| 2008 | 
|---|
| 22 | EE | Svetlana Radosavac,
George V. Moustakides,
John S. Baras,
Iordanis Koutsopoulos:
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks.
ACM Trans. Inf. Syst. Secur. 11(4):  (2008) | 
| 21 | EE | George V. Moustakides,
Vassilios S. Verykios:
A MaxMin approach for hiding frequent itemsets.
Data Knowl. Eng. 65(1): 75-89 (2008) | 
| 2007 | 
|---|
| 20 | EE | Alvaro A. Cárdenas,
George V. Moustakides,
John S. Baras:
Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models.
CISS 2007: 911-916 | 
| 19 | EE | Alvaro A. Cárdenas,
George V. Moustakides,
John S. Baras:
On Optimal Watermarking Schemes in Uncertain Gaussian Channels.
ICIP (4) 2007: 449-452 | 
| 18 | EE | Svetlana Radosavac,
Alvaro A. Cárdenas,
John S. Baras,
George V. Moustakides:
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.
Journal of Computer Security 15(1): 103-128 (2007) | 
| 2006 | 
|---|
| 17 | EE | George V. Moustakides,
Vassilios S. Verykios:
A Max-Min Approach for Hiding Frequent Itemsets.
ICDM Workshops 2006: 502-506 | 
| 16 | EE | Svetlana Radosavac,
John S. Baras,
George V. Moustakides:
Impact of optimal MAC layer attacks on the network layer.
SASN 2006: 135-146 | 
| 15 | EE | Xenofon G. Doukopoulos,
George V. Moustakides:
Blind adaptive channel estimation in ofdm systems.
IEEE Transactions on Wireless Communications 5(7): 1716-1725 (2006) | 
| 2005 | 
|---|
| 14 | EE | Xenofon G. Doukopoulos,
George V. Moustakides:
Adaptive power techniques for blind channel estimation in CDMA systems.
IEEE Transactions on Signal Processing 53(3): 1110-1120 (2005) | 
| 2004 | 
|---|
| 13 |  | Vassilios S. Verykios,
George V. Moustakides:
A Generalized Cost Optimal Decision Model for Record Matching.
IQIS 2004: 20-26 | 
| 2003 | 
|---|
| 12 | EE | Vassilios S. Verykios,
George V. Moustakides,
Mohamed G. Elfeky:
A Bayesian decision model for cost optimal record matching.
VLDB J. 12(1): 28-40 (2003) | 
| 2002 | 
|---|
| 11 | EE | George V. Moustakides:
Constrained Adaptive Linear Multiuser Detection Schemes.
VLSI Signal Processing 30(1-3): 293-309 (2002) | 
| 2001 | 
|---|
| 10 |  | George V. Moustakides,
H. Vincent Poor:
On the relative error probabilities of linear multiuser detectors.
IEEE Transactions on Information Theory 47(1): 450-456 (2001) | 
| 1998 | 
|---|
| 9 |  | George V. Moustakides:
Quickest Detection of Abrupt Changes for a Class of Random Processes.
IEEE Transactions on Information Theory 44(5): 1965-1968 (1998) | 
| 1993 | 
|---|
| 8 |  | George V. Moustakides,
Kostas Berberidis:
New LS and SVD based methods for estimating frequencies of complex sinusoids.
ISCAS 1993: 451-454 | 
| 1987 | 
|---|
| 7 |  | George V. Moustakides,
John B. Thomas:
Robust detection of signals in dependent noise.
IEEE Transactions on Information Theory 33(1): 11-15 (1987) | 
| 1986 | 
|---|
| 6 |  | George V. Moustakides,
John B. Thomas:
Optimum detection of a weak signal with minimal knowledge of dependency.
IEEE Transactions on Information Theory 32(1): 97-102 (1986) | 
| 5 |  | Michèle Basseville,
Albert Benveniste,
George V. Moustakides:
Detection and diagnosis of abrupt changes in modal characteristics of nonstationary digital signals.
IEEE Transactions on Information Theory 32(3): 412- (1986) | 
| 1985 | 
|---|
| 4 |  | George V. Moustakides:
Robust detection of signals: A large deviations approach.
IEEE Transactions on Information Theory 31(6): 822-825 (1985) | 
| 1984 | 
|---|
| 3 |  | George V. Moustakides,
John B. Thomas:
Min-max detection of weak signals in phi-mixing noise.
IEEE Transactions on Information Theory 30(3): 529-537 (1984) | 
| 1983 | 
|---|
| 2 |  | George V. Moustakides,
Saleem A. Kassam:
Robust Wiener filters for random signals in correlated noise.
IEEE Transactions on Information Theory 29(4): 614- (1983) | 
| 1982 | 
|---|
| 1 |  | Saleem A. Kassam,
George V. Moustakides,
Jung Gil Shin:
Robust detection of known signals in asymmetric noise.
IEEE Transactions on Information Theory 28(1): 84-91 (1982) |