Year |
Citation |
Score |
2020 |
Yuan Y, Wang S, Olson DL, Lambert JH, Wang F, Rong C, Stavrou A, Zhang J, Tang Q, Baldimtsi F, Yang LT, Wu D. Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation Ieee Transactions On Systems, Man, and Cybernetics. 50: 2-8. DOI: 10.1109/Tsmc.2019.2959929 |
0.372 |
|
2020 |
Gao X, Xiao J, Wang H, Stavrou A. Understanding the Security Implication of Aborting Live Migration Ieee Transactions On Cloud Computing. 1-1. DOI: 10.1109/Tcc.2020.2982900 |
0.364 |
|
2020 |
Osterweil E, Stavrou A, Zhang L. 21 Years of Distributed Denial-of-Service: A Call to Action Ieee Computer. 53: 94-99. DOI: 10.1109/Mc.2020.2993330 |
0.355 |
|
2020 |
Osterweil E, Stavrou A, Zhang L. 21 Years of Distributed Denial-of Service: Current State of Affairs Ieee Computer. 53: 88-92. DOI: 10.1109/Mc.2020.2983711 |
0.376 |
|
2018 |
Zhang F, Leach K, Stavrou A, Wang H. Towards Transparent Debugging Ieee Transactions On Dependable and Secure Computing. 15: 321-335. DOI: 10.1109/Tdsc.2016.2545671 |
0.336 |
|
2017 |
AUFFRET J, SNOWDON JL, STAVROU A, KATZ JS, KELLEY D, RAHMAN RS, STEIN F, SOKOL L, ALLOR P, WARWEG P. Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems Journal of Interconnection Networks. 17: 1740001. DOI: 10.1142/S0219265917400011 |
0.346 |
|
2017 |
Stavrou A, Voas J. Verified Time Ieee Computer. 50: 78-82. DOI: 10.1109/Mc.2017.63 |
0.377 |
|
2017 |
Kolias C, Kambourakis G, Stavrou A, Voas J. DDoS in the IoT: Mirai and Other Botnets Ieee Computer. 50: 80-84. DOI: 10.1109/Mc.2017.201 |
0.427 |
|
2017 |
Elsabagh M, Barbará D, Fleck D, Stavrou A. On early detection of application-level resource exhaustion and starvation Journal of Systems and Software. 137: 430-447. DOI: 10.1016/J.Jss.2017.02.043 |
0.417 |
|
2016 |
Stavrou A, Fleck D, Kolias C. On the Move: Evading Distributed Denial-of-Service Attacks Computer. 49: 104-107. DOI: 10.1109/Mc.2016.85 |
0.436 |
|
2016 |
Johnson R, Elsabagh M, Stavrou A, Sritapan V. Targeted DoS on android: How to disable android in 10 seconds or less 2015 10th International Conference On Malicious and Unwanted Software, Malware 2015. 136-143. DOI: 10.1109/MALWARE.2015.7413694 |
0.324 |
|
2016 |
Kolias C, Kambourakis G, Stavrou A, Gritzalis S. Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset Ieee Communications Surveys and Tutorials. 18: 184-208. DOI: 10.1109/Comst.2015.2402161 |
0.47 |
|
2015 |
Zhang F, Leach K, Wang H, Stavrou A. TrustLogin: Securing password-login on commodity operating systems Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 333-344. DOI: 10.1145/2714576.2714614 |
0.376 |
|
2015 |
Kolias C, Stavrou A, Voas J. Securely making 'things' right Computer. 48: 84-88. DOI: 10.1109/Mc.2015.258 |
0.366 |
|
2014 |
Wang H, Jia Q, Fleck D, Powell W, Li F, Stavrou A. A moving target DDoS defense mechanism Computer Communications. 46: 10-21. DOI: 10.1016/J.Comcom.2014.03.009 |
0.586 |
|
2014 |
Xu H, Liu D, Koehl A, Wang H, Stavrou A. Click fraud detection on the advertiser side Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8713: 419-438. DOI: 10.1007/978-3-319-11212-1_24 |
0.304 |
|
2014 |
Zhang F, Wang H, Leach K, Stavrou A. A framework to secure peripherals at runtime Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8712: 219-238. DOI: 10.1007/978-3-319-11203-9_13 |
