Kostas G. Anagnostakis

According to our database1, Kostas G. Anagnostakis authored at least 44 papers between 2000 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Paranoid Android: versatile protection for smartphones.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Comprehensive shellcode detection using runtime heuristics.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Real-world Detection of Polymorphic Attacks.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

An Empirical Study of Real-world Polymorphic Code Injection Attacks.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

2008
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure.
ACM Trans. Inf. Syst. Secur., 2008

Safe execution of untrusted applications on embedded network processors.
Int. J. Embed. Syst., 2008

Antisocial Networks: Turning a Social Network into a Botnet.
Proceedings of the Information Security, 11th International Conference, 2008

Real-world polymorphic attack detection using network-level emulation.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Network-level polymorphic shellcode detection using emulation.
J. Comput. Virol., 2007

Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.
Int. J. Netw. Secur., 2007

COVERAGE: detecting and reacting to worm epidemics using cooperation and validation.
Int. J. Inf. Sec., 2007

Defending against hitlist worms using network address space randomization.
Comput. Networks, 2007

Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Emulation-Based Detection of Non-self-contained Polymorphic Shellcode.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

GAS: Overloading a File Sharing Network as an Anonymizing System.
Proceedings of the Advances in Information and Computer Security, 2007

2006
An Active Splitter Architecture for Intrusion Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2006

Flexible network monitoring with FLAME.
Comput. Networks, 2006

Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation.
Proceedings of the Information Security, 9th International Conference, 2006

On the Privacy Risks of Publishing Anonymized IP Network Traces.
Proceedings of the Communications and Multimedia Security, 2006

TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.
Proceedings of the Communications and Multimedia Security, 2006

Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Detecting Targeted Attacks Using Shadow Honeypots.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Design and Implementation of a High-Performance Network Intrusion Prevention System.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Efficient content-based detection of zero-day worms.
Proceedings of IEEE International Conference on Communications, 2005

2004
Generating realistic workloads for network intrusion detection systems.
Proceedings of the Fourth International Workshop on Software and Performance, 2004

A hybrid direct-indirect estimator of network internal delays.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Performance Analysis of Content Matching Intrusion Detection Systems.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Design of an application programming interface for IP network monitoring.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
E<sup>2</sup>xB: A Domain-Specific String Matching Algorithm for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor.
Proceedings of the Software and Compilers for Embedded Systems, 7th International Workshop, 2003

An Active Traffic Splitter Architecture for Intrusion Detection.
Proceedings of the 11th International Workshop on Modeling, 2003

cing: Measuring Network-Internal Delays using only Existing Infrastructure.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

A cooperative immunization system for an untrusting Internet.
Proceedings of the 11th IEEE International Conference on Networks, 2003

2002
Direct measurement vs. indirect inference for determining network-internal delays.
Perform. Evaluation, 2002

Efficient packet monitoring for network management.
Proceedings of the Management Solutions for the New Communications World, 2002

On the Sensitivity of Network Simulation to Topology.
Proceedings of the 10th International Workshop on Modeling, 2002

Open Packet Monitoring on FLAME: Safety, Performance, and Applications.
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002

2001
Application of computational intelligence techniques in active networks.
Soft Comput., 2001

The price of safety in an active network.
J. Commun. Networks, 2001

Practical Network Applications on a Lightweight Active Management Environment.
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001

2000
Scalable Resource Control in Active Networks.
Proceedings of the Active Networks, Second International Working Conference, 2000


  Loading...