default search action
Georgios Theodoridis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Georgios Theodoridis, Athanasios Tsadiras:
Retail Demand Forecasting: A Multivariate Approach and Comparison of Boosting and Deep Learning Methods. Int. J. Artif. Intell. Tools 33(4): 2450001:1-2450001:25 (2024) - [c18]Aimilios Leftheriotis, Achilleas Tzenetopoulos, George Lentaris, Dimitrios Soudris, Georgios Theodoridis:
TF2AIF: Facilitating development and deployment of accelerated AI models on the cloud-edge continuum. EuCNC/6G Summit 2024: 931-936 - [i1]Aimilios Leftheriotis, Achilleas Tzenetopoulos, George Lentaris, Dimitrios Soudris, Georgios Theodoridis:
TF2AIF: Facilitating development and deployment of accelerated AI models on the cloud-edge continuum. CoRR abs/2404.13715 (2024) - 2023
- [c17]Marios Arampatzis, Georgios Theodoridis, Athanasios Tsadiras:
Pre-launch Fashion Product Demand Forecasting Using Machine Learning Algorithms. AIAI (2) 2023: 362-372 - [c16]Georgios P. Spathoulas, Marios Anagnostopoulos, Konstantinos Papageorgiou, Georgios Kavallieratos, Georgios Theodoridis:
Improving DNS Data Exfiltration Detection Through Temporal Analysis. UbiSec 2023: 133-146 - 2022
- [j8]Georgios Theodoridis, Athanasios Tsadiras:
Applying machine learning techniques to predict and explain subscriber churn of an online drug information platform. Neural Comput. Appl. 34(22): 19501-19514 (2022) - [c15]Georgios Theodoridis, Athanasios Tsadiras:
Comparing Boosting and Deep Learning Methods on Multivariate Time Series for Retail Demand Forecasting. AIAI (2) 2022: 375-386 - 2021
- [j7]Georgios P. Spathoulas, Georgios Theodoridis, Georgios-Paraskevas Damiris:
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts. Int. J. Inf. Sec. 20(3): 347-370 (2021) - [c14]Georgios Theodoridis, Athanasios Tsadiras:
Using Machine Learning Methods to Predict Subscriber Churn of a Web-Based Drug Information Platform. AIAI 2021: 581-593 - [c13]G. Georgiou, Georgios Theodoridis:
Studying the impacts of loop unrolling and pipeline in the FPGA design of the Simon and RoadRunneR lightweght ciphers. MOCAST 2021: 1-6
2010 – 2019
- 2019
- [j6]Georgios P. Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris, Georgios Theodoridis:
Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets. Future Internet 11(11): 226 (2019) - [c12]Nikolaos Giachoudis, Georgios-Paraskevas Damiris, Georgios Theodoridis, Georgios P. Spathoulas:
Collaborative Agent-based Detection of DDoS IoT Botnets. DCOSS 2019: 205-211 - [c11]Konstantinos Athanasopoulos, Georgios Theodoridis, Christos Darisaplis, Ioannis Stamelos:
Towards a Software System for Facilitating the Reuse of Business Processes. ICSR 2019: 34-46 - 2018
- [c10]Konstantinos Oikonomou, Orestis Theodorakopoulos, Georgios Keramidas, Georgios Theodoridis:
Backlight Compensation Algorithms to Improve Power Consumption in LED- LCD Displays. PATMOS 2018: 254-260 - 2016
- [c9]Georgios Theodoridis, Thierry Benoist:
ClEveR: Clustering events with high density of true-to-false occurrence ratio. ICDE 2016: 918-929 - 2015
- [j5]Luca Galbusera, Georgios Theodoridis, Georgios Giannopoulos:
Intelligent Energy Systems: Introducing Power-ICT Interdependency in Modeling and Control Design. IEEE Trans. Ind. Electron. 62(4): 2468-2477 (2015) - [c8]Georgios Theodoridis, Luca Galbusera, Georgios Giannopoulos:
Controllability Assessment for Cascade Effects in ICT-enabled Power Grids. CRITIS 2015: 147-158 - 2014
- [c7]George Athanasiou, George-Paris Makkas, Georgios Theodoridis:
High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm. ISCCSP 2014: 538-541 - [c6]Luca Galbusera, Georgios Theodoridis, Georgios Giannopoulos:
Model predictive control of energy transmission grids accounting for power-ICT interdependencies. MED 2014: 835-840 - 2013
- [c5]Stavros Papadopoulos, Georgios Theodoridis, Dimitrios Tzovaras:
BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies. VizSEC 2013: 57-64 - 2012
- [j4]Ernst W. Biersack, Quentin Jacquemart, Fabian Fischer, Johannes Fuchs, Olivier Thonnard, Georgios Theodoridis, Dimitrios Tzovaras, Pierre-Antoine Vervier:
Visual analytics for BGP monitoring and prefix hijacking identification. IEEE Netw. 26(6): 33-39 (2012) - [c4]Georgios Theodoridis, Orestis Tsigkas, Dimitrios Tzovaras:
A Novel Unsupervised Method for Securing BGP Against Routing Hijacks. ISCIS 2012: 21-29 - 2011
- [j3]Georgios Theodoridis, Fotini-Niovi Pavlidou:
A combined resource management and admission control scheme for optimizing uplink performance of M-WiMAX systems. Comput. Networks 55(17): 3975-3986 (2011) - [j2]Georgios Theodoridis, Fotini-Niovi Pavlidou:
A hybrid CAC algorithm for maximizing downlink capacity of M-WiMAX systems. Wirel. Networks 17(3): 629-644 (2011) - 2010
- [c3]Georgios Theodoridis, Fotini-Niovi Pavlidou:
A Novel Radio Resource Management Scheme for Maximizing Uplink Capacity in M-WiMAX. WCNC 2010: 1-6 - [c2]Georgios Theodoridis, Fotini-Niovi Pavlidou:
An SNR-Based CAC Algorithm for Optimizing Resource Assignment in the Downlink of M-WiMAX. WCNC 2010: 1-6
2000 – 2009
- 2007
- [j1]Georgios Theodoridis, Cesare Roseti, Fotini-Niovi Pavlidou, Michele Luglio:
TCP-Call Admission Control Interaction in Multiplatform Space Architectures. EURASIP J. Wirel. Commun. Netw. 2007 (2007) - [c1]Michele Luglio, Fotini-Niovi Pavlidou, Cesare Roseti, Georgios Theodoridis:
CAC-TCP Cross-Layer Interaction in a HAPS-Satellite Integrated Scenario. VTC Spring 2007: 1390-1394
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint