Sotiris Ioannidis

Orcid: 0000-0001-9340-2241

According to our database1, Sotiris Ioannidis authored at least 219 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LightningNet: Distributed Graph-based Cellular Network Performance Forecasting for the Edge.
CoRR, 2024

Charting The Evolution of Solidity Error Handling.
CoRR, 2024

Energy-aware Trajectory Optimization for UAV-mounted RIS and Full-duplex Relay.
CoRR, 2024

2023
BotArtist: Twitter bot detection Machine Learning model based on Twitter suspension.
CoRR, 2023

Zero-Energy Reconfigurable Intelligent Surfaces (zeRIS).
CoRR, 2023

On the Mobility Effect in UAV-Mounted Absorbing Metasurfaces: A Theoretical and Experimental Study.
IEEE Access, 2023

On the Impact of Coding Depth in Sliding Window Random Linear Network Coding Schemes.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Slotted ALOHA with Code Combining for IoT Networks.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023

Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Comparing SWIPT Techniques for Zero-Energy RIS.
Proceedings of the IEEE International Conference on Communications, 2023

Syntax-Aware Mutation for Testing the Solidity Compiler.
Proceedings of the Computer Security - ESORICS 2023, 2023

A Moving Target Defense Security Solution for IoT Applications.
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

Russo-Ukrainian War: Prediction and explanation of Twitter suspension.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

BinWrap: Hybrid Protection against Native Node.js Add-ons.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Realizing Ambient Backscatter Communications with Intelligent Surfaces in 6G Wireless Systems.
IEEE Wirel. Commun., 2022

Discovery and Classification of Twitter Bots.
SN Comput. Sci., 2022

Explainable machine learning pipeline for Twitter bot detection during the 2020 US Presidential Elections.
Softw. Impacts, 2022

Software-Defined Reconfigurable Intelligent Surfaces: From Theory to End-to-End Implementation.
Proc. IEEE, 2022

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures.
ACM Comput. Surv., 2022

XR-RF Imaging Enabled by Software-Defined Metasurfaces and Machine Learning: Foundational Vision, Technologies and Challenges.
CoRR, 2022

Twitter Dataset on the Russo-Ukrainian War.
CoRR, 2022

Scheduling of multiple network packet processing applications using Pythia.
Comput. Networks, 2022

XR-RF Imaging Enabled by Software-Defined Metasurfaces and Machine Learning: Foundational Vision, Technologies and Challenges.
IEEE Access, 2022

Integrating Software-Defined Metasurfaces into Wireless Communication Systems: Design and Prototype Evaluation.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Incident Handling for Healthcare Organizations and Supply-Chains.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

The Best of Many Worlds: Scheduling Machine Learning Inference on CPU-GPU Integrated Architectures.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2022

Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022


Assessing the Effectiveness of Active Fences Against SCAs for Multi-Tenant FPGAs.
Proceedings of the 32nd International Conference on Field-Programmable Logic and Applications, 2022

Evaluating Short-Term Forecasting of Multiple Time Series in IoT Environments.
Proceedings of the 30th European Signal Processing Conference, 2022

A systematic analysis of the event-stream incident.
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022

HoneyChart: Automated Honeypot Management over Kubernetes.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

Network Intrusion Detection in Encrypted Traffic.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

SENTINEL - Approachable, tailor-made cybersecurity and data protection for small enterprises.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Dynamic Programmable Wireless Environment with UAV-mounted Static Metasurfaces.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2022

An Open Platform for Simulating the Physical Layer of 6G Communication Systems with Multiple Intelligent Surfaces.
Proceedings of the 18th International Conference on Network and Service Management, 2022

A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness.
Proceedings of the IEEE International Conference on Big Data, 2022



2021
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device.
IEEE Trans. Sustain. Comput., 2021

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware.
Sensors, 2021

Accelerating Phylogenetics Using FPGAs in the Cloud.
IEEE Micro, 2021

Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis.
IEEE Internet Things Mag., 2021

A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks.
Expert Syst. Appl., 2021

Next Generation Connected Materials for Intelligent Energy Propagation in Multiphysics Systems.
IEEE Commun. Mag., 2021

On the Use of Programmable Metasurfaces in Vehicular Networks.
Proceedings of the 22nd IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2021

Hard Edges: Hardware-Based Control-Flow Integrity for Embedded Devices.
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2021

