Georgios Theodoridis

According to our database1, Georgios Theodoridis authored at least 17 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Improving DNS Data Exfiltration Detection Through Temporal Analysis.
Proceedings of the Ubiquitous Security, 2023

Pre-launch Fashion Product Demand Forecasting Using Machine Learning Algorithms.
Proceedings of the Artificial Intelligence Applications and Innovations, 2023

2022
Comparing Boosting and Deep Learning Methods on Multivariate Time Series for Retail Demand Forecasting.
Proceedings of the Artificial Intelligence Applications and Innovations, 2022

2021
Studying the impacts of loop unrolling and pipeline in the FPGA design of the Simon and RoadRunneR lightweght ciphers.
Proceedings of the 10th International Conference on Modern Circuits and Systems Technologies, 2021

Using Machine Learning Methods to Predict Subscriber Churn of a Web-Based Drug Information Platform.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021

2019
Towards a Software System for Facilitating the Reuse of Business Processes.
Proceedings of the Reuse in the Big Data Era, 2019

Collaborative Agent-based Detection of DDoS IoT Botnets.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

2018
Backlight Compensation Algorithms to Improve Power Consumption in LED- LCD Displays.
Proceedings of the 28th International Symposium on Power and Timing Modeling, 2018

2016
ClEveR: Clustering events with high density of true-to-false occurrence ratio.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

2015
Controllability Assessment for Cascade Effects in ICT-enabled Power Grids.
Proceedings of the Critical Information Infrastructures Security, 2015

2014
Model predictive control of energy transmission grids accounting for power-ICT interdependencies.
Proceedings of the 22nd Mediterranean Conference on Control and Automation, 2014

High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm.
Proceedings of the 6th International Symposium on Communications, 2014

2013
BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

2012
A Novel Unsupervised Method for Securing BGP Against Routing Hijacks.
Proceedings of the Computer and Information Sciences III, 2012

2010
An SNR-Based CAC Algorithm for Optimizing Resource Assignment in the Downlink of M-WiMAX.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

A Novel Radio Resource Management Scheme for Maximizing Uplink Capacity in M-WiMAX.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

2007
CAC-TCP Cross-Layer Interaction in a HAPS-Satellite Integrated Scenario.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007


  Loading...