0.329 |
|
2014 |
Cooley B, Wang H, Stavrou A. Activity spoofing and its defense in android smartphones Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8479: 494-512. DOI: 10.1007/978-3-319-07536-5_29 |
0.373 |
|
2013 |
Ardagna CA, Jajodia S, Samarati P, Stavrou A. Providing users' anonymity in mobile hybrid networks Acm Transactions On Internet Technology. 12. DOI: 10.1145/2461321.2461322 |
0.438 |
|
2013 |
Hiremagalore S, Liang C, Stavrou A, Rangwala H. Improving network response times using social information Social Network Analysis and Mining. 3: 209-220. DOI: 10.1007/S13278-012-0065-9 |
0.339 |
|
2013 |
Jia Q, Sun K, Stavrou A. Capability-based defenses against dos attacks in multi-path manet communications Wireless Personal Communications. 73: 127-148. DOI: 10.1007/S11277-013-1297-3 |
0.579 |
|
2012 |
Le M, Stavrou A, Kang BB. DoubleGuard: Detecting intrusions in multitier web applications Ieee Transactions On Dependable and Secure Computing. 9: 512-525. DOI: 10.1109/Tdsc.2011.59 |
0.443 |
|
2012 |
Wang Z, Murmuria R, Stavrou A. Implementing and optimizing an encryption filesystem on Android Proceedings - 2012 Ieee 13th International Conference On Mobile Data Management, Mdm 2012. 52-62. DOI: 10.1109/MDM.2012.31 |
0.307 |
|
2012 |
Stavrou A, Voas J, Karygiannis T, Quirolgico S. Building Security into Off-the-Shelf Smartphones Ieee Computer. 45: 82-84. DOI: 10.1109/Mc.2012.44 |
0.365 |
|
2011 |
Locasto ME, Ghosh AK, Jajodia S, Stavrou A. Virtual extension the ephemeral legion: Producing an expert cyber-security work force from thin air Communications of the Acm. 54: 129-131. DOI: 10.1145/1866739.1866764 |
0.34 |
|
2011 |
Jia Q, Sun K, Stavrou A. CapMan: Capability-based defense against multi-path denial of service (DoS) attacks in MANET Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2011.6005808 |
0.387 |
|
2011 |
Jee K, Sidiroglou-Douskos S, Stavrou A, Keromytis A. An adversarial evaluation of network signaling and control mechanisms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 252-265. DOI: 10.1007/978-3-642-24209-0_17 |
0.312 |
|
2011 |
Boggs N, Hiremagalore S, Stavrou A, Stolfo SJ. Cross-domain collaborative anomaly detection: So far yet so close Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 142-160. DOI: 10.1007/978-3-642-23644-0_8 |
0.331 |
|
2010 |
Wang J, Stavrou A, Ghosh A. HyperCheck: A hardware-assisted integrity monitor Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 158-177. DOI: 10.1109/Tdsc.2013.53 |
0.402 |
|
2010 |
Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5 |
0.31 |
|
2010 |
Ardagna CA, Jajodia S, Samarati P, Stavrou A. Providing mobile users' anonymity in hybrid networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 540-557. DOI: 10.1007/978-3-642-15497-3_33 |
0.328 |
|
2009 |
Liu A, Yuan Y, Wijesekera D, Stavrou A. SQLProb: A proxy-based architecture towards preventing SQL injection attacks Proceedings of the Acm Symposium On Applied Computing. 2054-2061. DOI: 10.1145/1529282.1529737 |
0.325 |
|
2009 |
Alexander S, Cheng YH, Coan B, Ghetie A, Kaul V, Siegell B, Bellovin S, Maxemchuk NF, Schulzrinne H, Schwab S, Stavrou A, Smith JM. The dynamic community of interest and its realization in ZODIAC Ieee Communications Magazine. 47: 40-47. DOI: 10.1109/Mcom.2009.5273807 |