A Hardware Implementation of BitSurfing for Communication without Packet Creation.
Proceedings of the NANOCOM '21: The Eighth Annual ACM International Conference on Nanoscale Computing and Communication, Virtual Event, Italy, September 7, 2021

Andromeda: Enabling Secure Enclaves for the Android Ecosystem.
Proceedings of the Information Security - 24th International Conference, 2021


Demo: Detecting Third-Party Library Problems with Combined Program Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets?
IEEE Veh. Technol. Mag., 2020

The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks.
ACM Trans. Priv. Secur., 2020

MobileTrust: Secure Knowledge Integration in VANETs.
ACM Trans. Cyber Phys. Syst., 2020

End-to-End Wireless Path Deployment With Intelligent Surfaces Using Interpretable Neural Networks.
IEEE Trans. Commun., 2020

On Architectural Support for Instruction Set Randomization.
ACM Trans. Archit. Code Optim., 2020

A fine-grained social network recommender system.
Soc. Netw. Anal. Min., 2020

Cyber-Ranges as a Mean of Security Culture Establishment.
ERCIM News, 2020

Analysis of Twitter and YouTube during USelections 2020.
CoRR, 2020

Integration of an online voting solution with the SMESEC security framework.
Proceedings of the IEEE International Systems Conference, 2020

Advanced Physical-layer Security as an App in Programmable Wireless Environments.
Proceedings of the 21st IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2020

Pythia: Scheduling of Concurrent Network Packet Processing Applications on Heterogeneous Devices.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

Mobility-Aware Beam Steering in Metasurface-Based Programmable Wireless Environments.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

An enclave assisted snapshot-based kernel integrity monitor.
Proceedings of the 3rd International Workshop on Edge Systems, Analytics and Networking, 2020

TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures.
Proceedings of the 25th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2020

The Million Dollar Handshake: Secure and Attested Communications in the Cloud.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
On the Network-Layer Modeling and Configuration of Programmable Wireless Environments.
IEEE/ACM Trans. Netw., 2019

Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS).
ERCIM News, 2019

Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem.
CoRR, 2019

A survey on vulnerability assessment tools and databases for cloud-based web applications.
Array, 2019

A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems.
Ad Hoc Networks, 2019

Exploration of Intercell Wireless Millimeter-Wave Communication in the Landscape of Intelligent Metasurfaces.
IEEE Access, 2019

A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks.
Proceedings of the World Wide Web Conference, 2019

An Interpretable Neural Network for Configuring Programmable Wireless Environments.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019


TALON: An Automated Framework for Cross-Device Tracking Detection.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

ABSense: Sensing Electromagnetic Waves on Metasurfaces via Ambient Compilation of Full Absorption.
Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication, 2019

Secure Semantic Interoperability for IoT Applications with Linked Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Botnet Attack Detection at the IoT Edge Based on Sparse Representation.
Proceedings of the 2019 Global IoT Summit, 2019

Towards the Insurance of Healthcare Systems.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

You Shall Not Register! Detecting Privacy Leaks Across Registration Forms.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Security Applications of GPUs.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019

Joint Compressed Sensing and Manipulation of Wireless Emissions with Intelligent Surfaces.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Organizing Network Management Logic with Circular Economy Principles.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Review of Security and Privacy for the Internet of Medical Things (IoMT).
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

REAPER: Real-time App Analysis for Augmenting the Android Permission System.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Towards Configurable Cloud Application Security.
Proceedings of the 19th IEEE/ACM International Symposium on Cluster, 2019

Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

Using Blockchains to Enable Big Data Analysis of Private Information.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

Towards Configurable Vulnerability Assessment in the Cloud.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
Network Topology Effects on the Detectability of Crossfire Attacks.
IEEE Trans. Inf. Forensics Secur., 2018

Utilizing the average node degree to assess the temporal growth rate of Twitter.
Soc. Netw. Anal. Min., 2018

Modeling, Simulating and Configuring Programmable Wireless Environments for Multi-User Multi-Objective Networking.
CoRR, 2018

Cross-Device Tracking: Systematic Method to Detect and Measure CDT.
CoRR, 2018

A New Wireless Communication Paradigm through Software-Controlled Metasurfaces.
IEEE Commun. Mag., 2018

Using any surface to realize a new paradigm for wireless communications.
Commun. ACM, 2018

