Stavros D. Nikolopoulos
Orcid: 0000-0001-6684-8459
According to our database1,
Stavros D. Nikolopoulos
authored at least 125 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Towards a real-time distributed feedback system for the transportation assistance of PwD.
CoRR, 2024
2023
Detection and classification of malicious software utilizing Max-Flows between system-call groups.
J. Comput. Virol. Hacking Tech., March, 2023
Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks.
J. Comput. Secur., 2023
A Code-Based Multiple Watermarking Scheme for the Preservation of Authenticity of Forensic Images.
Proceedings of the 14th International Conference on Information, 2023
Proceedings of the 24th International Conference on Computer Systems and Technologies, 2023
2022
Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs.
J. Comput. Virol. Hacking Tech., 2022
An integrated simulation framework for the prevention and mitigation of pandemics caused by airborne pathogens.
Netw. Model. Anal. Health Informatics Bioinform., 2022
Proceedings of the 20th International Symposium on Experimental Algorithms, 2022
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022
Proceedings of the 13th International Conference on Information, 2022
A Repetitive Watermarking Scheme for Digital Images based on Self-Inverting Permutations.
Proceedings of the 13th International Conference on Information, 2022
Proceedings of the CompSysTech '22: International Conference on Computer Systems and Technologies 2022, University of Ruse, Ruse, Bulgaria, June 17, 2022
2021
A graph-based framework for malicious software detection and classification utilizing temporal-graphs.
J. Comput. Secur., 2021
CoRR, 2021
CoRR, 2021
Detection and Classification of Malicious Software based on Regional Matching of Temporal Graphs.
Proceedings of the CompSysTech '21: International Conference on Computer Systems and Technologies '21, 2021
2020
An Algorithmic Framework for Malicious Software Detection Exploring Structural Characteristics of Behavioral Graphs.
Proceedings of the International Conference on Computer Systems and Technologies 2020, 2020
2019
Proceedings of the 20th International Conference on Computer Systems and Technologies, 2019
2018
Theor. Comput. Sci., 2018
Encoding watermark numbers as reducible permutation graphs using self-inverting permutations.
Discret. Appl. Math., 2018
Characterizing Watermark Numbers encoded as Reducible Permutation Graphs against Malicious Attacks.
CoRR, 2018
Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations.
CoRR, 2018
A Graph-based Model for Malicious Software Detection Exploiting Domination Relations between System-call Groups.
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018
2017
A graph-based model for malware detection and classification using system-call groups.
J. Comput. Virol. Hacking Tech., 2017
J. Inf. Secur. Appl., 2017
Experimental Study of the Resilience of a Graph-based Watermarking System under Edge Modifications.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017
Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017
2016
Two RPG Flow-graphs for Software Watermarking using Bitonic Sequences of Self-inverting Permutations.
CoRR, 2016
Graph-structured Watermarking using Bitonic Sequences of Self-inverting Permutations.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016
A Model for Establishing Response-time Bounds to Prevent Malware Pandemics in Mobile Devices.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016
2015
Watermarking PDF Documents using Various Representations of Self-inverting Permutations.
Proceedings of the WEBIST 2015, 2015
Proceedings of the 19th Panhellenic Conference on Informatics, 2015
Proceedings of the 19th Panhellenic Conference on Informatics, 2015
A graph-based model for malicious code detection exploiting dependencies of system-call groups.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015
2014
CoRR, 2014
CoRR, 2014
Proceedings of the WEBIST 2014, 2014
2013
Eur. J. Comb., 2013
Proceedings of the Web Information Systems and Technologies - 9th International Conference, 2013
Watermarking Images in the Frequency Domain by Exploiting Self-inverting Permutations.
Proceedings of the WEBIST 2013, 2013
A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software.
Proceedings of the SECRYPT 2013, 2013
Proceedings of the 17th Panhellenic Conference on Informatics, 2013
Design and Evaluation of a Graph Codec System for Software Watermarking.
