George Karabatis

According to our database1, George Karabatis authored at least 49 papers between 1991 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Measuring Software Security Using Improved CWE Base Score.
Proceedings of the CIKM 2021 Workshops co-located with 30th ACM International Conference on Information and Knowledge Management (CIKM 2021), 2021

2020
Automatic Bug Triage in Software Systems Using Graph Neighborhood Relations for Feature Augmentation.
IEEE Trans. Comput. Soc. Syst., 2020

Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

2019
A Contextual Driven Approach to Risk Event Tagging.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Workshops, 2019

SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Workshops, 2019

2018
Split Transactions.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Polytransactions.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Nested Transaction Models.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach.
IEEE Trans. Syst. Man Cybern. Syst., 2018

Analyzing False Positive Source Code Vulnerabilities Using Static Analysis Tools.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Contextual information fusion for intrusion detection: a survey and taxonomy.
Knowl. Inf. Syst., 2017

On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2017 Conferences, 2017

Methods and techniques to identify security incidents using domain knowledge and contextual information.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Zero-Day Attack Identification in Streaming Data Using Semantics and Spark.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
Scalable Semantically Driven Decision Trees for Crime Data.
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016

Beyond data: contextual information fusion for cyber security analytics.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Using Multiplex Networks to Model Cybersecurity Attack Profiles.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

2015
Context aware discovery in web data through anomaly detection.
Int. J. Web Eng. Technol., 2015

Multi-granular aggregation of network flows for security analysis.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

2014
Context and semantics for detection of cyber attacks.
Int. J. Inf. Comput. Secur., 2014

Context Infusion in Semantic Link Networks to Detect Cyber-attacks: A Flow-Based Detection Approach.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

Detecting Zero-Day Attacks Using Contextual Relations.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014

2013
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

2012
A System for Cyber Attack Detection Using Contextual Semantics.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012

Using semantic networks to counter cyber threats.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Using Domain Knowledge to Facilitate Cyber Security Analysis.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Discrete wavelet transform-based time series analysis and mining.
ACM Comput. Surv., 2011

2009
Split Transactions.
Proceedings of the Encyclopedia of Database Systems, 2009

Polytransactions.
Proceedings of the Encyclopedia of Database Systems, 2009

Nested Transaction Models.
Proceedings of the Encyclopedia of Database Systems, 2009

Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts.
J. Data Semant., 2009

Searching for relevant software change artifacts using semantic networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Measuring interestingness of discovered skewed patterns in data cubes.
Decis. Support Syst., 2008

2007
Semantic Integration and Knowledge Discovery for Environmental Research.
J. Database Manag., 2007

Semantic integration of government data for water quality management.
Gov. Inf. Q., 2007

Supporting mobile decision making with association rules and multi-layered caching.
Decis. Support Syst., 2007

2006
Navigation Rules for Exploring Large Multidimensional Data Cubes.
Int. J. Data Warehous. Min., 2006

Using Context in Semantic Data Integration.
Int. J. Interoperability Bus. Inf. Syst., 2006

An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study.
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006

Personalization and visualization on handheld devices.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

1999
Enterprise Data Quality: A Pragmatic Approach.
Inf. Syst. Frontiers, 1999

1997
Specification and Management of Interdependent Data in Operational Systems and Data Warehouses.
Distributed Parallel Databases, 1997

1993
Correctness and Enforcement of Multidatabase Interdependencies.
Proceedings of the Advanced Database Systems, 1993

Multidatabase Interdependencies in Industry.
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993

Enforcing Data Dependencies in Cooperative Information Systems.
Proceedings of the International Conference on Intelligent and Cooperative Information Systems, 1993

1992
Using Polytransactions to Manage Interdependent Data
Proceedings of the Database Transaction Models for Advanced Applications., 1992

1991
Specifying Interdatabase Dependencies in a Multidatabase Environment.
Computer, 1991


  Loading...