Follow
Spyros Halkidis
Spyros Halkidis
Ε.ΔΙ.Π., Εργαστήριο Υπολογιστικών Μεθοδολογιών και Επιχειρησιακής Έρευνας, Παν. Μακεδονίας
Verified email at uom.edu.gr
Title
Cited by
Cited by
Year
Design pattern detection using similarity scoring
N Tsantalis, A Chatzigeorgiou, G Stephanides, ST Halkidis
IEEE transactions on software engineering 32 (11), 896-909, 2006
6442006
A novel technique for image steganography based on a high payload method and edge detection
A Ioannidou, ST Halkidis, G Stephanides
Expert systems with applications 39 (14), 11517-11524, 2012
1272012
Architectural risk analysis of software systems based on security patterns
ST Halkidis, N Tsantalis, A Chatzigeorgiou, G Stephanides
IEEE Transactions on Dependable and Secure Computing 5 (3), 129-142, 2008
1262008
Matching disparate views of planar surfaces using projective invariants
MIA Lourakis, ST Halkidis, SC Orphanoudakis
Image and Vision Computing 18 (9), 673-683, 2000
1022000
A qualitative analysis of software security patterns
ST Halkidis, A Chatzigeorgiou, G Stephanides
computers & security 25 (5), 379-392, 2006
462006
A qualitative evaluation of security patterns
ST Halkidis, A Chatzigeorgiou, G Stephanides
Information and Communications Security: 6th International Conference, ICICS …, 2004
452004
Quantitative evaluation of systems with security patterns using a fuzzy approach
ST Halkidis, A Chatzigeorgiou, G Stephanides
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops: OTM …, 2006
182006
A practical evaluation of security patterns
ST Halkidis, A Chatzigeorgiou, G Stephanides
Proceedings of the International Conference on Artificial Intelligence and …, 2006
112006
A provably secure one-pass two-party key establishment protocol
K Chalkias, ST Halkidis, D Hristu-Varsakelis, G Stephanides, A Alexiadis
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008
82008
Pairing-based cryptography on the Internet of Things: A feasibility study
I Karantaidou, ST Halkidis, S Petridou, L Mamatas, G Stephanides
Wired/Wireless Internet Communications: 16th IFIP WG 6.2 International …, 2018
62018
Moving from requirements to design confronting security issues: A case study
ST Halkidis, A Chatzigeorgiou, G Stephanides
On the Move to Meaningful Internet Systems: OTM 2009: Confederated …, 2009
52009
A novel approach to automated design pattern detection
N Tsantalis, A Chatzigeorgiou, ST Halkidis, G Stephanides
10th Panhellenic Conference on Informatics (PCI’2005). Lecture Notes in …, 2005
52005
An experimental comparison of some LLL-type lattice basis reduction algorithms
DG Papachristoudis, ST Halkidis, G Stephanides
International Journal of Applied and Computational Mathematics 1 (3), 327-342, 2015
42015
Teaching basic calculus using SAGE
K Tsarava, ST Halkidis, P Venardos, G Stephanides
Strategic Role of Tertiary Education and Technologies for Sustainable …, 2013
42013
Brief review of software security history with an emphasis on efforts focused at early stages of the software lifecycle
ST Halkidis, A Chatzigeorgiou, G Stephanides
Journal of Information Privacy and Security 10 (1), 3-27, 2014
12014
Attacks on the AKACP Protocol
K Chalkias, F Baldimtsi, D Hristu-Varsakelis, ST Halkidis, G Stephanides
A A 1, 1, 2010
12010
XLCNN: A Transformer Model for Malware Detection
K Giapantzis, ST Halkidis
IJCSIS, 2023
2023
Teaching Basic Calculus Using SAGE
ST Halkidis, G Stephanides
2013
2008 Index IEEE Transactions on Dependable and Secure Computing Vol. 5
S Bagchi, E Bertino, B Blanchet, D Brumley, J Chandrashekar, ...
Computer networks 87, 98, 2008
2008
Plenary Discussion: Towards a Socio-technical Research Agenda for Community Informatics-Risk Analysis and Business Continuity-Quantitative Evaluation of Systems with Security …
STCA Halkidis, G Stephanides
Lecture Notes in Computer Science 4277, 554-564, 2006
2006
The system can't perform the operation now. Try again later.
Articles 1–20