Year |
Citation |
Score |
2023 |
Shevtsov A, Oikonomidou M, Antonakaki D, Pratikakis P, Ioannidis S. What Tweets and YouTube comments have in common? Sentiment and graph analysis on data related to US elections 2020. Plos One. 18: e0270542. PMID 36719868 DOI: 10.1371/journal.pone.0270542 |
0.749 |
|
2021 |
Papadogiannaki E, Ioannidis S. Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware. Sensors (Basel, Switzerland). 21. PMID 33562000 DOI: 10.3390/s21041140 |
0.315 |
|
2019 |
Liaskos C, Tsioliaridou A, Nie S, Pitsillides A, Ioannidis S, Akyildiz IF. On the Network-Layer Modeling and Configuration of Programmable Wireless Environments Ieee/Acm Transactions On Networking. 27: 1696-1713. DOI: 10.1109/Tnet.2019.2925658 |
0.378 |
|
2019 |
Tasolamprou AC, Pitilakis A, Abadal S, Tsilipakos O, Timoneda X, Taghvaee H, Sajjad Mirmoosa M, Liu F, Liaskos C, Tsioliaridou A, Ioannidis S, Kantartzis NV, Manessis D, Georgiou J, Cabellos-Aparicio A, et al. Exploration of Intercell Wireless Millimeter-Wave Communication in the Landscape of Intelligent Metasurfaces Ieee Access. 7: 122931-122948. DOI: 10.1109/Access.2019.2933355 |
0.3 |
|
2018 |
Liaskos C, Ioannidis S. Network Topology Effects on the Detectability of Crossfire Attacks Ieee Transactions On Information Forensics and Security. 13: 1682-1695. DOI: 10.1109/Tifs.2018.2799425 |
0.412 |
|
2018 |
Liaskos C, Nie S, Tsioliaridou A, Pitsillides A, Ioannidis S, Akyildiz I. A New Wireless Communication Paradigm through Software-Controlled Metasurfaces Ieee Communications Magazine. 56: 162-169. DOI: 10.1109/Mcom.2018.1700659 |
0.313 |
|
2018 |
Antonakaki D, Ioannidis S, Fragopoulou P. Utilizing the average node degree to assess the temporal growth rate of Twitter Social Network Analysis and Mining. 8: 12. DOI: 10.1007/S13278-018-0490-5 |
0.734 |
|
2017 |
Antonakaki D, Spiliotopoulos D, V Samaras C, Pratikakis P, Ioannidis S, Fragopoulou P. Social media analysis during political turbulence. Plos One. 12: e0186836. PMID 29088263 DOI: 10.1371/Journal.Pone.0186836 |
0.738 |
|
2017 |
Vasiliadis G, Koromilas L, Polychronakis M, Ioannidis S. Design and Implementation of a Stateful Network Packet Processing Framework for GPUs Ieee Acm Transactions On Networking. 25: 610-623. DOI: 10.1109/Tnet.2016.2597163 |
0.397 |
|
2017 |
Abadal S, Liaskos C, Tsioliaridou A, Ioannidis S, Pitsillides A, Sole-Pareta J, Alarcon E, Cabellos-Aparicio A. Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis Ieee Access. 5: 6225-6235. DOI: 10.1109/Access.2017.2693267 |
0.388 |
|
2017 |
Tsioliaridou A, Liaskos C, Dedu E, Ioannidis S. Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path Scheme Nano Communication Networks. 12: 63-71. DOI: 10.1016/J.Nancom.2017.01.001 |
0.305 |
|
2016 |
Antonakaki D, Polakis I, Athanasopoulos E, Ioannidis S, Fragopoulou P. Exploiting abused trending topics to identify spam campaigns in Twitter Social Network Analysis and Mining. 6: 48. DOI: 10.1007/S13278-016-0354-9 |
0.77 |
|
2015 |
Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S. Face/off: Preventing privacy leakage from photos in social networks Proceedings of the Acm Conference On Computer and Communications Security. 2015: 781-792. DOI: 10.1145/2810103.2813603 |
0.365 |
|
2015 |
Petsas T, Tsirantonakis G, Athanasopoulos E, Ioannidis S. Two-factor authentication: Is the world ready? quantifying 2FA adoption Proceedings of the 8th European Workshop On System Security, Eurosec 2015. DOI: 10.1145/2751323.2751327 |
0.315 |
|
2015 |
Liaskos C, Tsioliaridou A, Pitsillides A, Akyildiz IF, Kantartzis NV, Lalas AX, Dimitropoulos X, Ioannidis S, Kafesaki M, Soukoulis CM. Design and Development of Software Defined Metamaterials for Nanonetworks Ieee Circuits and Systems Magazine. 15: 12-25. DOI: 10.1109/Mcas.2015.2484098 |
0.364 |
|
2015 |
Tsioliaridou A, Liaskos C, Ioannidis S, Pitsillides A. Lightweight, self-tuning data dissemination for dense nanonetworks Nano Communication Networks. DOI: 10.1016/J.Nancom.2015.09.003 |
0.379 |
|
2015 |
