Year |
Citation |
Score |
2019 |
Mitropoulos D, Louridas P, Polychronakis M, Keromytis AD. Defending Against Web Application Attacks: Approaches, Challenges and Implications Ieee Transactions On Dependable and Secure Computing. 16: 188-203. DOI: 10.1109/Tdsc.2017.2665620 |
0.462 |
|
2015 |
Petsios T, Kemerlis VP, Polychronakis M, Keromytis AD. DynaGuard: Armoring canary-based protections against brute-force attacks Acm International Conference Proceeding Series. 7: 351-360. DOI: 10.1145/2818000.2818031 |
0.352 |
|
2015 |
Oren Y, Kemerlis VP, Sethumadhavan S, Keromytis AD. The spy in the sandbox: Practical cache attacks in JavaScript and their implications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1406-1418. DOI: 10.1145/2810103.2813708 |
0.324 |
|
2015 |
Oren Y, Keromytis AD. Attacking the internet using broadcast digital television Acm Transactions On Information and System Security. 17. DOI: 10.1145/2723159 |
0.451 |
|
2015 |
Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD. An efficient and easily deployable method for dealing with DoS in SIP services Computer Communications. 57: 50-63. DOI: 10.1016/J.Comcom.2014.11.002 |
0.451 |
|
2015 |
Chakravarty S, Portokalidis G, Polychronakis M, Keromytis AD. Detection and analysis of eavesdropping in anonymous communication networks International Journal of Information Security. 14: 205-220. DOI: 10.1007/S10207-014-0256-7 |
0.619 |
|
2014 |
Polakis I, Ilia P, Maggi F, Lancini M, Kontaxis G, Zanero S, Ioannidis S, Keromytis AD. Faces in the distorting mirror: Revisiting photo-based social authentication Proceedings of the Acm Conference On Computer and Communications Security. 501-512. DOI: 10.1145/2660267.2660317 |
0.558 |
|
2014 |
Pappas V, Krell F, Vo B, Kolesnikov V, Malkin T, Choi SG, George W, Keromytis A, Bellovin S. Blind seer: A scalable private DBMS Proceedings - Ieee Symposium On Security and Privacy. 359-374. DOI: 10.1109/SP.2014.30 |
0.568 |
|
2014 |
Pappas V, Polychronakis M, Keromytis AD. Dynamic reconstruction of relocation information for stripped binaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 68-87. DOI: 10.1007/978-3-319-11379-1_4 |
0.61 |
|
2014 |
Chakravarty S, Barbera MV, Portokalidis G, Polychronakis M, Keromytis AD. On the effectiveness of traffic analysis against anonymity networks using flow records Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8362: 247-257. DOI: 10.1007/978-3-319-04918-2_24 |
0.305 |
|
2014 |
Kontaxis G, Polychronakis M, Keromytis AD. Computational decoys for cloud security Secure Cloud Computing. 2147483647: 261-270. DOI: 10.1007/978-1-4614-9278-8_12 |
0.319 |
|
2013 |
Chun SA, Warner J, Keromytis AD. Privacy policy-driven mashups International Journal of Business Continuity and Risk Management. 4: 344-370. DOI: 10.1504/Ijbcrm.2013.058989 |
0.393 |
|
2013 |
Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD. A privacy-preserving entropy-driven framework for tracing DoS attacks in VoIP Proceedings - 2013 International Conference On Availability, Reliability and Security, Ares 2013. 224-229. DOI: 10.1109/ARES.2013.30 |
0.363 |
|
2013 |
Pappas V, Kemerlis VP, Zavou A, Polychronakis M, Keromytis AD. CloudFence: Data flow tracking as a cloud service Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8145: 411-431. DOI: 10.1007/978-3-642-41284-4_21 |
0.798 |
|
2013 |
Barbera MV, Kemerlis VP, Pappas V, Keromytis AD. CellFlood: Attacking tor onion routers on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 664-681. DOI: 10.1007/978-3-642-40203-6_37 |
0.671 |
|
2013 |
Zavou A, Pappas V, Kemerlis VP, Polychronakis M, Portokalidis G, Keromytis AD. Cloudopsy: An autopsy of data flows in the cloud Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8030: 366-375. DOI: 10.1007/978-3-642-39345-7-39 |
0.797 |
