Elias Pimenidis

Orcid: 0000-0003-3593-8640

According to our database1, Elias Pimenidis authored at least 60 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
HEDL-IDS<sup>2</sup>: An Innovative Hybrid Ensemble Deep Learning Prototype for Cyber Intrusion Detection.
Proceedings of the Engineering Applications of Neural Networks, 2024

2023
Technologies of the 4th industrial revolution with applications.
Neural Comput. Appl., October, 2023

Correction to: Special issue on large-scale neural computing and cybersecurity opportunities using artificial intelligence.
Neural Comput. Appl., June, 2023

VPNDroid: Malicious Android VPN Detection Using a CNN-RF Method.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

Can Machine Learning Support Improvement in Effective Nutrition of Patients in Critical Care Units?
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

BotDroid: Permission-Based Android Botnet Detection Using Neural Networks.
Proceedings of the Engineering Applications of Neural Networks, 2023

2022
Special issue on large-scale neural computing and cybersecurity opportunities using artificial intelligence.
Neural Comput. Appl., 2022

Variational restricted Boltzmann machines to automated anomaly detection.
Neural Comput. Appl., 2022

An explainable semi-personalized federated learning model.
Integr. Comput. Aided Eng., 2022

A Novel LSTM-CNN Architecture to Forecast Stock Prices.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Supporting Patient Nutrition in Critical Care Units.
Proceedings of the Engineering Applications of Neural Networks, 2022

Fast and Accurate Evaluation of Collaborative Filtering Recommendation Algorithms.
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022

2021
Geo-AI to aid disaster response by memory-augmented deep reservoir computing.
Integr. Comput. Aided Eng., 2021

Federated Blockchained Supply Chain Management: A CyberSecurity and Privacy Framework.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021

Establishing the Informational Requirements for Modelling Open Domain Dialogue and Prototyping a Retrieval Open Domain Dialogue System.
Proceedings of the Computational Collective Intelligence - 13th International Conference, 2021

Recommender Systems Algorithm Selection Using Machine Learning.
Proceedings of the 22nd Engineering Applications of Neural Networks Conference, 2021

Blockchained Adaptive Federated Auto MetaLearning BigData and DevOps CyberSecurity Architecture in Industry 4.0.
Proceedings of the 22nd Engineering Applications of Neural Networks Conference, 2021

2020
An explanation-based approach for experiment reproducibility in recommender systems.
Neural Comput. Appl., 2020

Special issue on engineering applications of neural networks.
Neural Comput. Appl., 2020

From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks.
Evol. Syst., 2020

Automated Screening of Patients for Dietician Referral.
Proceedings of the 21st EANN (Engineering Applications of Neural Networks) 2020 Conference, 2020

Large-Scale Geospatial Data Analysis: Geographic Object-Based Scene Classification in Remote Sensing Images by GIS and Deep Residual Learning.
Proceedings of the 21st EANN (Engineering Applications of Neural Networks) 2020 Conference, 2020

2019
Mobile recommender systems: Identifying the major concepts.
J. Inf. Sci., 2019

A switching multi-level method for the long tail recommendation problem.
J. Intell. Fuzzy Syst., 2019

A Guideline-Based Approach for Assisting with the Reproducibility of Experiments in Recommender Systems Evaluation.
Int. J. Artif. Intell. Tools, 2019

Hybrid Data Set Optimization in Recommender Systems Using Fuzzy T-Norms.
Proceedings of the Artificial Intelligence Applications and Innovations, 2019

Secure Social Media Spaces for Communities of Vulnerable People.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2018
An Approach for Web Service Selection and Dynamic Composition Based on Linked Open Data.
Trans. Comput. Collect. Intell., 2018

Reproducibility of Experiments in Recommender Systems Evaluation.
Proceedings of the Artificial Intelligence Applications and Innovations, 2018

Reproduction of Experiments in Recommender Systems Evaluation Based on Explanations.
Proceedings of the Engineering Applications of Neural Networks, 2018

2017
A Method for Privacy-preserving Collaborative Filtering Recommendations.
J. Univers. Comput. Sci., 2017

Privacy-preserving recommendations in context-aware mobile environments.
Inf. Comput. Secur., 2017

Privacy-preserving collaborative recommendations based on random perturbations.
Expert Syst. Appl., 2017

The Contribution of Smart Cross-Border e-Gov Systems to Life Sciences and their Applications.
Proceedings of the 8th International Conference on Information and Communication Technologies in Agriculture, 2017

Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction.
Proceedings of the Engineering Applications of Neural Networks, 2017

2016
Utilizing Linked Open Data for Web Service Selection and Composition to Support e-Commerce Transactions.
Proceedings of the Computational Collective Intelligence - 8th International Conference, 2016

2015
Smart Cross-Border e-Gov Systems and Applications.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

A Method for Privacy-Preserving Context-Aware Mobile Recommendations.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
Can e-Government Applications Contribute to Performance Improvement in Public Administration?
Int. J. Oper. Res. Inf. Syst., 2014

Fuzzy graphs: algebraic structure and syntactic recognition.
Artif. Intell. Rev., 2014

2013
Ensuring Cloud Security: Current Concerns and Research Challenges.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

Electronic Government Enactment in a Small Developing Country - the Palestinian Authority's Policy and Practice.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

Building a Logic for a Public Administration Service Transformation Algorithm.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

Modeling Spatiotemporal Wild Fire Data with Support Vector Machines and Artificial Neural Networks.
Proceedings of the Engineering Applications of Neural Networks, 2013

2012
A Probabilistic Knowledge-Based Information System for Environmental Policy Modeling and Decision Making.
Proceedings of the Artificial Intelligence Applications and Innovations, 2012

2011
Fuzzy Modeling of the Climate Change Effect to Drought and to Wild Fires in Cyprus.
Proceedings of the Engineering Applications of Neural Networks, 2011

Financial Assessment of London Plan Policy 4A.2 by Probabilistic Inference and Influence Diagrams.
Proceedings of the Artificial Intelligence Applications and Innovations, 2011

Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

An Evaluation of the Initiatives and the Progress Made on e-government Services in the EU.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Paving the Way for a Transformational Public Administration.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
A coloured Petri net analysis of the Transaction Internet Protocol.
Int. J. Electron. Secur. Digit. Forensics, 2010

A Review on Sustainability Models.
Proceedings of the Global Security, Safety, and Sustainability, 2010

Support Vector Machines-Kernel Algorithms for the Estimation of the Water Supply in Cyprus.
Proceedings of the Artificial Neural Networks, 2010

2009
Mobile devices and services: bridging the digital divide in rural areas.
Int. J. Electron. Secur. Digit. Forensics, 2009

Web services security evaluation considerations.
Int. J. Electron. Secur. Digit. Forensics, 2009

2008
Cultivating trust - an electronic-government development model for addressing the needs of developing countries.
Int. J. Electron. Secur. Digit. Forensics, 2008

The importance of biometric sensor continuous secure monitoring.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

2007
E-identification technologies for e-government interoperability in the EU.
Int. J. Electron. Secur. Digit. Forensics, 2007

Service-Enabled Business Processes: Constructing Enterprise Applications - An Evaluation Framework.
Proceedings of the Advances in Computer and Information Sciences and Engineering, 2007

2005
E-learning in the work-places in the rural sector of northeastern Greece.
Oper. Res., 2005


  Loading...