Stavros D. Nikolopoulos

Orcid: 0000-0001-6684-8459

According to our database1, Stavros D. Nikolopoulos authored at least 124 papers between 1993 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adding a Tail in Classes of Perfect Graphs.
Algorithms, June, 2023

Detection and classification of malicious software utilizing Max-Flows between system-call groups.
J. Comput. Virol. Hacking Tech., March, 2023

Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks.
J. Comput. Secur., 2023

Adding an Edge in a P<sub>4</sub>-sparse Graph.
CoRR, 2023

A Code-Based Multiple Watermarking Scheme for the Preservation of Authenticity of Forensic Images.
Proceedings of the 14th International Conference on Information, 2023

Tamper Detection and Localization in Forensic Images.
Proceedings of the 24th International Conference on Computer Systems and Technologies, 2023

2022
Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs.
J. Comput. Virol. Hacking Tech., 2022

An integrated simulation framework for the prevention and mitigation of pandemics caused by airborne pathogens.
Netw. Model. Anal. Health Informatics Bioinform., 2022

An Experimental Study of Algorithms for Packing Arborescences.
Proceedings of the 20th International Symposium on Experimental Algorithms, 2022

A Multiple Watermarking Scheme for Digital Audio Signals.
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022

Digital Image Watermarking using Self Inverting Permutations - A Comparative Study.
Proceedings of the 13th International Conference on Information, 2022

A Repetitive Watermarking Scheme for Digital Images based on Self-Inverting Permutations.
Proceedings of the 13th International Conference on Information, 2022

A Synonym-based Approach for the Semantic Indexing of Texts.
Proceedings of the CompSysTech '22: International Conference on Computer Systems and Technologies 2022, University of Ruse, Ruse, Bulgaria, June 17, 2022

2021
A graph-based framework for malicious software detection and classification utilizing temporal-graphs.
J. Comput. Secur., 2021

A Stochastic Graph-based Model for the Simulation of SARS-CoV-2 Transmission.
CoRR, 2021

SARiSsa - A Mobile Application for the Proactive Control of SARS-CoV-2 Spread.
CoRR, 2021

Detection and Classification of Malicious Software based on Regional Matching of Temporal Graphs.
Proceedings of the CompSysTech '21: International Conference on Computer Systems and Technologies '21, 2021

2020
An Algorithmic Framework for Malicious Software Detection Exploring Structural Characteristics of Behavioral Graphs.
Proceedings of the International Conference on Computer Systems and Technologies 2020, 2020

2019
Malicious Software Detection utilizing Temporal-Graphs.
Proceedings of the 20th International Conference on Computer Systems and Technologies, 2019

2018
Strong triadic closure in cographs and graphs of low maximum degree.
Theor. Comput. Sci., 2018

Encoding watermark numbers as reducible permutation graphs using self-inverting permutations.
Discret. Appl. Math., 2018

Characterizing Watermark Numbers encoded as Reducible Permutation Graphs against Malicious Attacks.
CoRR, 2018

Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations.
CoRR, 2018

A Graph-based Model for Malicious Software Detection Exploiting Domination Relations between System-call Groups.
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018

2017
A graph-based model for malware detection and classification using system-call groups.
J. Comput. Virol. Hacking Tech., 2017

Preventing malware pandemics in mobile devices by establishing response-time bounds.
J. Inf. Secur. Appl., 2017

Experimental Study of the Resilience of a Graph-based Watermarking System under Edge Modifications.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

2016
Two RPG Flow-graphs for Software Watermarking using Bitonic Sequences of Self-inverting Permutations.
CoRR, 2016

Graph-structured Watermarking using Bitonic Sequences of Self-inverting Permutations.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

A Model for Establishing Response-time Bounds to Prevent Malware Pandemics in Mobile Devices.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

2015
Watermarking PDF Documents using Various Representations of Self-inverting Permutations.
Proceedings of the WEBIST 2015, 2015

Malicious software classification based on relations of system-call groups.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

Encoding numbers into reducible permutation graphs using heap-ordered trees.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

A graph-based model for malicious code detection exploiting dependencies of system-call groups.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

2014
Counting spanning trees using modular decomposition.
Theor. Comput. Sci., 2014

Join-Reachability Problems in Directed Graphs.
Theory Comput. Syst., 2014

Detecting Malicious Code by Exploiting Dependencies of System-call Groups.
CoRR, 2014

WaterRPG: A Graph-based Dynamic Watermarking Model for Software Protection.
CoRR, 2014

From Image to Audio Watermarking Using Self-Inverting Permutations.
Proceedings of the WEBIST 2014, 2014

2013
An O(n)-time algorithm for the paired domination problem on permutation graphs.
Eur. J. Comb., 2013

The Longest Path Problem Is Polynomial on Cocomparability Graphs.
Algorithmica, 2013

