Panayiotis Mavrommatis
Panayiotis Mavrommatis
Verified email at - Homepage
Cited by
Cited by
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
The Ghost in the Browser: Analysis of Web-based Malware.
N Provos, D McNamee, P Mavrommatis, K Wang, N Modadugu
HotBots 7, 4-4, 2007
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Intrusive software management
N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ...
US Patent App. 12/041,309, 2009
Identifying known and unknown peer-to-peer traffic
F Constantinou, P Mavrommatis
Fifth IEEE International Symposium on Network Computing and Applications …, 2006
Cybercrime 2.0: when the cloud turns dark
N Provos, MA Rajab, P Mavrommatis
Communications of the ACM 52 (4), 42-47, 2009
Ghost turns zombie: Exploring the life cycle of web-based malware
M Polychronakis, P Mavrommatis, N Provos
CAMP: Content-agnostic malware protection
MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos
The nocebo effect on the web: an analysis of fake anti-virus distribution
MA Rajab, L Ballard, P Marvrommatis, N Provos, X Zhao
Detecting an intrusive landing page
N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ...
US Patent 8,019,700, 2011
All your iframes point to us
NPP Mavrommatis, M Monrose
USENIX security symposium, 1-16, 2008
Trends in circumventing web-malware detection
M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ...
Google, Google Technical Report, 2011
Trends and lessons from three years fighting malicious extensions
N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 579-593, 2015
Protecting users from undesirable content
MG Morrissey, R Cannings, JB Gruver, A Ghosh, JB Larimer, AD Stadler, ...
US Patent App. 13/633,093, 2014
Investigating commercial pay-per-install and the distribution of unwanted software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 721-739, 2016
Email-based worm propagation properties
P Gopalan, K Jamieson, P Mavrommatis
US Patent App. 11/387,087, 2007
Automated implementation of complex distributed algorithms specified in the IOA language
C Georgiou, N Lynch, P Mavrommatis, JA Tauber
International Journal on Software Tools for Technology Transfer 11 (2), 153-171, 2009
Exploit-based worm propagation mitigation
P Gopalan, K Jamieson, P Mavrommatis
US Patent 8,006,306, 2011
Intrusive software management
Y Zhou, N Provos, CW Bavor, EL Davis Jr, M Palatucci, KP Nigam, ...
US Patent 8,515,896, 2013
Detecting pirated applications
A Bhatia, MG Kang, MI Sharif, N Provos, P Mavrommatis, S Bandhakavi
US Patent 8,875,303, 2014
The system can't perform the operation now. Try again later.
Articles 1–20