Proceedings of the DATA 2013 - Proceedings of the 2nd International Conference on Data Technologies and Applications, Reykjavík, Iceland, 29, 2013
Proceedings of the Computer Systems and Technologies, 2013
2012
Theor. Comput. Sci., 2012
Theor. Comput. Sci., 2012
Watermarking Images using 2D Representations of Self-inverting Permutations.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012
A watermarking system for teaching intellectual property rights: Implementation and performance.
Proceedings of the 2012 International Conference on Information Technology Based Higher Education and Training, 2012
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
A Watermarking System for Teaching Students to Respect Intellectual Property Rights.
Proceedings of the CSEDU 2012, 2012
Multiple encoding of a watermark number into reducible permutation graphs using cotrees.
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
Graphs Comb., 2011
Algorithmica, 2011
Proceedings of the WALCOM: Algorithms and Computation - 5th International Workshop, 2011
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011
2010
A polynomial solution to the k-fixed-endpoint path cover problem on proper interval graphs.
Theor. Comput. Sci., 2010
Algorithmica, 2010
Proceedings of the WALCOM: Algorithms and Computation, 4th International Workshop, 2010
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2010
2009
Maximizing the number of spanning trees in K<sub>n</sub>-complements of asteroidal graphs.
Discret. Math., 2009
Counting Spanning Trees in Cographs: An Algorithmic Approach.
Ars Comb., 2009
Proceedings of the WALCOM: Algorithms and Computation, Third International Workshop, 2009
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009
2008
Proceedings of the WALCOM: Algorithms and Computation, Second International Workshop, 2008
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008
2007
NP-completeness results for some problems on subclasses of bipartite and chordal graphs.
Theor. Comput. Sci., 2007
A linear-time algorithm for the <i>k</i>-fixed-endpoint path cover problem on cographs.
Networks, 2007
An optimal parallel solution for the path cover problem on P<sub>4</sub>-sparse graphs.
J. Parallel Distributed Comput., 2007
On the parallel computation of the biconnected and strongly connected co-components of graphs.
Discret. Appl. Math., 2007
Discret. Appl. Math., 2007
Proceedings of the Experimental Algorithms, 6th International Workshop, 2007
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007
2006
J. Comput. Sci. Technol., 2006
Discret. Math. Theor. Comput. Sci., 2006
On the number of spanning trees of K<sub><i>n</i></sub><sup><i>m</i></sup>±<i>G</i> graphs.
Discret. Math. Theor. Comput. Sci., 2006
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2006
Proceedings of the Algorithms and Complexity, 6th Italian Conference, 2006
2005
On the Recognition of Bipolarizable and <i>P</i><sub><i>4</i></sub>-simplicial Graphs.
Discret. Math. Theor. Comput. Sci., 2005
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2005
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2005
Proceedings of the Advances in Informatics, 2005
Proceedings of the Algorithms and Computation, 16th International Symposium, 2005
2004
Parallel Algorithms For Recognizing P5-Free And P<sup>5</sup>-Free Weakly Chordal Graphs.
Parallel Process. Lett., 2004
J. Parallel Distributed Comput., 2004
Inf. Process. Lett., 2004
The Number of Spanning Trees in <i>K</i> <sub><i>n</i></sub>-Complements of Quasi-Threshold Graphs.
Graphs Comb., 2004
Electron. Notes Discret. Math., 2004
Algorithms for P<sub>4</sub>-Comparability Graph Recognition and Acyclic P<sub>4</sub>-Transitive Orientation.
Algorithmica, 2004
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2004
Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2004
2003
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2003
2002
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2002
2001
Inf. Sci., 2001
Proceedings of the Algorithms and Computation, 12th International Symposium, 2001
2000
Inf. Process. Lett., 2000
Inf. Process. Lett., 2000
1999
NC Coloring Algorithms for Permutation Graphs.
Nord. J. Comput., 1999
1998
Inf. Process. Lett., 1998
1997
J. Syst. Archit., 1997
Addressing Network Survivability Issues by Finding the K-Best Paths through a Trellis Graph.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
1996
1995
1994
Parallel Algorithms Appl., 1994
Parallel Recognition and Location Algorithms for Chordal Graphs Using Distance Matrices.
Proceedings of the Parallel Processing: CONPAR 94, 1994
1993
Microprocess. Microprogramming, 1993