Vasiliadis G, Polychronakis M, Ioannidis S. GPU-assisted malware International Journal of Information Security. 14: 289-297. DOI: 10.1007/S10207-014-0262-9 |
0.321 |
|
2015 |
Athanasopoulos E, Boehner M, Ioannidis S, Giuffrida C, Pidan D, Prevelakis V, Sourdis I, Strydis C, Thomson J. Secure hardware-software architectures for robust computing systems Communications in Computer and Information Science. 570: 209-212. DOI: 10.1007/978-3-319-27164-4_17 |
0.351 |
|
2015 |
Antonakaki D, Polakis I, Athanasopoulos E, Ioannidis S, Fragopoulou P. Think Before RT: An Experimental Study of Abusing Twitter Trends Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8852: 402-413. DOI: 10.1007/978-3-319-15168-7_49 |
0.77 |
|
2014 |
Polakis I, Ilia P, Maggi F, Lancini M, Kontaxis G, Zanero S, Ioannidis S, Keromytis AD. Faces in the distorting mirror: Revisiting photo-based social authentication Proceedings of the Acm Conference On Computer and Communications Security. 501-512. DOI: 10.1145/2660267.2660317 |
0.554 |
|
2014 |
Koromilas L, Vasiliadis G, Manousakis I, Ioannidis S. Efficient software packet processing on heterogeneous and asymmetric hardware architectures Ancs 2014 - 10th 2014 Acm/Ieee Symposium On Architectures For Networking and Communications Systems. 207-218. DOI: 10.1109/Tnet.2016.2642338 |
0.368 |
|
2013 |
Andriotis P, Tzermias Z, Mparmpaki A, Ioannidis S, Oikonomou G. Multilevel visualization using enhanced social network analysis with smartphone data International Journal of Digital Crime and Forensics. 5: 34-54. DOI: 10.4018/Ijdcf.2013100103 |
0.454 |
|
2012 |
Polakis I, Lancini M, Kontaxis G, Maggi F, Ioannidis S, Keromytis AD, Zanero S. All your face are belong to us: Breaking Facebook's social authentication Acm International Conference Proceeding Series. 399-408. DOI: 10.1145/2420950.2421008 |
0.59 |
|
2012 |
Gessiou E, Volanis S, Athanasopoulos E, Markatos EP, Ioannidis S. Digging up social structures from documents on the web Globecom - Ieee Global Telecommunications Conference. 744-750. DOI: 10.1109/GLOCOM.2012.6503202 |
0.306 |
|
2012 |
Ioannidis S, Massoulié L, Chaintreau A. Distributed caching over heterogeneous mobile networks Queueing Systems. 72: 279-309. DOI: 10.1007/S11134-012-9297-7 |
0.36 |
|
2012 |
Gessiou E, Pappas V, Athanasopoulos E, Keromytis AD, Ioannidis S. Towards a universal data provenance framework using dynamic instrumentation Ifip Advances in Information and Communication Technology. 376: 103-114. DOI: 10.1007/978-3-642-30436-1_9 |
0.551 |
|
2011 |
Kontaxis G, Polakis I, Ioannidis S, Markatos EP. Detecting social network profile cloning 2011 Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2011. 295-300. DOI: 10.1109/PERCOMW.2011.5766886 |
0.382 |
|
2011 |
Zyba G, Voelker GM, Ioannidis S, Diot C. Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd Proceedings - Ieee Infocom. 1179-1187. DOI: 10.1109/INFCOM.2011.5934896 |
0.332 |
|
2010 |
Makridakis A, Athanasopoulos E, Antonatos S, Antoniades D, Ioannidis S, Markatos E. Understanding the behavior of malicious applications in social networks Ieee Network. 24: 14-19. DOI: 10.1109/Mnet.2010.5578913 |
0.456 |
|
2008 |
Miltchev S, Smith JM, Prevelakis V, Keromytis A, Ioannidis S. Decentralized access control in distributed file systems Acm Computing Surveys. 40. DOI: 10.1145/1380584.1380588 |
0.674 |
|
2008 |
Athanasopoulos E, Makridakis A, Antonatos S, Antoniades D, Ioannidis S, Anagnostakis KG, Markatos EP. Antisocial networks: Turning a social network into a botnet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5222: 146-160. DOI: 10.1007/978-3-540-85886-7_10 |
0.363 |
|
2007 |
Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Anagnostakis K, Smith JM. Virtual private services: Coordinated policy enforcement for distributed applications International Journal of Network Security. 4: 69-80. DOI: 10.6633/Ijns.200701.4(1).08 |
0.657 |
|
2007 |
Anagnostakis KG, Greenwald MB, Ioannidis S, Keromytis AD. COVERAGE: Detecting and reacting to worm epidemics using cooperation and validation International Journal of Information Security. 6: 361-378. DOI: 10.1007/S10207-007-0032-Z |