Watermarking Digital Images in the Frequency Domain: Performance and Attack Issues.
Proceedings of the Web Information Systems and Technologies - 9th International Conference, 2013

Watermarking Images in the Frequency Domain by Exploiting Self-inverting Permutations.
Proceedings of the WEBIST 2013, 2013

A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software.
Proceedings of the SECRYPT 2013, 2013

Evaluating the WaterRpg software watermarking model on Java application programs.
Proceedings of the 17th Panhellenic Conference on Informatics, 2013

Design and Evaluation of a Graph Codec System for Software Watermarking.
Proceedings of the DATA 2013 - Proceedings of the 2nd International Conference on Data Technologies and Applications, Reykjavík, Iceland, 29, 2013

Watermarking Java application programs using the WaterRpg dynamic model.
Proceedings of the Computer Systems and Technologies, 2013

2012
A fully dynamic algorithm for the recognition of P<sub>4</sub>-sparse graphs.
Theor. Comput. Sci., 2012

An O(nm)-time certifying algorithm for recognizing HHD-free graphs.
Theor. Comput. Sci., 2012

Watermarking Images using 2D Representations of Self-inverting Permutations.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

A watermarking system for teaching intellectual property rights: Implementation and performance.
Proceedings of the 2012 International Conference on Information Technology Based Higher Education and Training, 2012

An Embedding Graph-based Model for Software Watermarking.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A Watermarking System for Teaching Students to Respect Intellectual Property Rights.
Proceedings of the CSEDU 2012, 2012

Multiple encoding of a watermark number into reducible permutation graphs using cotrees.
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012

An Efficient Graph Codec System for Software Watermarking.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
A Simple Linear-Time Recognition Algorithm for Weakly Quasi-Threshold Graphs.
Graphs Comb., 2011

Efficient Encoding of Watermark Numbers as Reducible Permutation Graphs
CoRR, 2011

The Longest Path Problem has a Polynomial Solution on Interval Graphs.
Algorithmica, 2011

Counting Spanning Trees in Graphs Using Modular Decomposition.
Proceedings of the WALCOM: Algorithms and Computation - 5th International Workshop, 2011

Encoding watermark numbers as cographs using self-inverting permutations.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011

2010
A polynomial solution to the k-fixed-endpoint path cover problem on proper interval graphs.
Theor. Comput. Sci., 2010

The 1-Fixed-Endpoint Path Cover Problem is Polynomial on Interval Graphs.
Algorithmica, 2010

Harmonious Coloring on Subclasses of Colinear Graphs.
Proceedings of the WALCOM: Algorithms and Computation, 4th International Workshop, 2010

Encoding watermark integers as self-inverting permutations.
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2010

2009
Maximizing the number of spanning trees in K<sub>n</sub>-complements of asteroidal graphs.
Discret. Math., 2009

Counting Spanning Trees in Cographs: An Algorithmic Approach.
Ars Comb., 2009

Colinear Coloring on Graphs.
Proceedings of the WALCOM: Algorithms and Computation, Third International Workshop, 2009

The Longest Path Problem Is Polynomial on Interval Graphs.
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

2008
Linear Coloring and Linear Graphs
CoRR, 2008

The 1-fixed-endpoint Path Cover Problem is Polynomial on Interval Graph
CoRR, 2008

Optimal Algorithms for Detecting Network Stability.
Proceedings of the WALCOM: Algorithms and Computation, Second International Workshop, 2008

The 2-Terminal-Set Path Cover Problem and Its Polynomial Solution on Cographs.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

2007
NP-completeness results for some problems on subclasses of bipartite and chordal graphs.
Theor. Comput. Sci., 2007

A linear-time algorithm for the <i>k</i>-fixed-endpoint path cover problem on cographs.
Networks, 2007

An optimal parallel solution for the path cover problem on P<sub>4</sub>-sparse graphs.
J. Parallel Distributed Comput., 2007

On the parallel computation of the biconnected and strongly connected co-components of graphs.
Discret. Appl. Math., 2007

The harmonious coloring problem is NP-complete for interval and permutation graphs.
Discret. Appl. Math., 2007

Detecting Holes and Antiholes in Graphs.
Algorithmica, 2007

An Experimental Study of Stability in Heterogeneous Networks.
Proceedings of the Experimental Algorithms, 6th International Workshop, 2007

An <i>O</i> ( <i>nm</i> )-Time Certifying Algorithm for Recognizing HHD-Free Graphs.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

2006
P-Tree Structures and Event Horizon: Efficient Event-Set Implementations.
J. Comput. Sci. Technol., 2006

Recognizing HH-free, HHD-free, and Welsh-Powell Opposition Graphs.
Discret. Math. Theor. Comput. Sci., 2006