|
2012 |
Bowen BM, Kemerlis VP, Prabhu P, Keromytis AD, Stolfo SJ. A system for generating and injecting indistinguishable network decoys Journal of Computer Security. 20: 199-221. DOI: 10.3233/Jcs-2011-0439 |
0.432 |
|
2012 |
Polakis I, Lancini M, Kontaxis G, Maggi F, Ioannidis S, Keromytis AD, Zanero S. All your face are belong to us: Breaking Facebook's social authentication Acm International Conference Proceeding Series. 399-408. DOI: 10.1145/2420950.2421008 |
0.565 |
|
2012 |
Zavou A, Portokalidis G, Keromytis AD. Self-healing multitier architectures using cascading rescue points Acm International Conference Proceeding Series. 379-388. DOI: 10.1145/2420950.2421005 |
0.811 |
|
2012 |
Geneiatakis D, Portokalidis G, Kemerlis VP, Keromytis AD. Adaptive defenses for commodity software through virtual application partitioning Proceedings of the Acm Conference On Computer and Communications Security. 133-144. DOI: 10.1145/2382196.2382214 |
0.381 |
|
2012 |
Zavou A, Athanasopoulos E, Portokalidis G, Keromytis AD. Exploiting split browsers for efficiently protecting user data Proceedings of the Acm Conference On Computer and Communications Security. 37-42. DOI: 10.1145/2381913.2381921 |
0.802 |
|
2012 |
Keromytis AD. A comprehensive survey of voice over IP security research Ieee Communications Surveys and Tutorials. 14: 514-537. DOI: 10.1109/Surv.2011.031611.00112 |
0.416 |
|
2012 |
Stolfo SJ, Salem MB, Keromytis AD. Fog computing: Mitigating insider data theft attacks in the cloud Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2012. 125-128. DOI: 10.1109/SPW.2012.19 |
0.34 |
|
2012 |
Pappas V, Polychronakis M, Keromytis AD. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization Proceedings - Ieee Symposium On Security and Privacy. 601-615. DOI: 10.1109/SP.2012.41 |
0.593 |
|
2012 |
Keromytis AD, Geambasu R, Sethumadhavan S, Stolfo SJ, Yang J, Benameur A, Dacier M, Elder M, Kienzle D, Stavrou A. The MEERKATS cloud security architecture Proceedings - 32nd Ieee International Conference On Distributed Computing Systems Workshops, Icdcsw 2012. 446-450. DOI: 10.1109/ICDCSW.2012.42 |
0.303 |
|
2012 |
Gessiou E, Pappas V, Athanasopoulos E, Keromytis AD, Ioannidis S. Towards a universal data provenance framework using dynamic instrumentation Ifip Advances in Information and Communication Technology. 376: 103-114. DOI: 10.1007/978-3-642-30436-1_9 |
0.724 |
|
2011 |
Diament T, Lee HK, Keromytis AD, Yung M. The efficient dual receiver cryptosystem and its applications International Journal of Network Security. 13: 135-151. DOI: 10.7916/D81R7100 |
0.441 |
|
2011 |
Keromytis AD, Stolfo SJ, Yang J, Stavrou A, Ghosh A, Engler D, Dacier M, Elder M, Kienzle D. The MINESTRONE architecture combining static and dynamic analysis techniques for software security Proceedings - 1st Syssec Workshop, Syssec 2011. 53-56. DOI: 10.1109/SysSec.2011.33 |
0.305 |
|
2011 |
Geneiatakis D, Portokalidis G, Keromytis AD. A multilayer overlay network architecture for enhancing IP services availability against DoS Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7093: 322-336. DOI: 10.1007/978-3-642-25560-1_22 |
0.377 |
|
2011 |
Zavou A, Portokalidis G, Keromytis AD. Taint-exchange: A generic system for cross-process and cross-host taint tracking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7038: 113-128. DOI: 10.1007/978-3-642-25141-2_8 |
0.785 |
|
2011 |
Jee K, Sidiroglou-Douskos S, Stavrou A, Keromytis A. An adversarial evaluation of network signaling and control mechanisms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 252-265. DOI: 10.1007/978-3-642-24209-0_17 |
0.306 |
|
2011 |
Pappas V, Bowen BM, Keromytis AD. Evaluation of a spyware detection system using thin client computing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 222-232. DOI: 10.1007/978-3-642-24209-0_15 |