Realizing Wireless Communication Through Software-Defined HyperSurface Environments.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

Automated Measurements of Cross-Device Tracking.
Proceedings of the Information and Operational Technology Security Systems, 2018

A Large-scale Analysis of Content Modification by Open HTTP Proxies.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Enabling GPU-assisted Antivirus Protection on Android Devices through Edge Offloading.
Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking, 2018

Towards Model-Driven Application Security across Clouds.
Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms, 2018

I-BiDaaS: Industrial-Driven Big Data as a Self-service Solution.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2018

BitSurfing: Wireless Communications with Outsourced Symbol Generation.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

Towards a Circular Economy via Intelligent Metamaterials.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

2017
Design and Implementation of a Stateful Network Packet Processing Framework for GPUs.
IEEE/ACM Trans. Netw., 2017

Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures.
IEEE/ACM Trans. Netw., 2017

Packet routing in 3D nanonetworks: A lightweight, linear-path scheme.
Nano Commun. Networks, 2017

Privacy Risks from Public Data Sources.
CoRR, 2017

Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis.
IEEE Access, 2017

The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps.
Proceedings of the 26th International Conference on World Wide Web, 2017

A novel protocol for network-controlled metasurfaces.
Proceedings of the 4th ACM International Conference on Nanoscale Computing and Communication, 2017

The Socket Store: An app model for the application-network interaction.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Secure Hardware-Software Architectures for Robust Computing Systems - SHARCS.
Proceedings of the European Project Space on Networks, 2017

No Sugar but All the Taste! Memory Encryption Without Architectural Support.
Proceedings of the Computer Security - ESORICS 2017, 2017

SAMPAC: Socially-Aware collaborative Multi-Party Access Control.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Reveal: Fine-grained Recommendations in Online Social Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Exploiting abused trending topics to identify spam campaigns in Twitter.
Soc. Netw. Anal. Min., 2016

Lightweight, self-tuning data dissemination for dense nanonetworks.
Nano Commun. Networks, 2016

GRIM: Leveraging GPUs for Kernel Integrity Monitoring.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Motivation Effect of Social Media Posts about Well-being and Healthy Living.
Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 2016

Stateless Linear-path Routing for 3D Nanonetworks.
Proceedings of the 3rd ACM International Conference on Nanoscale Computing and Communication, 2016

N3: Addressing and routing in 3D nanonetworks.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Usability Evaluation of Accessible Complex Graphs.
Proceedings of the Computers Helping People with Special Needs, 2016

A deployable routing system for nanonetworks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

HCFI: Hardware-enforced Control-Flow Integrity.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Investigating the complete corpus of referendum and elections tweets.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
GPU-assisted malware.
Int. J. Inf. Sec., 2015

Operational Trustworthiness Enabling Technologies - The OPTET Project.
ERCIM News, 2015

Testing for common sense (violation) in airline pricing or how complexity asymmetry defeated you and the web.
CoRR, 2015

Evolving Twitter: an experimental analysis of graph properties of the social graph.
CoRR, 2015

Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015

Revealing the relationship network behind link spam.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

CORONA: A Coordinate and Routing system for Nanonetworks.
Proceedings of the Second Annual International Conference on Nanoscale Computing and Communication, 2015

GPU-Disasm: A GPU-Based X86 Disassembler.
Proceedings of the Information Security - 18th International Conference, 2015

Two-factor authentication: is the world ready?: quantifying 2FA adoption.
Proceedings of the Eighth European Workshop on System Security, 2015

Secure Hardware-Software Architectures for Robust Computing Systems.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Face/Off: Preventing Privacy Leakage From Photos in Social Networks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Social Forensics: Searching for Needles in Digital Haystacks.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
GASPP: A GPU-Accelerated Stateful Packet Processing Framework.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

TRACER: A Platform for Securing Legacy Code.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Think Before RT: An Experimental Study of Abusing Twitter Trends.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Privacy Risks from Public Data Sources.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Flying Memcache: Lessons Learned from Different Acceleration Strategies.
Proceedings of the 26th IEEE International Symposium on Computer Architecture and High Performance Computing, 2014

Securing Legacy Code with the TRACER Platform.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Rage against the virtual machine: hindering dynamic analysis of Android malware.
Proceedings of the Seventh European Workshop on System Security, 2014

AndRadar: Fast Discovery of Android Applications in Alternative Markets.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