0.592 |
|
2006 |
Anagnostakis KG, Greenwald MB, Ioannidis S, Li D, Smith JM. Flexible network monitoring with FLAME Computer Networks. 50: 2548-2563. DOI: 10.1016/J.Comnet.2006.04.018 |
0.571 |
|
2006 |
Anagnostakis K, Ioannidis S, Keromytis AD, Greenwald MB. Robust reactions to potential day-zero worms through cooperation and validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 427-442. |
0.552 |
|
2003 |
Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Smith JM. Design and implementation of virtual private services Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 269-274. DOI: 10.1109/ENABL.2003.1231419 |
0.648 |
|
2003 |
Levine A, Prevelakis V, Ioannidis J, Ioannidis S, Keromytis AD. WebDAVA: An administrator-free approach to Web file-sharing Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 59-64. DOI: 10.1109/ENABL.2003.1231383 |
0.601 |
|
2003 |
Keromytis AD, Ioannidis S, Greenwald MB, Smith JM. The STRONGMAN architecture Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 178-188. DOI: 10.1109/DISCEX.2003.1194883 |
0.584 |
|
2003 |
Blaze M, Ioannidis J, Ioannidis S, Keromytis AD, Nikander P, Prevelakis V. TAPI: Transactions for accessing public infrastructure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2775: 90-100. DOI: 10.1007/978-3-540-39867-7_8 |
0.597 |
|
2003 |
Anagnostakis KG, Greenwald MB, Ioannidis S, Keromytis AD, Li D. A cooperative immunization system for an untrusting internet Ieee International Conference On Networks, Icon. 403-408. |
0.531 |
|
2002 |
Ioannidis S, Bellovin SM, Smith JM. Sub-operating systems: A new approach to application security Proceedings of the 10th Workshop On Acm Sigops European Workshop, Ew 10. 108-115. DOI: 10.1145/1133373.1133394 |
0.435 |
|
2002 |
Ioannidis S, Anagnostakis KG, Ioannidis J, Keromytis AD. XPF: Packet filtering for low-cost network monitoring Ieee International Conference On High Performance Switching and Routing, Hpsr. 116-120. DOI: 10.1109/HPSR.2002.1024219 |
0.566 |
|
2002 |
Anagnostakis KG, Greenwald M, Ioannidis S, Miltchev S. Open packet monitoring on FLAME: Safety, performance, and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2546: 120-131. DOI: 10.1007/3-540-36199-5_10 |
0.376 |
|
2002 |
Anagnostakis KG, Ioannidis S, Miltchev S, Greenwald M, Smith JM, Ioannidis J. Efficient packet monitoring for network management Ieee Symposium Record On Network Operations and Management Symposium. 423-436. |
0.541 |
|
2001 |
Anagnostakis KG, Ioannidis S, Miltchev S, Smith JM. Practical network applications on a lightweight active management environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2207: 101-115. DOI: 10.1007/3-540-45451-9_7 |
0.564 |
|
2000 |
Anagnostakis KG, Hicks MW, Ioannidis S, Keromytis AD, Smith JM. Scalable resource control in active networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1942: 343-357. DOI: 10.1007/3-540-40057-5_25 |
0.658 |
|
2000 |
Ioannidis S, Keromytis AD, Bellovin SM, Smith JM. Implementing a distributed firewall Proceedings of the Acm Conference On Computer and Communications Security. 190-199. |
0.592 |
|
1999 |
Ioannidis S, Papathanasiou AE, Magklis G, Markatos EP, Pnevmatikatos DN, Sevaslidou J. On Using Reliable Network RAM in Networks of Workstations Scalable Computing: Practice and Experience. 2. DOI: 10.12694/Scpe.V2I2.132 |
0.347 |
|
1999 |
Ioannidis S, Rencuzogullari U, Stets R, Dwarkadas S. CRAUL: Compiler and Run-Time Integration for Adaptation under Load Scientific Programming. 7: 261-273. DOI: 10.1155/1999/603478 |
0.34 |
|
1999 |
Pnevmatikatos D, Markatos EP, Magklis G, Ioannidis S. On using network RAM as a non-volatile buffer Cluster Computing. 2: 295-303. DOI: 10.1023/A:1019003514550 |
0.303 |
|
1998 |
Ioannidis S, Dwarkadas S. Compiler and run-time support for adaptive load balancing in software distributed shared memory systems ? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1511: 107-122. DOI: 10.1007/3-540-49530-4_8 |
0.402 |
|
Show low-probability matches. |