0.556 |
|
2011 |
Chakravarty S, Portokalidis G, Polychronakis M, Keromytis AD. Detecting traffic snooping in tor using decoys Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 222-241. DOI: 10.1007/978-3-642-23644-0_12 |
0.334 |
|
2011 |
Pappas V, Keromytis AD. Measuring the deployment hiccups of DNSSEC Communications in Computer and Information Science. 192: 44-53. DOI: 10.1007/978-3-642-22720-2_5 |
0.638 |
|
2011 |
Alicherry M, Keromytis AD. Misuse detection in consent-based networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 38-56. DOI: 10.1007/978-3-642-21554-4_3 |
0.747 |
|
2011 |
O'Sullivan P, Anand K, Kotha A, Smithson M, Barua R, Keromytis AD. Retrofitting security in COTS software with binary rewriting Ifip Advances in Information and Communication Technology. 354: 154-172. DOI: 10.1007/978-3-642-21424-0_13 |
0.333 |
|
2011 |
Pappas V, Bowen BM, Keromytis AD. Crimeware swindling without virtual machines Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6531: 196-202. DOI: 10.1007/978-3-642-18178-8-17 |
0.517 |
|
2010 |
Keromytis AD. A Look at VoIP Vulnerabilities Log In. 35: 41-50. DOI: 10.7916/D8G73Q86 |
0.409 |
|
2010 |
Turner DM, Prevelakis V, Keromytis AD. A market-based bandwidth charging framework Acm Transactions On Internet Technology. 10. DOI: 10.1145/1667067.1667068 |
0.337 |
|
2010 |
Boyd SW, Kc GS, Locasto ME, Keromytis AD, Prevelakis V. On the general applicability of instruction-set randomization Ieee Transactions On Dependable and Secure Computing. 7: 255-270. DOI: 10.1109/Tdsc.2008.58 |
0.728 |
|
2010 |
Alicherry M, Keromytis AD. DIPLOMA: Distributed policy enforcement architecture for MANETs Proceedings - 2010 4th International Conference On Network and System Security, Nss 2010. 89-98. DOI: 10.1109/NSS.2010.27 |
0.759 |
|
2010 |
Keromytis AD. Voice-over-IP scurity: Research and practice Ieee Security and Privacy. 8: 76-78. DOI: 10.1109/MSP.2010.87 |
0.306 |
|
2010 |
Kemerlis VP, Pappas V, Portokalidis G, Keromytis AD. iLeak: A lightweight system for detecting inadvertent information leaks Proceedings - European Conference On Computer Network Defense, Ec2nd 2010. 21-28. DOI: 10.1109/EC2ND.2010.13 |
0.64 |
|
2010 |
Cova M, Leita C, Thonnard O, Keromytis A, Dacier M. Gone rogue: An analysis of rogue security software campaigns Ec2nd 2009 - European Conference On Computer Network Defense. 1-3. DOI: 10.1109/EC2ND.2009.8 |
0.315 |
|
2010 |
Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5 |
0.703 |
|
2010 |
Alicherry M, Keromytis AD. Securing MANET multicast using DIPLOMA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6434: 232-250. DOI: 10.1007/978-3-642-16825-3_16 |
0.767 |
|
2010 |
Bowen BM, Prabhu P, Kemerlis VP, Sidiroglou S, Keromytis AD, Stolfo SJ. BotSwindler: Tamper resistant injection of believable decoys in VM-based hosts for crimeware detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 118-137. DOI: 10.1007/978-3-642-15512-3_7 |
0.698 |
|
2009 |
Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. Anonymity in wireless broadcast networks International Journal of Network Security. 8: 37-51. DOI: 10.7916/D8183H1W |
0.42 |
|
2009 |
Kim HC, Keromytis A. On the deployment of dynamic taint analysis for application communities Ieice Transactions On Information and Systems. 548-551. DOI: 10.1587/Transinf.E92.D.548 |
0.34 |
|
2009 |
Sidiroglou S, Laadan O, Perez CR, Viennot N, Nieh J, Keromytis AD. ASSURE: Automatic software self-healing using REscue points Acm Sigplan Notices. 44: 37-48. DOI: 10.1145/1508244.1508250 |
0.704 |
|
2009 |
Keromytis AD. Randomized instruction sets and runtime environments past research and future directions Ieee Security and Privacy. 7: 18-25. DOI: 10.1109/MSP.2009.15 |
0.315 |
|
2009 |