0.466 |
|
2009 |
Alicherry M, Keromytis AD, Stavrou A. Evaluating a collaborative defense architecture for MANETs 2009 Ieee International Conference On Internet Multimedia Services Architecture and Applications, Imsaa 2009. DOI: 10.1109/IMSAA.2009.5439498 |
0.413 |
|
2009 |
Alicherry M, Keromytis AD, Stavrou A. Deny-by-default distributed security policy enforcement in mobile ad hoc networks Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 41-50. DOI: 10.1007/978-3-642-05284-2_3 |
0.369 |
|
2009 |
Ardagna CA, Jajodia S, Samarati P, Stavrou A. Privacy preservation over untrusted mobile networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5599: 84-105. DOI: 10.1007/978-3-642-03511-1_4 |
0.461 |
|
2008 |
Locasto ME, Stavrou A. The hidden difficulties of watching and rebuilding networks Ieee Security and Privacy. 6: 79-82. DOI: 10.1109/MSP.2008.48 |
0.327 |
|
2008 |
Stavrou A, Ghosh AK. A security architecture for information assurance and availability in MANETs Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2008.4753173 |
0.405 |
|
2008 |
Stavrou A, Locasto ME, Keromytis AD. Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54. DOI: 10.1007/978-3-540-68914-0_3 |
0.376 |
|
2008 |
Ardagna CA, Stavrou A, Jajodia S, Samarati P, Martin R. A multi-path approach for k-anonymity in mobile hybrid networks Ceur Workshop Proceedings. 397: 82-101. |
0.368 |
|
2007 |
Sidiroglou S, Stavrou A, Keromytis AD. Mediated overlay services (MOSES): Network security as a composable service 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567338 |
0.305 |
|
2007 |
Stavrou A, Turner D, Kcromytis AD, Prevelakis V. Bridging the network reservation gap using overlays Proceedings of the 2007 2nd International Conference On Communication System Software and Middleware and Workshops, Comsware 2007. DOI: 10.1109/COMSWA.2007.382490 |
0.331 |
|
2007 |
Li WJ, Stolfo S, Stavrou A, Androulaki E, Keromytis AD. A study of malcode-bearing documents Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4579: 231-250. |
0.31 |
|
2006 |
Stavrou A, Locasto ME, Keroniytis AD. WSBcrypt: Encryption as a stylesheet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 349-364. DOI: 10.1007/11767480_24 |
0.302 |
|
2005 |
Stavrou A, Keromytis AD. Countering DoS attacks with stateless multipath overlays Proceedings of the Acm Conference On Computer and Communications Security. 249-259. DOI: 10.1145/1102120.1102153 |
0.301 |
|
2005 |
Stavrou A, Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: An overlay-based system for protecting web servers from denial of service attacks Computer Networks. 48: 781-807. DOI: 10.1016/J.Comnet.2005.01.005 |
0.448 |
|
2005 |
Chou ST, Stavrou A, Ioannidis J, Keromytis AD. gore: Routing-assisted defense against DDoS attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 179-193. |
0.398 |
|
2004 |
Stavrou A, Rubenstein D, Sahu S. A lightweight, robust P2P system to handle flash crowds Ieee Journal On Selected Areas in Communications. 22: 6-17. DOI: 10.1109/Jsac.2003.818778 |
0.361 |
|
2004 |
Stavrou A, Ioannidis J, Keromytis AD, Misra V, Rubenstein D. A pay-per-use DoS protection mechanism for the web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 120-134. |
0.334 |
|
Show low-probability matches. |