Panagiotis Karampelas

According to our database1, Panagiotis Karampelas authored at least 57 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
A password creation and validation system for social media platforms based on big data analytics.
J. Ambient Intell. Humaniz. Comput., 2020

2019
Text mining for malware classification using multivariate all repeated patterns detection.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Multivariate motif detection in local weather big data.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

The role of social media surveillance in search and rescue missions.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Dynamic Pattern Detection for Big Data Stream Analytics.
Proceedings of the Social Network Based Big Data Analysis and Applications, 2018

Visual Methods and Tools for Social Network Analysis.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Text Mining for Plagiarism Detection: Multivariate Pattern Detection for Recognition of Text Similarities.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Clickstream Analytics: An Experimental Analysis of the Amazon Users' Simulated Monthly Traffic.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Detecting Hate Speech Within the Terrorist Argument: A Greek Case.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Advanced Network Data Analytics for Large-Scale DDoS Attack Detection.
Int. J. Cyber Warf. Terror., 2017

Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics Analytics.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster Analysis.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

Learn by playing: A serious war game simulation for teaching military ethics.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

2016
Repeated patterns detection in big data using classification and parallelism on LERP Reduced Suffix Arrays.
Appl. Intell., 2016

Frequent and non-frequent pattern detection in big data streams: An experimental simulation in 1 trillion data points.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Profiling individuals based on email analysis and ego networks: A visualization technique.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
SIREN - A Network Infrastructure for Emergencies.
ERCIM News, 2015

Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series.
Proceedings of the ICEIS 2015, 2015

Sequential All Frequent Itemsets Detection: A Method to Detect All Frequent Sequential Itemsets Using LERP-Reduced Suffix Array Data Structure and ARPaD Algorithm.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Tactics, weapons, targets and rationale behind the actions of the mostly operational terrorist groups across Europe.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Visual Methods and Tools for Social Network Analysis.
Encyclopedia of Social Network Analysis and Mining, 2014

Visualization of health indicators: utilizing data mining techniques and statistical analysis for effective comparison of user profiles.
Netw. Model. Anal. Health Informatics Bioinform., 2014

Experimental Analysis on the Normality of π, e, φ, sqrt(2) Using Advanced Data-Mining Techniques.
Exp. Math., 2014

Analyzing very large time series using suffix arrays.
Appl. Intell., 2014

Early DDoS Detection Based on Data Mining Techniques.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Fast Frequent Pattern Detection Using Prime Numbers.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2014, 2014

2013
Integrating Online Social Network Analysis in Personalized Web Search.
Proceedings of the Influence of Technology on Social Network Analysis and Mining, 2013

Developing a Hybrid Framework for a Web-Page Recommender System.
Proceedings of the Mining Social Networks and Security Informatics, 2013

Techniques and Tools for Designing an Online Social Network Platform
Lecture Notes in Social Networks 3, Springer, ISBN: 978-3-7091-0786-7, 2013

Modeling Suspicious Email Detection using Enhanced Feature Selection.
CoRR, 2013

Combining information extraction and text mining for cancer biomarker detection.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Towards an intelligent system for cognitive behavioral treatment.
Proceedings of the 7th International Conference on System of Systems Engineering, 2012

Finding Hidden Nodes by Checking for Missing Nodes against Past Social Networks.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

The reduction of the digital divide by improving the appropriateness of the web content.
Proceedings of the 2012 International Conference on Information Technology Based Higher Education and Training, 2012

Periodicity data mining in time series using Suffix Arrays.
Proceedings of the 6th IEEE International Conference on Intelligent Systems, 2012

Minimization of Suffix Array's Storage Capacity for Periodicity Detection in Time Series.
Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence, 2012

2011
Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks.
Proceedings of the Counterterrorism and Open Source Intelligence, 2011

Effectiveness of Heuristic Based Approach on the Performance of Indexing and Clustering of High Dimensional Data.
J. Inf. Knowl. Manag., 2011

LPAT: An interactive simulation tool for assessing the lightning performance of Hellenic high voltage transmission lines.
Appl. Soft Comput., 2011

heteroHarvest: Harvesting information from heterogeneous sources.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Association rules mining based approach for Web usage mining.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Simple and effective behavior tracking by post processing of association rules into segments.
Proceedings of the iiWAS'2011, 2011

Harvesting Information from Heterogeneous Sources.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

A Hybrid Framework for Building a Web-Page Recommender System.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Applications of Social Network Construction and Analysis in the Medical Referral Process.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

CCM: A Text Classification Model by Clustering.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
SOA Security Aspects in Web-based Architectural Design.
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010

Employing Social Network Construction and Analysis in Web Structure Optimization.
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010

Heuristic based approach to clustering and its time critical applications.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010

Mapping rules for converting from ODL to XML schemas.
Proceedings of the iiWAS'2010, 2010

Detecting New Trends in Terrorist Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
Web User Interface Design Strategy: Designing for Device Independence.
Proceedings of the Universal Access in Human-Computer Interaction. Addressing Diversity, 2009

Designing Universally Accessible Networking Services for a Mobile Personal Assistant.
Proceedings of the Universal Access in Human-Computer Interaction. Intelligent and Ubiquitous Interaction Environments, 2009

2008
Modeling of the grounding resistance variation using ARMA models.
Simul. Model. Pract. Theory, 2008

A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory.
Proceedings of the Panhellenic Conference on Informatics, 2008

2005
Usability Inspection of the WardInHand Prototype.
Proceedings of the Universal Access in Health Telematics, A Design Code of Practice, 2005

2002
User Interface Design for PDAs: Lessons and Experience with the WARD-IN-HAND Prototype.
Proceedings of the Universal Access: Theoretical Perspectives, 2002


  Loading...