Blaze M, Kannan S, Lee I, Sokolsky O, Smith JM, Keromytis AD, Lee W. Dynamic trust management Computer. 42: 44-52. DOI: 10.1109/Mc.2009.51 |
0.54 |
|
2009 |
Alicherry M, Keromytis AD. Double check: Multi-path verification against man-in-the-middle attacks Proceedings - Ieee Symposium On Computers and Communications. 557-563. DOI: 10.1109/ISCC.2009.5202224 |
0.757 |
|
2009 |
Alicherry M, Keromytis AD, Stavrou A. Evaluating a collaborative defense architecture for MANETs 2009 Ieee International Conference On Internet Multimedia Services Architecture and Applications, Imsaa 2009. DOI: 10.1109/IMSAA.2009.5439498 |
0.764 |
|
2009 |
Cook DL, Yung M, Keromytis AD. Elastic block ciphers: Method, security and instantiations International Journal of Information Security. 8: 211-231. DOI: 10.1007/S10207-008-0075-9 |
0.62 |
|
2009 |
Alicherry M, Keromytis AD, Stavrou A. Deny-by-default distributed security policy enforcement in mobile ad hoc networks Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 41-50. DOI: 10.1007/978-3-642-05284-2_3 |
0.746 |
|
2009 |
Burnside M, Keromytis AD. F3ildCrypt: End-to-end protection of sensitive information in web services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 491-506. DOI: 10.1007/978-3-642-04474-8_38 |
0.364 |
|
2009 |
Cook DL, Yung M, Keromytis A. Constructing variable-Length PRPs and SPRPs from fixed-length PRPs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5487: 157-180. DOI: 10.1007/978-3-642-01440-6_14 |
0.487 |
|
2009 |
Antonatos S, Locasto M, Sidiroglou S, Keromytis AD, Markatos E. Defending against next generation through network/endpoint collaboration and interaction Lecture Notes in Electrical Engineering. 30: 131-141. DOI: 10.1007/978-0-387-85555-4_9 |
0.712 |
|
2009 |
Cook DL, Yung M, Keromytis AD. Elastic block ciphers in practice: Constructions and modes of encryption Lecture Notes in Electrical Engineering. 30: 69-91. DOI: 10.1007/978-0-387-85555-4_5 |
0.51 |
|
2009 |
Sidiroglou S, Laadan O, Perez CR, Viennot N, Nieh J, Keromytis AD. ASSURE: Automatic software self-healing using REscue points Acm Sigplan Notices. 44: 37-48. |
0.742 |
|
2008 |
Miltchev S, Smith JM, Prevelakis V, Keromytis A, Ioannidis S. Decentralized access control in distributed file systems Acm Computing Surveys. 40. DOI: 10.1145/1380584.1380588 |
0.68 |
|
2008 |
Cretu GF, Stavrou A, Locasto ME, Stolfo SJ, Keromytis AD. Casting out demons: Sanitizing training data for anomaly sensors Proceedings - Ieee Symposium On Security and Privacy. 81-95. DOI: 10.1109/SP.2008.11 |
0.612 |
|
2008 |
Locasto ME, Burnside M, Keromytis AD. Online network forensics for automatic repair validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 136-151. DOI: 10.1007/978-3-540-89598-5-9 |
0.701 |
|
2008 |
Locasto ME, Stavrou A, Cretu GF, Keromytis AD, Stolfo SJ. Return value predictability profiles for self-healing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 152-166. DOI: 10.1007/978-3-540-89598-5-10 |
0.671 |
|
2008 |
Burnside M, Keromytis AD. Path-based access control for enterprise networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5222: 191-203. DOI: 10.1007/978-3-540-85886-7_13 |
0.316 |
|
2008 |
Cook DL, Yung M, Keromytis AD. Methods for linear and differential cryptanalysis of elastic block ciphers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5107: 187-202. DOI: 10.1007/978-3-540-70500-0-14 |
0.543 |
|
2008 |
Stavrou A, Locasto ME, Keromytis AD. Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54. DOI: 10.1007/978-3-540-68914-0_3 |
0.723 |
|
2007 |
Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Anagnostakis K, Smith JM. Virtual private services: Coordinated policy enforcement for distributed applications International Journal of Network Security. 4: 69-80. DOI: 10.6633/Ijns.200701.4(1).08 |
