Xenofontas A. Dimitropoulos

Affiliations:
  • Foundation for Research & Technology Hellas (FORTH), Institute of Computer Science
  • ETH Zurich, Computer Engineering and Networks Laboratory
  • IBM Research, Zurich
  • Georgia Institute of Technology, Atlanta, School of Electrical and Computer Engineering


According to our database1, Xenofontas A. Dimitropoulos authored at least 88 papers between 2003 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Modeling the Age of Information in UAV-aided Wireless Networks.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2022

2021
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs.
IEEE/ACM Trans. Netw., 2021

Seven years in the life of Hypergiants' off-nets.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

2019
Improving networked music performance systems using application-network collaboration.
Concurr. Comput. Pract. Exp., 2019

Joint Optimization of UAV Placement and Caching under Battery Constraints in UAV-aided Small-Cell Networks.
Proceedings of the ACM SIGCOMM 2019 Workshop on Mobile AirGround Edge Computing, 2019

Detecting Network Disruptions At Colocation Facilities.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
ARTEMIS: Neutralizing BGP Hijacking Within a Minute.
IEEE/ACM Trans. Netw., 2018

Enabling Ultra-Low Delay Teleorchestras using Software Defined Networking.
CoRR, 2018

A Survey among Network Operators on BGP Prefix Hijacking.
Comput. Commun. Rev., 2018

CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching.
Proceedings of the 2018 Workshop on Mobile Edge Communications, 2018

2017
Backpressure on the Backbone: A Lightweight, Non-Intrusive Traffic Engineering Approach.
IEEE Trans. Netw. Serv. Manag., 2017

Re-mapping the Internet: Bring the IXPs into Play.
CoRR, 2017

Can SDN accelerate BGP convergence? - A performance analysis of inter-domain routing centralization.
Proceedings of the 2017 IFIP Networking Conference, 2017

Application-network collaboration using SDN for ultra-low delay teleorchestras.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Re-mapping the internet: Bring the IXPs into play: www.inspire.edu.gr/ixp-map.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Poster abstract: SDN-based handover management in enterprise networked femtocells with X2-forwarding scheme.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Shortcuts through colocation facilities.
Proceedings of the 2017 Internet Measurement Conference, 2017

SDN-based local mobility management with X2-interface in femtocell networks.
Proceedings of the 22nd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2017

Characterizing User-to-User Connectivity with RIPE Atlas.
Proceedings of the Applied Networking Research Workshop, 2017

2016
Inter-domain SDN: Analysing the Effects of Routing Centralization on BGP Convergence Time.
SIGMETRICS Perform. Evaluation Rev., 2016

Lost in Space: Improving Inference of IPv4 Address Space Utilization.
IEEE J. Sel. Areas Commun., 2016

Analysing the Effects of Routing Centralization on BGP Convergence Time.
CoRR, 2016

Monitor, Detect, Mitigate: Combating BGP Prefix Hijacking in Real-Time with ARTEMIS.
CoRR, 2016

A Comparative Look into Public IXP Datasets.
Comput. Commun. Rev., 2016

On the Interplay of Link-Flooding Attacks and Traffic Engineering.
Comput. Commun. Rev., 2016

The BGP hackathon 2016 report.
Comput. Commun. Rev., 2016

Stitching Inter-Domain Paths over IXPs.
Proceedings of the Symposium on SDN Research, 2016

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

traIXroute: Detecting IXPs in traceroute paths.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

A novel framework for modeling and mitigating distributed link flooding attacks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Routing centralization across domains via SDN: A model and emulation framework for BGP evolution.
Comput. Networks, 2015

How Dangerous Is Internet Scanning? - A Measurement Study of the Aftermath of an Internet-Wide Scan.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

Transparent Estimation of Internet Penetration from Network Observations.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

Policy-compliant path diversity and bisection bandwidth.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
IDS Alert Correlation in the Wild With EDGe.
IEEE J. Sel. Areas Commun., 2014

Towards Defeating the Crossfire Attack using SDN.
CoRR, 2014

Lost in Space: Improving Inference of IPv4 Address Space Utilization.
CoRR, 2014

Visualizing big network traffic data using frequent pattern mining and hypergraphs.
Computing, 2014

Estimating internet address space usage through passive measurements.
Comput. Commun. Rev., 2014

Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Control Exchange Points: Providing QoS-enabled End-to-End Services via SDN-based Inter-domain Routing Orchestration.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

2013
A quality metric for IDS signatures: in the wild the size matters.
EURASIP J. Inf. Secur., 2013

FaRNet: Fast recognition of high-dimensional patterns from big network traffic data.
Comput. Networks, 2013

Collaborative network outage troubleshooting with secure multiparty computation.
IEEE Commun. Mag., 2013

Understanding Network Forensics Analysis in an Operational Environment.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

FaRNet: fast recognition of high multi-dimensional network traffic patterns.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Indexing million of packets per second using GPUs.
Proceedings of the 2013 Internet Measurement Conference, 2013

Federated flow-based approach for privacy preserving connectivity tracking.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
Anomaly extraction in backbone networks using association rules.
IEEE/ACM Trans. Netw., 2012

How to Protect Data Privacy in Collaborative Network Security.
ERCIM News, 2012

pcapIndex: an index for network packet traces with legacy compatibility.
Comput. Commun. Rev., 2012

Classifying internet one-way traffic.
Proceedings of the ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, 2012

Practical anomaly detection based on classifying frequent traffic patterns.
Proceedings of the 2012 Proceedings IEEE INFOCOM Workshops, 2012

RasterZip: compressing network monitoring data with support for partial decompression.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Outsourcing the routing control logic: better internet routing based on SDN principles.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

Shedding Light on Log Correlation in Network Forensics Analysis.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

K-sparse approximation for traffic histogram dimensionality reduction.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
Privacy-preserving distributed network troubleshooting - bridging the gap between theory and practice.
ACM Trans. Inf. Syst. Secur., 2011

Detecting, validating and characterizing computer infections in the wild.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Research Roadmap on Security Measurements.
Proceedings of the First SysSec Workshop 2011, 2011

2010
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics.
Proceedings of the 19th USENIX Security Symposium, 2010

Automating root-cause analysis of network anomalies using frequent itemset mining.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Digging into HTTPS: flow-based classification of webmail traffic.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Fast Privacy-Preserving Top-k Queries Using Secret Sharing.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

2009
Graph annotations in modeling complex network topologies.
ACM Trans. Model. Comput. Simul., 2009

Histogram-based traffic anomaly detection.
IEEE Trans. Netw. Serv. Manag., 2009

Unveiling the underlying relationships over a network for monitoring purposes.
Int. J. Netw. Manag., 2009

SEPIA: Security through Private Information Aggregation
CoRR, 2009

On the 95-Percentile Billing Method.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

2008
The eternal sunshine of the sketch data structure.
Comput. Networks, 2008

Advanced network monitoring brings life to the awareness plane.
IEEE Commun. Mag., 2008

On cycles in AS relationships.
Comput. Commun. Rev., 2008

Probabilistic lossy counting: an efficient algorithm for finding heavy hitters.
Comput. Commun. Rev., 2008

2007
AS relationships: inference and validation.
Comput. Commun. Rev., 2007

Dependency Detection Using a Fuzzy Engine.
Proceedings of the Managing Virtualization of Networks and Services, 2007

2006
Measuring and Modeling Internet Routing for Realistic Simulations.
PhD thesis, 2006

Revealing the Autonomous System Taxonomy: The Machine Learning Approach
CoRR, 2006

Efficient large-scale BGP simulations.
Comput. Networks, 2006

The internet AS-level topology: three data sources and one definitive metric.
Comput. Commun. Rev., 2006

Modeling Autonomous-System Relationships.
Proceedings of the 20th IEEE/ACM/SCS Workshop on Principles of Advanced and Distributed Simulation, 2006

2005
The Internet AS-Level Topology: Three Data Sources and One Definitive Metric
CoRR, 2005

Lessons from Three Views of the Internet Topology
CoRR, 2005

Inferring AS Relationships: Dead End or Lively Beginning?
Proceedings of the Experimental and Efficient Algorithms, 4th InternationalWorkshop, 2005

Revisiting Internet AS-Level Topology Discovery.
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005

2004
A BGP Attack Against Traffic Engineering.
Proceedings of the 36th conference on Winter simulation, 2004

Large-Scale Simulation Models of BGP.
Proceedings of the 12th International Workshop on Modeling, 2004

2003
Creating Realistic BGP Models.
Proceedings of the 11th International Workshop on Modeling, 2003


  Loading...