On the number of spanning trees of K<sub><i>n</i></sub><sup><i>m</i></sup>±<i>G</i> graphs.
Discret. Math. Theor. Comput. Sci., 2006

Minimal separators in <i>P</i><sub>4</sub>-sparse graphs.
Discret. Math., 2006

A Fully Dynamic Algorithm for the Recognition of <i>P</i><sub>4</sub>-Sparse Graphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2006

Heterogenous Networks Can Be Unstable at Arbitrarily Low Injection Rates.
Proceedings of the Algorithms and Complexity, 6th Italian Conference, 2006

2005
On the Recognition of Bipolarizable and <i>P</i><sub><i>4</i></sub>-simplicial Graphs.
Discret. Math. Theor. Comput. Sci., 2005

Efficient parallel recognition of cographs.
Discret. Appl. Math., 2005

The Number of Spanning Trees in Kn-complements of Quasi-threshold Graphs
CoRR, 2005

Recognizing HHDS-Free Graphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2005

Adding an Edge in a Cograph.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2005

Maximum-Size Subgraphs of P4-Sparse Graphs Admitting a Perfect Matching.
Proceedings of the Advances in Informatics, 2005

Multi-source Trees: Algorithms for Minimizing Eccentricity Cost Metrics.
Proceedings of the Algorithms and Computation, 16th International Symposium, 2005

2004
Parallel Algorithms For Recognizing P5-Free And P<sup>5</sup>-Free Weakly Chordal Graphs.
Parallel Process. Lett., 2004

An Optimal Parallel Co-Connectivity Algorithm.
Theory Comput. Syst., 2004

Parallel algorithms for Hamiltonian problems on quasi-threshold graphs.
J. Parallel Distributed Comput., 2004

Parallel algorithms for P<sub>4</sub>-comparability graphs.
J. Algorithms, 2004

A limit characterization for the number of spanning trees of graphs.
Inf. Process. Lett., 2004

The Number of Spanning Trees in <i>K</i> <sub><i>n</i></sub>-Complements of Quasi-Threshold Graphs.
Graphs Comb., 2004

On the Strongly Connected and Biconnected Components of the Complement of Graphs.
Electron. Notes Discret. Math., 2004

Algorithms for P<sub>4</sub>-Comparability Graph Recognition and Acyclic P<sub>4</sub>-Transitive Orientation.
Algorithmica, 2004

Recognizing HHD-free and Welsh-Powell Opposition Graphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2004

Hole and antihole detection in graphs.
Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2004

2003
Counting Spanning Trees in Cographs.
Electron. Notes Discret. Math., 2003

Recognizing Bipolarizable and P 4-Simplicial Graphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2003

2002
On the Recognition of P<sub>4</sub>-Comparability Graphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2002

2001
Optimal Gray-code labeling and recognition algorithms for hypercubes.
Inf. Sci., 2001

Hamiltonian Cycles in Quasi-threshold Graphs.
Electron. Notes Discret. Math., 2001

Recognition and Orientation Algorithms for P<sub>4</sub>-Comparability Graphs.
Proceedings of the Algorithms and Computation, 12th International Symposium, 2001

2000
On the performance of the first-fit coloring algorithm on permutation graphs.
Inf. Process. Lett., 2000

Recognizing cographs and threshold graphs through a classification of their edges.
Inf. Process. Lett., 2000

1999
NC Coloring Algorithms for Permutation Graphs.
Nord. J. Comput., 1999

Coloring permutation graphs in parallel.
Electron. Notes Discret. Math., 1999

1998
On the Number of Spanning Trees of Multi-Star Related Graphs.
Inf. Process. Lett., 1998

1997
Sub-optimal solutions to track detection problem using graph theoretic concepts.
J. Syst. Archit., 1997

On complete systems of invariants for small graphs.
Int. J. Comput. Math., 1997

Addressing Network Survivability Issues by Finding the K-Best Paths through a Trellis Graph.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Parallel Block-finding Using Distance Matrices.
Parallel Algorithms Appl., 1996

1995
Constant-Time Parallel Recognition of Split Graphs.
Inf. Process. Lett., 1995

1994
Fast Parallel Algorithms for Finding Cutpoints and Bridges of Undirected Graphs.
Parallel Algorithms Appl., 1994

Odd-even, compare-exchange parallel sorting.
Microprocess. Microprogramming, 1994

Parallel Recognition and Location Algorithms for Chordal Graphs Using Distance Matrices.
Proceedings of the Parallel Processing: CONPAR 94, 1994

1993
An experimental analysis of event set algorithms for discrete event simulation.
Microprocess. Microprogramming, 1993


  Loading...