Vasilios Zorkadis
According to our database1,
Vasilios Zorkadis
authored at least 24 papers
between 1994 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021
2019
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019
2017
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities.
Comput. Law Secur. Rev., 2017
2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
2010
PROACT: An Ontology-Based Model of Privacy Policies in Ambient Intelligence Environments.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010
Proceedings of the Grid and Distributed Computing, Control and Automation, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
On privacy-enhancing architectures for distribution of real time performance demanding mobile services.
Int. J. Electron. Secur. Digit. Forensics, 2009
2008
On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes.
Proceedings of the NTMS 2008, 2008
Towards a Reliable Evaluation Framework for Message Authentication in Web-Based Transactions Based on an Improved Computational Intelligence and Dynamical Systems Methodology.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
2007
Detection and surveillance technologies: privacy-related requirements and protection schemes.
Int. J. Electron. Secur. Digit. Forensics, 2007
An Improved Evaluation Framework for the Quality Assessment of Hash Functions in Data Communications based on Computational Intelligence and Nonlinear Methodology.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007
2006
Efficient information theoretic extraction of higher order features for improving neural network-based spam e-mail categorization.
J. Exp. Theor. Artif. Intell., 2006
2005
Efficient information theoretic strategies for classifier combination, feature extraction and performance evaluation in improving false positives and false negatives for spam e-mail filtering.
Neural Networks, 2005
Efficient Neural Network Models and Information Theoretic Feature Extraction in Improved E-Mail Spam Categorization.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005
2004
On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements.
Inf. Manag. Comput. Secur., 2004
2003
On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators.
Neural Networks, 2003
Quality Assessment of Hash Functions for Message Authentication Based Secure Internet Communications using Neural Networks.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003
2002
A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls.
Proceedings of the Infrastructure Security, International Conference, 2002
Strong Pseudorandom Bit Sequence Generators Using Neural Network Techniques and Their Evaluation for Secure Communications.
Proceedings of the AI 2002: Advances in Artificial Intelligence, 2002
2000
A Novel Suite of Tests for Evaluating One-Way Hash Functions for Electronic Commerce Applications.
Proceedings of the 26th EUROMICRO 2000 Conference, 2000
1998
On Applying Multilayer Perceptron Learning Properties to (Pseudo) Random Number Generation and Evaluation.
Neural Parallel Sci. Comput., 1998
1995
1994
Proceedings of the Computer Security, 1994