0.703 |
|
2007 |
Locasto ME, Stavrou A, Keromytis AD. Dark application communities Proceedings New Security Paradigms Workshop. 11-18. DOI: 10.1145/1278940.1278943 |
0.629 |
|
2007 |
Keromytis AD, Smith JM. Requirements for scalable access control and security management architectures Acm Transactions On Internet Technology. 7. DOI: 10.1145/1239971.1239972 |
0.615 |
|
2007 |
Sidiroglou S, Laadan O, Keromytis AD, Nieh J. Using rescue points to navigate software recovery (short paper) Proceedings - Ieee Symposium On Security and Privacy. 273-278. DOI: 10.1109/SP.2007.38 |
0.716 |
|
2007 |
Sidiroglou S, Stavrou A, Keromytis AD. Mediated overlay services (MOSES): Network security as a composable service 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567338 |
0.748 |
|
2007 |
Aviv AJ, Locasto ME, Potter S, Keromytis AD. SSARES: Secure Searchable Automated Remote Email Storage Proceedings - Annual Computer Security Applications Conference, Acsac. 129-138. DOI: 10.1109/ACSAC.2007.30 |
0.815 |
|
2007 |
Anagnostakis KG, Greenwald MB, Ioannidis S, Keromytis AD. COVERAGE: Detecting and reacting to worm epidemics using cooperation and validation International Journal of Information Security. 6: 361-378. DOI: 10.1007/S10207-007-0032-Z |
0.602 |
|
2007 |
Cook DL, Yung M, Keromytis AD. The security of elastic block ciphers against key-recovery attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 89-103. |
0.59 |
|
2007 |
Sidiroglou S, Keromytis AD. Composite Hybrid Techniques For Defending Against Targeted Attacks Advances in Information Security. 27: 213-229. |
0.695 |
|
2007 |
Li WJ, Stolfo S, Stavrou A, Androulaki E, Keromytis AD. A study of malcode-bearing documents Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4579: 231-250. |
0.323 |
|
2006 |
Keromytis AD, Wright JL, De Raadt T, Burnside M. Cryptography as an operating system service: A case study Acm Transactions On Computer Systems. 24: 1-38. DOI: 10.1145/1124153.1124154 |
0.428 |
|
2006 |
Sidiroglou S, Keromytis AD. Execution transactions for defending against software failures: Use and evaluation International Journal of Information Security. 5: 77-91. DOI: 10.1007/S10207-006-0083-6 |
0.791 |
|
2006 |
Locasto ME, Wang K, Keromytis AD, Stolfo SJ. FLIPS: Hybrid adaptive intrusion prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 82-101. DOI: 10.1007/11663812_5 |
0.72 |
|
2006 |
Benny W, Locasto ME, Keromytis AD. PalProtect: A collaborative security approach to comment spam Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 170-175. |
0.719 |
|
2006 |
Cook DL, Keromytis AD. CryptoGraphics: Exploiting graphics cards for security Advances in Information Security. 20: 1-136. |
0.582 |
|
2006 |
Locasto ME, Sidiroglou S, Keromytis AD. Speculative virtual verification: Policy-constrained speculative execution Proceedings New Security Paradigms Workshop. 2006: 119-124. |
0.808 |
|
2006 |
Anagnostakis K, Ioannidis S, Keromytis AD, Greenwald MB. Robust reactions to potential day-zero worms through cooperation and validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 427-442. |
0.56 |
|
2005 |
Burnside M, Keromytis AD. The case for crypto protocol awareness inside the OS kernel Acm Sigarch Computer Architecture News. 33: 58-64. DOI: 10.1145/1055626.1055635 |
0.467 |
|
2005 |
Sidiroglou S, Locasto ME, Keromytis AD. Hardware support for self-healing software services Acm Sigarch Computer Architecture News. 33: 42-47. DOI: 10.1145/1055626.1055633 |
0.718 |
|
2005 |
Sidiroglou S, Keromytis AD. Countering network worms through automatic patch generation Ieee Security and Privacy. 3: 41-49. DOI: 10.1109/MSP.2005.144 |
0.739 |
|
2005 |
Kamra A, Feng H, Misra V, Keromytis AD. The effect of DNS delays on worm propagation in an IPv6 Internet Proceedings - Ieee Infocom. 4: 2405-2414. DOI: 10.1109/INFCOM.2005.1498526 |
