Panagiotis Karampelas
Orcid: 0000-0003-1684-7612
According to our database1,
Panagiotis Karampelas
authored at least 61 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ChatGPT paraphrased product reviews can confuse consumers and undermine their trust in genuine reviews. Can you tell the difference?
Inf. Process. Manag., 2024
2022
A novel malicious remote administration tool using stealth and self-defense techniques.
Int. J. Inf. Sec., 2022
Proceedings of the 14th IEEE Image, Video, and Multidimensional Signal Processing Workshop, 2022
2020
A password creation and validation system for social media platforms based on big data analytics.
J. Ambient Intell. Humaniz. Comput., 2020
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020
Identifying Social Networks of Programmers using Text Mining for Code Similarity Detection.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020
2019
Text mining for malware classification using multivariate all repeated patterns detection.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
2018
Proceedings of the Social Network Based Big Data Analysis and Applications, 2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
Text Mining for Plagiarism Detection: Multivariate Pattern Detection for Recognition of Text Similarities.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
Clickstream Analytics: An Experimental Analysis of the Amazon Users' Simulated Monthly Traffic.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
Int. J. Cyber Warf. Terror., 2017
Proceedings of the European Intelligence and Security Informatics Conference, 2017
Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster Analysis.
Proceedings of the European Intelligence and Security Informatics Conference, 2017
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017
2016
Repeated patterns detection in big data using classification and parallelism on LERP Reduced Suffix Arrays.
Appl. Intell., 2016
Frequent and non-frequent pattern detection in big data streams: An experimental simulation in 1 trillion data points.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
Profiling individuals based on email analysis and ego networks: A visualization technique.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
2015
Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series.
Proceedings of the ICEIS 2015, 2015
Sequential All Frequent Itemsets Detection: A Method to Detect All Frequent Sequential Itemsets Using LERP-Reduced Suffix Array Data Structure and ARPaD Algorithm.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Tactics, weapons, targets and rationale behind the actions of the mostly operational terrorist groups across Europe.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
Encyclopedia of Social Network Analysis and Mining, 2014
Visualization of health indicators: utilizing data mining techniques and statistical analysis for effective comparison of user profiles.
Netw. Model. Anal. Health Informatics Bioinform., 2014
Experimental Analysis on the Normality of π, e, φ, sqrt(2) Using Advanced Data-Mining Techniques.
Exp. Math., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2014, 2014
2013
Proceedings of the Influence of Technology on Social Network Analysis and Mining, 2013
Proceedings of the Mining Social Networks and Security Informatics, 2013
Lecture Notes in Social Networks 3, Springer, ISBN: 978-3-7091-0786-7, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Proceedings of the 7th International Conference on System of Systems Engineering, 2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
The reduction of the digital divide by improving the appropriateness of the web content.
Proceedings of the 2012 International Conference on Information Technology Based Higher Education and Training, 2012
Proceedings of the 6th IEEE International Conference on Intelligent Systems, 2012
Minimization of Suffix Array's Storage Capacity for Periodicity Detection in Time Series.
Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence, 2012
2011
Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks.
Proceedings of the Counterterrorism and Open Source Intelligence, 2011
Effectiveness of Heuristic Based Approach on the Performance of Indexing and Clustering of High Dimensional Data.
J. Inf. Knowl. Manag., 2011
LPAT: An interactive simulation tool for assessing the lightning performance of Hellenic high voltage transmission lines.
Appl. Soft Comput., 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Simple and effective behavior tracking by post processing of association rules into segments.
Proceedings of the iiWAS'2011, 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
Applications of Social Network Construction and Analysis in the Medical Referral Process.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011
2010
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010
Proceedings of the iiWAS'2010, 2010
2009
Proceedings of the Universal Access in Human-Computer Interaction. Addressing Diversity, 2009
Designing Universally Accessible Networking Services for a Mobile Personal Assistant.
Proceedings of the Universal Access in Human-Computer Interaction. Intelligent and Ubiquitous Interaction Environments, 2009
2008
Simul. Model. Pract. Theory, 2008
A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory.
Proceedings of the Panhellenic Conference on Informatics, 2008
2005
Proceedings of the Universal Access in Health Telematics, A Design Code of Practice, 2005
2002
User Interface Design for PDAs: Lessons and Experience with the WARD-IN-HAND Prototype.
Proceedings of the Universal Access: Theoretical Perspectives, 2002