vassilis prevelakis
vassilis prevelakis
Guest Professor of Computer Security, TU Braunschweig
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Countering code-injection attacks with instruction-set randomization
GS Kc, AD Keromytis, V Prevelakis
Proceedings of the 10th ACM conference on Computer and communications …, 2003
The athens affair
V Prevelakis, D Spinellis
Ieee Spectrum 44 (7), 26-33, 2007
The athens affair
V Prevelakis, D Spinellis
Ieee Spectrum 44 (7), 26-33, 2007
Sandboxing Applications.
V Prevelakis, D Spinellis
USENIX Annual Technical Conference, FREENIX Track, 119-126, 2001
Fileteller: Paying and getting paid for file storage
J Ioannidis, S Ioannidis, AD Keromytis, V Prevelakis
International Conference on Financial Cryptography, 282-299, 2002
On the general applicability of instruction-set randomization
SW Boyd, GS Kc, ME Locasto, AD Keromytis, V Prevelakis
IEEE Transactions on Dependable and Secure Computing 7 (3), 255-270, 2008
Decentralized access control in distributed file systems
S Miltchev, JM Smith, V Prevelakis, A Keromytis, S Ioannidis
ACM Computing Surveys (CSUR) 40 (3), 1-30, 2008
Drop‐in security for distributed and portable computing elements
V Prevelakis, A Keromytis
Internet Research, 2003
Characterizing the'security vulnerability likelihood'of software functions
D DaCosta, C Dahn, S Mancoridis, V Prevelakis
International Conference on Software Maintenance, 2003. ICSM 2003 …, 2003
Secure and flexible global file sharing
S Miltchev, V Prevelakis, S Ioannidis, J Ioannidis, AD Keromytis, JM Smith
A secure station for network monitoring and control
V Prevelakis
Proceedings of 8th USENIX SECURITY Conference, 101-109, 1999
Tapi: Transactions for accessing public infrastructure
M Blaze, J Ioannidis, S Ioannidis, AD Keromytis, P Nikander, V Prevelakis
IFIP International Conference on Personal Wireless Communications, 90-100, 2003
Designing an Embedded Firewall/VPN Gateway
V Prevelakis, A Keromytis
Papers from the Third International Network Conference 2002, 16–18 July 2002 …, 2002
How to buy a network: trading of resources in the physical layer
V Prevelakis, A Jukan
IEEE Communications Magazine 44 (12), 94-102, 2006
A market-based bandwidth charging framework
DM Turner, V Prevelakis, AD Keromytis
ACM Transactions on Internet Technology (TOIT) 10 (1), 1-30, 2010
Designing firewalls: A survey
AD Keromytis, V Prevelakis
Network Security: Current Status and Future Directions, 33-49, 2007
Webdava: An administrator-free approach to web file-sharing
A Levine, V Prevelakis, J Ioannidis, S Ioannidis, AD Keromytis
WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling …, 2003
Issues for the Commercial Distribution of Electronic Documents
V Prevelakis, D Konstantas, JH Morin
Communications and Multimedia Security, 265-276, 1997
Towards comprehensive threat modeling for vehicles
M Hamad, M Nolte, V Prevelakis
Proc. Workshop Secur. Dependab. Crit. Embedded Real-Time Syst.(CERTS), 31-36, 2016
Attack-tree-based Threat Modeling of Medical Implants.
MA Siddiqi, RM Seepers, M Hamad, V Prevelakis, C Strydis
PROOFS@ CHES, 32-49, 2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20