default search action
George C. Hadjichristofi
Person information
- affiliation: Frederick University, Nicosia/Limassol, Cyprus
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i1]Jinyang Wang, Tao Wang, Min Gan, George C. Hadjichristofi:
Robust Remote Sensing Scene Classification with Multi-View Voting and Entropy Ranking. CoRR abs/2301.05858 (2023) - 2021
- [j5]Efthyvoulos Kyriacou, Zinonas C. Antoniou, George C. Hadjichristofi, Prokopios Fragkos, Chris Kronis, Theodosis Theodosiou, Riana Constantinou:
Operating an eHealth System for Prehospital and Emergency Health Care Support in Light of Covid-19. Frontiers Digit. Health 3: 654234 (2021) - 2020
- [c20]George C. Hadjichristofi, George Varveris, Konstantinos Katzis:
Assessing Trustworthiness of IoT-Health Devices in Hospital Environments. COMNET 2020: 1-5
2010 – 2019
- 2019
- [c19]George C. Hadjichristofi, George Varveris:
Visualizing and Aggregating Behavior for Trust Evaluation. CAMAD 2019: 1-6 - 2016
- [j4]Mariagrazia Fugini, Mahsa Teimourikia, George C. Hadjichristofi:
A web-based cooperative tool for risk management with adaptive security. Future Gener. Comput. Syst. 54: 409-422 (2016) - [e2]Mario Gerla, George C. Hadjichristofi, Mohsen Guizani:
2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, September 5-9, 2016. IEEE 2016, ISBN 978-1-5090-0304-4 [contents] - 2015
- [c18]Ioannis Andrea, Chrysostomos Chrysostomou, George C. Hadjichristofi:
Internet of Things: Security vulnerabilities and challenges. ISCC 2015: 180-187 - 2014
- [c17]Mariagrazia Fugini, George C. Hadjichristofi, Mahsa Teimourikia:
Adaptive Security for Risk Management Using Spatial Data. DEXA (1) 2014: 343-351 - [c16]Efthyvoulos Kyriacou, Synesios Christou, George C. Hadjichristofi, Riana Constantinou, Andreas Panayides, Constantinos S. Pattichis:
Prehospital health care management platform. MobiHealth 2014: 152 - [c15]Mariagrazia Fugini, George C. Hadjichristofi, Mahsa Teimourikia:
Dynamic Security Modeling in Risk Management Using Environmental Knowledge. WETICE 2014: 429-434 - [e1]Mario Gerla, Khaled Ben Letaief, George C. Hadjichristofi, Christian Callegari:
International Wireless Communications and Mobile Computing Conference, IWCMC 2014, Nicosia, Cyprus, August 4-8, 2014. IEEE 2014, ISBN 978-1-4799-7324-8 [contents] - 2013
- [c14]Efthyvoulos Kyriacou, Marina Charalambous, Charalambos Theodorou, Christos Iliophotou, Maria Ioannou, George C. Hadjichristofi:
"Meleti" speech and language development support system. BIBE 2013: 1-4 - 2012
- [j3]Michael S. Thompson, Allen B. MacKenzie, Luiz A. DaSilva, George C. Hadjichristofi:
A mobile ad hoc networking competition: A retrospective look at the maniac challenge. IEEE Commun. Mag. 50(7): 121-127 (2012) - [c13]Miltos Hadjioannou, George C. Hadjichristofi:
A secure dynamic data aggregation system for citizen safety in emergency response scenarios. IWCMC 2012: 689-696 - 2011
- [j2]George C. Hadjichristofi, Luiz A. DaSilva, Scott F. Midkiff, Unghee Lee, Waltemar De Sousa:
Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration. Comput. Networks 55(1): 282-299 (2011) - [c12]George C. Hadjichristofi, Christoforos N. Hadjicostis, Dipankar Raychaudhuri:
Security in the Cache and Forward Architecture for the Next Generation Internet. ICDCN 2011: 328-339 - [c11]George C. Hadjichristofi, George Kappos, Christoforos N. Hadjicostis:
A novel 3-d model for node and system trust. IWCMC 2011: 959-966 - [c10]Maria Grazia Fugini, George C. Hadjichristofi, Claudia Raibulet:
Trusted Services for Risk Management in Work Environments. MUE 2011: 177-182 - 2010
- [c9]George C. Hadjichristofi, Mariagrazia Fugini:
A dynamic web service-based trust and reputation scheme for scientific workflows. iiWAS 2010: 56-63 - [c8]Eliana Stavrou, Andreas Pitsillides, George C. Hadjichristofi, Christoforos N. Hadjicostis:
Security in Future Mobile Sensor Networks - Issues and Challenges. SECRYPT 2010: 278-286
2000 – 2009
- 2008
- [c7]Hanif Kazemi, George C. Hadjichristofi, Luiz A. DaSilva:
MMAN - a monitor for mobile ad hoc networks: design, implementation, and experimental evaluation. WiNTECH 2008: 57-64 - [c6]Rajesh Mahindra, Gautam D. Bhanage, George C. Hadjichristofi, Sachin Ganu, Pandurang Kamat, Ivan Seskar, Dipankar Raychaudhuri:
Integration of heterogeneous networking testbeds. TRIDENTCOM 2008: 27 - 2007
- [c5]George C. Hadjichristofi, Avi Brender, Marco Gruteser, Rajesh Mahindra, Ivan Seskar:
A wired-wireless testbed architecture for network layer experimentation based on ORBIT and VINI. WiNTECH 2007: 83-90 - [c4]Scott F. Midkiff, Luiz A. DaSilva, George C. Hadjichristofi, Tao Lin, Jahng S. Park:
Emulating Dynamic Topologies for Repeatable Experiments with Mobile Ad Hoc Networks. TRIDENTCOM 2007: 1-9 - 2005
- [b1]George C. Hadjichristofi:
A Framework for Providing Redundancy and Robustness in Key Management for IPsec Security Associations in a Mobile Ad-Hoc Environment. Virginia Tech, Blacksburg, VA, USA, 2005 - [c3]William Joseph Adams, George C. Hadjichristofi, Nathaniel J. Davis IV:
Calculating a node's reputation in a mobile ad hoc network. IPCCC 2005: 303-307 - [c2]George C. Hadjichristofi, William Joseph Adams, Nathaniel J. Davis IV:
A Framework for Key Management in Mobile Ad Hoc Networks. ITCC (2) 2005: 568-573 - 2004
- [j1]Luiz A. DaSilva, Scott F. Midkiff, Jahng S. Park, George C. Hadjichristofi, Nathaniel J. Davis IV, Kaustubh S. Phanse, Tao Lin:
Network mobility and protocol interoperability in ad hoc networks. IEEE Commun. Mag. 42(11): 88-96 (2004) - 2003
- [c1]George C. Hadjichristofi, Nathaniel J. Davis IV, Scott F. Midkiff:
IPSec overhead in wireline and wireless networks for Web and email applications. IPCCC 2003: 543-547
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 22:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint