☰

Angelos Stavrou - Publications

Affiliations: 
George Mason University, Washington, DC 
Area:
Computer Science

49 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Yuan Y, Wang S, Olson DL, Lambert JH, Wang F, Rong C, Stavrou A, Zhang J, Tang Q, Baldimtsi F, Yang LT, Wu D. Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation Ieee Transactions On Systems, Man, and Cybernetics. 50: 2-8. DOI: 10.1109/Tsmc.2019.2959929  0.372
2020 Gao X, Xiao J, Wang H, Stavrou A. Understanding the Security Implication of Aborting Live Migration Ieee Transactions On Cloud Computing. 1-1. DOI: 10.1109/Tcc.2020.2982900  0.364
2020 Osterweil E, Stavrou A, Zhang L. 21 Years of Distributed Denial-of-Service: A Call to Action Ieee Computer. 53: 94-99. DOI: 10.1109/Mc.2020.2993330  0.355
2020 Osterweil E, Stavrou A, Zhang L. 21 Years of Distributed Denial-of Service: Current State of Affairs Ieee Computer. 53: 88-92. DOI: 10.1109/Mc.2020.2983711  0.376
2018 Zhang F, Leach K, Stavrou A, Wang H. Towards Transparent Debugging Ieee Transactions On Dependable and Secure Computing. 15: 321-335. DOI: 10.1109/Tdsc.2016.2545671  0.336
2017 AUFFRET J, SNOWDON JL, STAVROU A, KATZ JS, KELLEY D, RAHMAN RS, STEIN F, SOKOL L, ALLOR P, WARWEG P. Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems Journal of Interconnection Networks. 17: 1740001. DOI: 10.1142/S0219265917400011  0.346
2017 Stavrou A, Voas J. Verified Time Ieee Computer. 50: 78-82. DOI: 10.1109/Mc.2017.63  0.377
2017 Kolias C, Kambourakis G, Stavrou A, Voas J. DDoS in the IoT: Mirai and Other Botnets Ieee Computer. 50: 80-84. DOI: 10.1109/Mc.2017.201  0.427
2017 Elsabagh M, Barbará D, Fleck D, Stavrou A. On early detection of application-level resource exhaustion and starvation Journal of Systems and Software. 137: 430-447. DOI: 10.1016/J.Jss.2017.02.043  0.417
2016 Stavrou A, Fleck D, Kolias C. On the Move: Evading Distributed Denial-of-Service Attacks Computer. 49: 104-107. DOI: 10.1109/Mc.2016.85  0.436
2016 Johnson R, Elsabagh M, Stavrou A, Sritapan V. Targeted DoS on android: How to disable android in 10 seconds or less 2015 10th International Conference On Malicious and Unwanted Software, Malware 2015. 136-143. DOI: 10.1109/MALWARE.2015.7413694  0.324
2016 Kolias C, Kambourakis G, Stavrou A, Gritzalis S. Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset Ieee Communications Surveys and Tutorials. 18: 184-208. DOI: 10.1109/Comst.2015.2402161  0.47
2015 Zhang F, Leach K, Wang H, Stavrou A. TrustLogin: Securing password-login on commodity operating systems Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 333-344. DOI: 10.1145/2714576.2714614  0.376
2015 Kolias C, Stavrou A, Voas J. Securely making 'things' right Computer. 48: 84-88. DOI: 10.1109/Mc.2015.258  0.366
2014 Wang H, Jia Q, Fleck D, Powell W, Li F, Stavrou A. A moving target DDoS defense mechanism Computer Communications. 46: 10-21. DOI: 10.1016/J.Comcom.2014.03.009  0.586
2014 Xu H, Liu D, Koehl A, Wang H, Stavrou A. Click fraud detection on the advertiser side Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8713: 419-438. DOI: 10.1007/978-3-319-11212-1_24  0.304
2014 Zhang F, Wang H, Leach K, Stavrou A. A framework to secure peripherals at runtime Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8712: 219-238. DOI: 10.1007/978-3-319-11203-9_13  0.329
2014 Cooley B, Wang H, Stavrou A. Activity spoofing and its defense in android smartphones Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8479: 494-512. DOI: 10.1007/978-3-319-07536-5_29  0.373
2013 Ardagna CA, Jajodia S, Samarati P, Stavrou A. Providing users' anonymity in mobile hybrid networks Acm Transactions On Internet Technology. 12. DOI: 10.1145/2461321.2461322  0.438
2013 Hiremagalore S, Liang C, Stavrou A, Rangwala H. Improving network response times using social information Social Network Analysis and Mining. 3: 209-220. DOI: 10.1007/S13278-012-0065-9  0.339
2013 Jia Q, Sun K, Stavrou A. Capability-based defenses against dos attacks in multi-path manet communications Wireless Personal Communications. 73: 127-148. DOI: 10.1007/S11277-013-1297-3  0.579
2012 Le M, Stavrou A, Kang BB. DoubleGuard: Detecting intrusions in multitier web applications Ieee Transactions On Dependable and Secure Computing. 9: 512-525. DOI: 10.1109/Tdsc.2011.59  0.443
2012 Wang Z, Murmuria R, Stavrou A. Implementing and optimizing an encryption filesystem on Android Proceedings - 2012 Ieee 13th International Conference On Mobile Data Management, Mdm 2012. 52-62. DOI: 10.1109/MDM.2012.31  0.307
2012 Stavrou A, Voas J, Karygiannis T, Quirolgico S. Building Security into Off-the-Shelf Smartphones Ieee Computer. 45: 82-84. DOI: 10.1109/Mc.2012.44  0.365
2011 Locasto ME, Ghosh AK, Jajodia S, Stavrou A. Virtual extension the ephemeral legion: Producing an expert cyber-security work force from thin air Communications of the Acm. 54: 129-131. DOI: 10.1145/1866739.1866764  0.34
2011 Jia Q, Sun K, Stavrou A. CapMan: Capability-based defense against multi-path denial of service (DoS) attacks in MANET Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2011.6005808  0.387
2011 Jee K, Sidiroglou-Douskos S, Stavrou A, Keromytis A. An adversarial evaluation of network signaling and control mechanisms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 252-265. DOI: 10.1007/978-3-642-24209-0_17  0.312
2011 Boggs N, Hiremagalore S, Stavrou A, Stolfo SJ. Cross-domain collaborative anomaly detection: So far yet so close Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 142-160. DOI: 10.1007/978-3-642-23644-0_8  0.331
2010 Wang J, Stavrou A, Ghosh A. HyperCheck: A hardware-assisted integrity monitor Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 158-177. DOI: 10.1109/Tdsc.2013.53  0.402
2010 Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5  0.31
2010 Ardagna CA, Jajodia S, Samarati P, Stavrou A. Providing mobile users' anonymity in hybrid networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 540-557. DOI: 10.1007/978-3-642-15497-3_33  0.328
2009 Liu A, Yuan Y, Wijesekera D, Stavrou A. SQLProb: A proxy-based architecture towards preventing SQL injection attacks Proceedings of the Acm Symposium On Applied Computing. 2054-2061. DOI: 10.1145/1529282.1529737  0.325
2009 Alexander S, Cheng YH, Coan B, Ghetie A, Kaul V, Siegell B, Bellovin S, Maxemchuk NF, Schulzrinne H, Schwab S, Stavrou A, Smith JM. The dynamic community of interest and its realization in ZODIAC Ieee Communications Magazine. 47: 40-47. DOI: 10.1109/Mcom.2009.5273807  0.466
2009 Alicherry M, Keromytis AD, Stavrou A. Evaluating a collaborative defense architecture for MANETs 2009 Ieee International Conference On Internet Multimedia Services Architecture and Applications, Imsaa 2009. DOI: 10.1109/IMSAA.2009.5439498  0.413
2009 Alicherry M, Keromytis AD, Stavrou A. Deny-by-default distributed security policy enforcement in mobile ad hoc networks Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 41-50. DOI: 10.1007/978-3-642-05284-2_3  0.369
2009 Ardagna CA, Jajodia S, Samarati P, Stavrou A. Privacy preservation over untrusted mobile networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5599: 84-105. DOI: 10.1007/978-3-642-03511-1_4  0.461
2008 Locasto ME, Stavrou A. The hidden difficulties of watching and rebuilding networks Ieee Security and Privacy. 6: 79-82. DOI: 10.1109/MSP.2008.48  0.327
2008 Stavrou A, Ghosh AK. A security architecture for information assurance and availability in MANETs Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2008.4753173  0.405
2008 Stavrou A, Locasto ME, Keromytis AD. Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54. DOI: 10.1007/978-3-540-68914-0_3  0.376
2008 Ardagna CA, Stavrou A, Jajodia S, Samarati P, Martin R. A multi-path approach for k-anonymity in mobile hybrid networks Ceur Workshop Proceedings. 397: 82-101.  0.368
2007 Sidiroglou S, Stavrou A, Keromytis AD. Mediated overlay services (MOSES): Network security as a composable service 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567338  0.305
2007 Stavrou A, Turner D, Kcromytis AD, Prevelakis V. Bridging the network reservation gap using overlays Proceedings of the 2007 2nd International Conference On Communication System Software and Middleware and Workshops, Comsware 2007. DOI: 10.1109/COMSWA.2007.382490  0.331
2007 Li WJ, Stolfo S, Stavrou A, Androulaki E, Keromytis AD. A study of malcode-bearing documents Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4579: 231-250.  0.31
2006 Stavrou A, Locasto ME, Keroniytis AD. WSBcrypt: Encryption as a stylesheet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 349-364. DOI: 10.1007/11767480_24  0.302
2005 Stavrou A, Keromytis AD. Countering DoS attacks with stateless multipath overlays Proceedings of the Acm Conference On Computer and Communications Security. 249-259. DOI: 10.1145/1102120.1102153  0.301
2005 Stavrou A, Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: An overlay-based system for protecting web servers from denial of service attacks Computer Networks. 48: 781-807. DOI: 10.1016/J.Comnet.2005.01.005  0.448
2005 Chou ST, Stavrou A, Ioannidis J, Keromytis AD. gore: Routing-assisted defense against DDoS attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 179-193.  0.398
2004 Stavrou A, Rubenstein D, Sahu S. A lightweight, robust P2P system to handle flash crowds Ieee Journal On Selected Areas in Communications. 22: 6-17. DOI: 10.1109/Jsac.2003.818778  0.361
2004 Stavrou A, Ioannidis J, Keromytis AD, Misra V, Rubenstein D. A pay-per-use DoS protection mechanism for the web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 120-134.  0.334
Show low-probability matches.