0.31 |
|
2005 |
Locasto ME, Parekh JJ, Keromytis AD, Stolfo SJ. Towards collaborative security and P2P intrusion detection Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 333-339. DOI: 10.1109/IAW.2005.1495971 |
0.693 |
|
2005 |
Foley S, Singer A, Locasto ME, Sidiroglou S, Keromytis AD, McDermott J, Thorpe J, Van Oorschot P, Somayaji A, Ford R, Bush M, Boulatov A. Highlights from the 2005 new security paradigms workshop Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 393-394. DOI: 10.1109/CSAC.2005.29 |
0.784 |
|
2005 |
Kc GS, Keromytis AD. e-NeXSh: Achieving an effectively non-executable stack and heap via system-call policing Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 286-300. DOI: 10.1109/CSAC.2005.22 |
0.302 |
|
2005 |
Stavrou A, Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: An overlay-based system for protecting web servers from denial of service attacks Computer Networks. 48: 781-807. DOI: 10.1016/J.Comnet.2005.01.005 |
0.666 |
|
2005 |
Chou ST, Stavrou A, Ioannidis J, Keromytis AD. gore: Routing-assisted defense against DDoS attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 179-193. |
0.388 |
|
2005 |
Sidiroglou S, Giovanidis G, Keromytis AD. A dynamic mechanism for recovering from buffer overflow attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 1-15. |
0.777 |
|
2005 |
Cook DL, Baratto R, Keromytis AD. Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 363-375. |
0.649 |
|
2005 |
Cook DL, Keromytis AD. Conversion and proxy functions for symmetric key ciphers International Conference On Information Technology: Coding and Computing, Itcc. 1: 662-667. |
0.58 |
|
2005 |
Sidiroglou S, Ioannidis J, Keromytis AD, Stolfo SJ. An email worm vaccine architecture Lecture Notes in Computer Science. 3439: 97-108. |
0.685 |
|
2005 |
Cook DL, Ioannidis J, Keromytis AD, Luck J. CryptoGraphics: Secret key cryptography using graphics cards Lecture Notes in Computer Science. 3376: 334-350. |
0.581 |
|
2004 |
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Just fast keying: Key agreement in a hostile internet Acm Transactions On Information and System Security. 7: 242-273. DOI: 10.1145/996943.996946 |
0.451 |
|
2004 |
Keromytis AD. "Patch on demand" Saves even more time? Computer. 37: 94-96. DOI: 10.1109/Mc.2004.71 |
0.399 |
|
2004 |
Keromytis AD, Misra V, Rubenstein D. SOS: An architecture for mitigating DDoS attacks Ieee Journal On Selected Areas in Communications. 22: 176-188. DOI: 10.1109/Jsac.2003.818807 |
0.49 |
|
2004 |
Locasto ME, Keromytis AD. CamouflageFS: Increasing the effective key length in cryptographic filesystems on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 1-15. |
0.724 |
|
2004 |
Stavrou A, Ioannidis J, Keromytis AD, Misra V, Rubenstein D. A pay-per-use DoS protection mechanism for the web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 120-134. |
0.359 |
|
2003 |
Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Smith JM. Design and implementation of virtual private services Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 269-274. DOI: 10.1109/ENABL.2003.1231419 |
0.697 |
|
2003 |
Sidiroglou S, Keromytis AD. A network worm vaccine architecture Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 220-225. DOI: 10.1109/ENABL.2003.1231411 |
0.758 |
|
2003 |
Levine A, Prevelakis V, Ioannidis J, Ioannidis S, Keromytis AD. WebDAVA: An administrator-free approach to Web file-sharing Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 59-64. DOI: 10.1109/ENABL.2003.1231383 |
0.616 |
|
2003 |
Keromytis AD, Ioannidis S, Greenwald MB, Smith JM. The STRONGMAN architecture Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 178-188. DOI: 10.1109/DISCEX.2003.1194883 |
0.634 |
|
2003 |