PixelVault: Using GPUs for Securing Cryptographic Operations.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Efficient software packet processing on heterogeneous and asymmetric hardware architectures.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014

2013
Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data.
Int. J. Digit. Crime Forensics, 2013

Practical information flow for legacy web applications.
Proceedings of the 8th Workshop on Implementation, 2013

ASIST: architectural support for instruction set randomization.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
i-Code: Real-Time Malicious Code Identification.
ERCIM News, 2012

Towards a Universal Data Provenance Framework Using Dynamic Instrumentation.
Proceedings of the Information Security and Privacy Research, 2012

Digging up social structures from documents on the web.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

All your face are belong to us: breaking Facebook's social authentication.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
we.b: the web of short urls.
Proceedings of the 20th International Conference on World Wide Web, 2011

CensMon: A Web Censorship Monitor.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011

Dynamic Monitoring of Dark IP Address Space (Poster).
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011

Detecting social network profile cloning.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Parallelization and characterization of pattern matching using GPUs.
Proceedings of the 2011 IEEE International Symposium on Workload Characterization, 2011

CAPTCHuring Automated (Smart)Phone Attacks.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

IRILD: An Information Retrieval Based Method for Information Leak Detection.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

Outsourcing Malicious Infrastructure to the Cloud.
Proceedings of the First SysSec Workshop 2011, 2011

MIDeA: a multi-parallel intrusion detection architecture.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Understanding the behavior of malicious applications in social networks.
IEEE Netw., 2010

New Advances on Privacy-Preserving Policy Reconciliation.
IACR Cryptol. ePrint Arch., 2010

GrAVity: A Massively Parallel Antivirus Engine.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks.
Proceedings of the Computer Security, 2010

2009
On looking FORWARD.
ERCIM News, 2009

A Greek (privacy) tragedy: the introduction of social security numbers in Greece.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Controlling Access to XML Documents over XML Native and Relational Databases.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Regular Expression Matching on Graphics Hardware for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Decentralized access control in distributed file systems.
ACM Comput. Surv., 2008

Gnort: High Performance Network Intrusion Detection Using Graphics Processors.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Compromising Anonymity Using Packet Spinning.
Proceedings of the Information Security, 11th International Conference, 2008

Antisocial Networks: Turning a Social Network into a Botnet.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.
Int. J. Netw. Secur., 2007

COVERAGE: detecting and reacting to worm epidemics using cooperation and validation.
Int. J. Inf. Sec., 2007

Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Distributed Privacy-Preserving Policy Reconciliation.
Proceedings of IEEE International Conference on Communications, 2007

2006
Flexible network monitoring with FLAME.
Comput. Networks, 2006

Privacy as an Operating System Service.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Preserving TCP Connections Across Host Address Changes.
Proceedings of the Information Security, 9th International Conference, 2006

Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation.
Proceedings of the Information Security, 9th International Conference, 2006

2003
WebDAVA: An Administrator-Free Approach To Web File-Sharing.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Design and Implementation of Virtual Private Services.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Secure and Flexible Global File Sharing.
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003

TAPI: Transactions for Accessing Public Infrastructure.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

A cooperative immunization system for an untrusting Internet.
Proceedings of the 11th IEEE International Conference on Networks, 2003

The STRONGMAN Architecture.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
A Study of the Relative Costs of Network Security Protocols.
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, 2002

Sub-operating systems: a new approach to application security.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

Efficient packet monitoring for network management.
Proceedings of the Management Solutions for the New Communications World, 2002

Open Packet Monitoring on FLAME: Safety, Performance, and Applications.
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002

Fileteller: Paying and Getting Paid for File Storage.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Building a Secure Web Browser.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001

Practical Network Applications on a Lightweight Active Management Environment.
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001

2000
Scalable Resource Control in Active Networks.
Proceedings of the Active Networks, Second International Working Conference, 2000

Implementing a distributed firewall.
Proceedings of the CCS 2000, 2000

1999
CRAUL: Compiler and run-time integration for adaptation under load.
Sci. Program., 1999

On Using Reliable Network RAM in Networks of Workstations.
Scalable Comput. Pract. Exp., 1999

On using network RAM as a non-volatile buffer.
Clust. Comput., 1999

1998
Compiler and Run-Time Support for Adaptive Load Balancing in Software Distributed Shared Memory Systems.
Proceedings of the Languages, 1998


  Loading...