Vasilios Zorkadis

According to our database1, Vasilios Zorkadis authored at least 24 papers between 1994 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Data Pipeline to Preserve Privacy in Educational Settings.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

2019
A Constraint-Based Model for the Frequent Itemset Hiding Problem.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

2017
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities.
Comput. Law Secur. Rev., 2017

2011
Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
PROACT: An Ontology-Based Model of Privacy Policies in Ambient Intelligence Environments.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining.
Proceedings of the Grid and Distributed Computing, Control and Automation, 2010

A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
On privacy-enhancing architectures for distribution of real time performance demanding mobile services.
Int. J. Electron. Secur. Digit. Forensics, 2009

2008
On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes.
Proceedings of the NTMS 2008, 2008

Towards a Reliable Evaluation Framework for Message Authentication in Web-Based Transactions Based on an Improved Computational Intelligence and Dynamical Systems Methodology.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

2007
Detection and surveillance technologies: privacy-related requirements and protection schemes.
Int. J. Electron. Secur. Digit. Forensics, 2007

An Improved Evaluation Framework for the Quality Assessment of Hash Functions in Data Communications based on Computational Intelligence and Nonlinear Methodology.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

2006
Efficient information theoretic extraction of higher order features for improving neural network-based spam e-mail categorization.
J. Exp. Theor. Artif. Intell., 2006

2005
Efficient information theoretic strategies for classifier combination, feature extraction and performance evaluation in improving false positives and false negatives for spam e-mail filtering.
Neural Networks, 2005

Efficient Neural Network Models and Information Theoretic Feature Extraction in Improved E-Mail Spam Categorization.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

2004
On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements.
Inf. Manag. Comput. Secur., 2004

2003
On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators.
Neural Networks, 2003

Quality Assessment of Hash Functions for Message Authentication Based Secure Internet Communications using Neural Networks.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003

2002
A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls.
Proceedings of the Infrastructure Security, International Conference, 2002

Strong Pseudorandom Bit Sequence Generators Using Neural Network Techniques and Their Evaluation for Secure Communications.
Proceedings of the AI 2002: Advances in Artificial Intelligence, 2002

2000
A Novel Suite of Tests for Evaluating One-Way Hash Functions for Electronic Commerce Applications.
Proceedings of the 26th EUROMICRO 2000 Conference, 2000

1998
On Applying Multilayer Perceptron Learning Properties to (Pseudo) Random Number Generation and Evaluation.
Neural Parallel Sci. Comput., 1998

1995
Leistungsanalyse und Optimierung sicherer Rechnernetze.
PhD thesis, 1995

1994
Security Versus Performance Requirements in Data Communications Systems.
Proceedings of the Computer Security, 1994


  Loading...