring the NAIRU: evidence from the European Union, USA and Japan
G Stephanides
International Research Journal of Finance and Economics 1 (3), 29-35, 2006
232006
Evaluating object-oriented designs with link analysis
A Chatzigeorgiou, S Xanthos, G Stephanides
Proceedings. 26th International Conference on Software Engineering, 656-665, 2004
232004
The system can't perform the operation now. Try again later.
Articles 1–20