Spiros Antonatos

According to our database1, Spiros Antonatos authored at least 33 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
HoneyChart: Automated Honeypot Management over Kubernetes.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Secure k-Anonymization over Encrypted Databases.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2020
The Bounded Laplace Mechanism in Differential Privacy.
J. Priv. Confidentiality, 2020

PrivLeAD: Privacy Leakage Detection on the Web.
Proceedings of the Intelligent Systems and Applications, 2020

2019
AnonTokens: tracing re-identification attacks through decoy records.
CoRR, 2019

An Extensible De-Identification Framework for Privacy Protection of Unstructured Health Information: Creating Sustainable Privacy Infrastructures.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

2018
PRIMA: An End-to-End Framework for Privacy at Scale.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2017
(k, ε)-Anonymity: k-Anonymity with ε-Differential Privacy.
CoRR, 2017

2016
FPVI: A scalable method for discovering privacy vulnerabilities in microdata.
Proceedings of the IEEE International Smart Cities Conference, 2016

2015
Traffic Measurement and Route Recommendation System for Mass Rapid Transit (MRT).
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

2014
Oscillation Resolution for Mobile Phone Cellular Tower Data to Enable Mobility Modelling.
Proceedings of the IEEE 15th International Conference on Mobile Data Management, 2014

Home and Work Place Prediction for Urban Planning Using Mobile Network Data.
Proceedings of the IEEE 15th International Conference on Mobile Data Management, 2014

2010
Understanding the behavior of malicious applications in social networks.
IEEE Netw., 2010

Using social networks to harvest email addresses.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

A Systematic Characterization of IM Threats using Honeypots.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Defending against known and unknown attacks using a network of affined honeypots
PhD thesis, 2009

Regular Expression Matching on Graphics Hardware for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing.
Proceedings of the Third International Conference on Network and System Security, 2009

Harnessing the Power of P2P Systems for Fast Attack Signature Validation.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure.
ACM Trans. Inf. Syst. Secur., 2008

Gnort: High Performance Network Intrusion Detection Using Graphics Processors.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Antisocial Networks: Turning a Social Network into a Botnet.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Defending against hitlist worms using network address space randomization.
Comput. Networks, 2007

Flexible and high-performance anonymization of NetFlow records using anontool.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2006
An Active Splitter Architecture for Intrusion Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2006

A Generic Anonymization Framework for Network Traffic.
Proceedings of IEEE International Conference on Communications, 2006

On the Privacy Risks of Publishing Anonymized IP Network Traces.
Proceedings of the Communications and Multimedia Security, 2006

Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.
Proceedings of the Communications and Multimedia Security, 2006

TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.
Proceedings of the Communications and Multimedia Security, 2006

2005
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
Generating realistic workloads for network intrusion detection systems.
Proceedings of the Fourth International Workshop on Software and Performance, 2004

Performance Analysis of Content Matching Intrusion Detection Systems.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

2003
E<sup>2</sup>xB: A Domain-Specific String Matching Algorithm for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003


  Loading...