Prevelakis V, Keromytis AD. Drop‐in security for distributed and portable computing elements Internet Research. 13: 107-115. DOI: 10.1108/10662240310469763 |
0.494 |
|
2003 |
Hicks M, Keromytis AD, Smith JM. A secure PLAN Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 33: 413-426. DOI: 10.1007/978-3-540-48507-0_28 |
0.633 |
|
2003 |
Blaze M, Ioannidis J, Ioannidis S, Keromytis AD, Nikander P, Prevelakis V. TAPI: Transactions for accessing public infrastructure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2775: 90-100. DOI: 10.1007/978-3-540-39867-7_8 |
0.625 |
|
2003 |
Anagnostakis KG, Greenwald MB, Ioannidis S, Keromytis AD, Li D. A cooperative immunization system for an untrusting internet Ieee International Conference On Networks, Icon. 403-408. |
0.563 |
|
2003 |
Burnside M, Keromytis AD. Accelerating application-level security protocols Ieee International Conference On Networks, Icon. 313-318. |
0.325 |
|
2003 |
Loannidis J, Loannidis S, Keromytis AD, Prevelakis V. Fileteller: Paying and getting paid for file storage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2357: 282-299. |
0.359 |
|
2003 |
Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: Protecting web servers from DDoS attacks Ieee International Conference On Networks, Icon. 461-466. |
0.637 |
|
2002 |
Keromytis AD, Misra V, Rubenstein D. SOS: Secure overlay services Computer Communication Review. 32: 61-72. DOI: 10.1145/964725.633032 |
0.382 |
|
2002 |
Keromytis AD, Misra V, Rubenstein D. Using overlays to improve network security Proceedings of Spie - the International Society For Optical Engineering. 4868: 245-254. DOI: 10.1117/12.475275 |
0.344 |
|
2002 |
Ioannidis S, Anagnostakis KG, Ioannidis J, Keromytis AD. XPF: Packet filtering for low-cost network monitoring Ieee International Conference On High Performance Switching and Routing, Hpsr. 116-120. DOI: 10.1109/HPSR.2002.1024219 |
0.584 |
|
2002 |
Hicks M, Keromytis AD, Smith JM. A secure PLAN (extended version) Proceedings - Darpa Active Networks Conference and Exposition, Dance 2002. 224-237. DOI: 10.1109/DANCE.2002.1003496 |
0.595 |
|
2002 |
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the Acm Conference On Computer and Communications Security. 48-58. DOI: 10.1007/3-540-45807-7_5 |
0.333 |
|
2002 |
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the Acm Conference On Computer and Communications Security. 48-58. |
0.333 |
|
2001 |
Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM. The price of safety in an active network Journal of Communications and Networks. 3: 4-18. DOI: 10.1109/Jcn.2001.6596875 |
0.615 |
|
2000 |
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM. Secure quality of service handling: SQoSH Ieee Communications Magazine. 38: 106-112. DOI: 10.1109/35.833566 |
0.632 |
|
2000 |
Anagnostakis KG, Hicks MW, Ioannidis S, Keromytis AD, Smith JM. Scalable resource control in active networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1942: 343-357. DOI: 10.1007/3-540-40057-5_25 |
0.679 |
|
2000 |
Ioannidis S, Keromytis AD, Bellovin SM, Smith JM. Implementing a distributed firewall Proceedings of the Acm Conference On Computer and Communications Security. 190-199. |
0.611 |
|
1998 |
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. A secure active network environment architecture: Realization in SwitchWare Ieee Network. 12: 37-45. DOI: 10.1109/65.690960 |
0.595 |
|
1998 |
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM. The switchware active network architecture Ieee Network. 12: 29-36. DOI: 10.1109/65.690959 |
0.605 |
|
1998 |
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. Safety and security of programmable network infrastructures Ieee Communications Magazine. 36: 84-92. DOI: 10.1109/35.722141 |
0.644 |
|
Show low-probability matches. |