George Karabatis
According to our database1,
George Karabatis
authored at least 53 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Scoping: Towards Streamlined Entity Collections for Multi-Sourced Entity Resolution with Self-Supervised Agents.
Proceedings of the 26th International Conference on Enterprise Information Systems, 2024
2023
2022
Inteplato: Generating Mappings of Heterogeneous Relational Schemas Using Unsupervised Learning.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022
2021
Anonymization of Network Traces Data through Condensation-based Differential Privacy.
DTRAP, 2021
Proceedings of the CIKM 2021 Workshops co-located with 30th ACM International Conference on Information and Knowledge Management (CIKM 2021), 2021
2020
Automatic Bug Triage in Software Systems Using Graph Neighborhood Relations for Feature Augmentation.
IEEE Trans. Comput. Soc. Syst., 2020
Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
2019
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Workshops, 2019
SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Workshops, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
IEEE Trans. Syst. Man Cybern. Syst., 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Knowl. Inf. Syst., 2017
On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2017 Conferences, 2017
Methods and techniques to identify security incidents using domain knowledge and contextual information.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
2016
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016
Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016
2015
Int. J. Web Eng. Technol., 2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
2014
Int. J. Inf. Comput. Secur., 2014
Context Infusion in Semantic Link Networks to Detect Cyber-attacks: A Flow-Based Detection Approach.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014
2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
2012
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
ACM Comput. Surv., 2011
2009
Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts.
J. Data Semant., 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
2008
Decis. Support Syst., 2008
2007
J. Database Manag., 2007
Gov. Inf. Q., 2007
Decis. Support Syst., 2007
2006
Int. J. Data Warehous. Min., 2006
Int. J. Interoperability Bus. Inf. Syst., 2006
An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study.
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
1999
1997
Specification and Management of Interdependent Data in Operational Systems and Data Warehouses.
Distributed Parallel Databases, 1997
1993
Proceedings of the Advanced Database Systems, 1993
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993
Enforcing Data Dependencies in Cooperative Information Systems.
Proceedings of the International Conference on Intelligent and Cooperative Information Systems, 1993
1992
Using Polytransactions to Manage Interdependent Data
Proceedings of the Database Transaction Models for Advanced Applications., 1992
1991