default search action
Miltiadis G. Siavvas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Miltiadis G. Siavvas, Dimitrios Tsoukalas, Charalambos Marantos, Lazaros Papadopoulos, Christos P. Lamprakos, Oliviu Matei, Christos Strydis, Muhammad Ali Siddiqi, Philippe Chrobocinski, Katarzyna Filus, Joanna Domanska, Paris Avgeriou, Apostolos Ampatzoglou, Dimitrios Soudris, Alexander Chatzigeorgiou, Erol Gelenbe, Dionisis D. Kehagias, Dimitrios Tzovaras:
SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software. Autom. Softw. Eng. 31(2): 53 (2024) - [j13]Erol Gelenbe, Mert Nakip, Miltiadis G. Siavvas:
System-wide vulnerability of multi-component software. Comput. Ind. Eng. 196: 110453 (2024) - [j12]Dimitrios Tsoukalas, Miltiadis G. Siavvas, Dionisis D. Kehagias, Apostolos Ampatzoglou, Alexander Chatzigeorgiou:
A practical approach for technical debt prioritization based on class-level forecasting. J. Softw. Evol. Process. 36(4) (2024) - 2023
- [j11]Ilias Kalouptsoglou, Miltiadis G. Siavvas, Apostolos Ampatzoglou, Dionisis D. Kehagias, Alexander Chatzigeorgiou:
Software vulnerability prediction: A systematic mapping study. Inf. Softw. Technol. 164: 107303 (2023) - [c17]Panagiotis I. Radoglou-Grammatikis, Elisavet Kioseoglou, Dimitrios Christos Asimopoulos, Miltiadis G. Siavvas, Ioannis Nanos, Thomas Lagkas, Vasileios Argyriou, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis:
Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends. CloudCom 2023: 309-314 - 2022
- [j10]Miltiadis G. Siavvas, Dimitrios Tsoukalas, Marija Jankovic, Dionisis D. Kehagias, Dimitrios Tzovaras:
Technical debt as an indicator of software security risk: a machine learning approach for software development enterprises. Enterp. Inf. Syst. 16(5) (2022) - [j9]Ilias Kalouptsoglou, Miltiadis G. Siavvas, Dionysios D. Kehagias, Alexandros Chatzigeorgiou, Apostolos Ampatzoglou:
Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction. Entropy 24(5): 651 (2022) - [j8]Christos P. Lamprakos, Charalampos Marantos, Miltiadis G. Siavvas, Lazaros Papadopoulos, Angeliki-Agathi Tsintzira, Apostolos Ampatzoglou, Alexander Chatzigeorgiou, Dionysios D. Kehagias, Dimitrios Soudris:
Translating quality-driven code change selection to an instance of multiple-criteria decision making. Inf. Softw. Technol. 145: 106851 (2022) - [c16]Charalampos Marantos, Miltiadis G. Siavvas, Dimitrios Tsoukalas, Christos P. Lamprakos, Lazaros Papadopoulos, Pawel Boryszko, Katarzyna Filus, Joanna Domanska, Apostolos Ampatzoglou, Alexander Chatzigeorgiou, Erol Gelenbe, Dionisis D. Kehagias, Dimitrios Soudris:
SDK4ED: One-click platform for Energy-aware, Maintainable and Dependable Applications. DATE 2022: 981-986 - [c15]Miltiadis G. Siavvas, Erol Gelenbe, Dimitrios Tsoukalas, Ilias Kalouptsoglou, Maria Mathioudaki, Mert Nakip, Dionisis D. Kehagias, Dimitrios Tzovaras:
The IoTAC Software Security-by-Design Platform: Concept, Challenges, and Preliminary Overview. DRCN 2022: 1-6 - [c14]Maria Mathioudaki, Dimitrios Tsoukalas, Miltiadis G. Siavvas, Dionisis D. Kehagias:
Comparing Univariate and Multivariate Time Series Models for Technical Debt Forecasting. ICCSA (Workshops 4) 2022: 62-78 - 2021
- [j7]Katarzyna Filus, Pawel Boryszko, Joanna Domanska, Miltiadis G. Siavvas, Erol Gelenbe:
Efficient Feature Selection for Static Analysis Vulnerability Prediction. Sensors 21(4): 1133 (2021) - [j6]Dimitrios Tsoukalas, Maria Mathioudaki, Miltiadis G. Siavvas, Dionisis D. Kehagias, Alexander Chatzigeorgiou:
A Clustering Approach Towards Cross-Project Technical Debt Forecasting. SN Comput. Sci. 2(1): 22 (2021) - [j5]Dionysios D. Kehagias, Marija Jankovic, Miltiadis G. Siavvas, Erol Gelenbe:
Investigating the Interaction between Energy Consumption, Quality of Service, Reliability, Security, and Maintainability of Computer Systems and Networks. SN Comput. Sci. 2(1): 23 (2021) - [j4]Miltiadis G. Siavvas, Dionisis D. Kehagias, Dimitrios Tzovaras, Erol Gelenbe:
A hierarchical model for quantifying software security based on static analysis alerts and software metrics. Softw. Qual. J. 29(2): 431-507 (2021) - [c13]Muhammad Ali Siddiqi, Angeliki-Agathi Tsintzira, Georgios Digkas, Miltiadis G. Siavvas, Christos Strydis:
Adding Security to Implantable Medical Devices: Can We Afford It? EWSN 2021: 67-78 - [c12]Miltiadis G. Siavvas, Ilias Kalouptsoglou, Dimitrios Tsoukalas, Dionisis D. Kehagias:
A Self-adaptive Approach for Assessing the Criticality of Security-Related Static Analysis Alerts. ICCSA (7) 2021: 289-305 - [c11]Maria Mathioudaki, Dimitrios Tsoukalas, Miltiadis G. Siavvas, Dionisis D. Kehagias:
Technical Debt Forecasting Based on Deep Learning Techniques. ICCSA (7) 2021: 306-322 - [c10]Dimitrios Tsoukalas, Miltiadis G. Siavvas, Maria Mathioudaki, Dionisis D. Kehagias:
An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results. QRS Companion 2021: 83-91 - 2020
- [j3]Dimitrios Tsoukalas, Dionysios D. Kehagias, Miltiadis G. Siavvas, Alexander Chatzigeorgiou:
Technical debt forecasting: An empirical study on open-source repositories. J. Syst. Softw. 170: 110777 (2020) - [c9]Ilias Kalouptsoglou, Miltiadis G. Siavvas, Dimitrios Tsoukalas, Dionisis D. Kehagias:
Cross-Project Vulnerability Prediction Based on Software Metrics and Deep Learning. ICCSA (4) 2020: 877-893 - [c8]Miltiadis G. Siavvas, Dimitrios Tsoukalas, Charalampos Marantos, Angeliki-Agathi Tsintzira, Marija Jankovic, Dimitrios Soudris, Alexander Chatzigeorgiou, Dionisis D. Kehagias:
The SDK4ED Platform for Embedded Software Quality Improvement - Preliminary Overview. ICCSA (4) 2020: 1035-1050 - [c7]Marija Jankovic, Miltiadis G. Siavvas, Dimitrios Tsoukalas, Dionysios D. Kehagias:
Evaluating and Improving the Internal Security of OPC-UA based Software Applications. I-ESA Workshops 2020 - [c6]Erol Gelenbe, Pawel Boryszko, Miltiadis G. Siavvas, Joanna Domanska:
Optimum Checkpoints for Time and Energy. MASCOTS 2020: 1-8 - [c5]Katarzyna Filus, Miltiadis G. Siavvas, Joanna Domanska, Erol Gelenbe:
The Random Neural Network as a Bonding Model for Software Vulnerability Prediction. MASCOTS (Revised Selected Papers) 2020: 102-116
2010 – 2019
- 2019
- [j2]Miltiadis G. Siavvas, Erol Gelenbe:
Optimum checkpoints for programs with loops. Simul. Model. Pract. Theory 97 (2019) - [c4]Miltiadis G. Siavvas, Erol Gelenbe:
Optimum Interval for Application-level Checkpoints. CSCloud/EdgeCom 2019: 145-150 - 2018
- [c3]Miltiadis G. Siavvas, Erol Gelenbe, Dionysios D. Kehagias, Dimitrios Tzovaras:
Static Analysis-Based Approaches for Secure Software Development. Euro-CYBERSEC 2018: 142-157 - [c2]Miltiadis G. Siavvas, Marija Jankovic, Dionysios D. Kehagias, Dimitrios Tzovaras:
Is Popularity an Indicator of Software Security? IEEE Conf. on Intelligent Systems 2018: 692-697 - [c1]Dimitrios Tsoukalas, Miltiadis G. Siavvas, Marija Jankovic, Dionysios D. Kehagias, Alexander Chatzigeorgiou, Dimitrios Tzovaras:
Methods and Tools for TD Estimation and Forecasting: A State-of-the-art Survey. IEEE Conf. on Intelligent Systems 2018: 698-705 - 2017
- [j1]Miltiadis G. Siavvas, Kyriakos C. Chatzidimitriou, Andreas L. Symeonidis:
QATCH - An adaptive framework for software product quality assessment. Expert Syst. Appl. 86: 350-366 (2017)
Coauthor Index
aka: Dionysios D. Kehagias
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 21:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint