Paranoid android: versatile protection for smartphones G Portokalidis, P Homburg, K Anagnostakis, H Bos Proceedings of the 26th annual computer security applications conference …, 2010 | 560 | 2010 |
Systems and methods for detecting and inhibiting attacks using honeypots S Sidiroglou, AD Keromytis, KG Anagnostakis US Patent 7,904,959, 2011 | 435 | 2011 |
Defending against hitlist worms using network address space randomization S Antonatos, P Akritidis, EP Markatos, KG Anagnostakis Proceedings of the 2005 ACM workshop on Rapid malcode, 30-40, 2005 | 357 | 2005 |
Detecting targeted attacks using shadow honeypots KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ... | 326 | 2005 |
Generating realistic workloads for network intrusion detection systems S Antonatos, KG Anagnostakis, EP Markatos Proceedings of the 4th International Workshop on Software and Performance …, 2004 | 272 | 2004 |
Exchange-based incentive mechanisms for peer-to-peer file sharing KG Anagnostakis, MB Greenwald 24th International Conference on Distributed Computing Systems, 2004 …, 2004 | 221 | 2004 |
Network–level polymorphic shellcode detection using emulation M Polychronakis, KG Anagnostakis, EP Markatos International Conference on Detection of Intrusions and Malware, and …, 2006 | 171 | 2006 |
Emulation-based detection of non-self-contained polymorphic shellcode M Polychronakis, KG Anagnostakis, EP Markatos Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 143 | 2007 |
Stride: Polymorphic sled detection through instruction sequence analysis P Akritidis, EP Markatos, M Polychronakis, K Anagnostakis Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 132 | 2005 |
cing: Measuring network-internal delays using only existing infrastructure KG Anagnostakis, M Greenwald, RS Ryger IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 131 | 2003 |
E 2 xB: A Domain-Specific String Matching Algorithm for Intrusion Detection KG Anagnostakis, S Antonatos, EP Markatos, M Polychronakis Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003 | 128 | 2003 |
Exclusion-based signature matching for intrusion detection EP Markatos, S Antonatos, M Polychronakis, KG Anagnostakis Proceedings of the IASTED International Conference on Communications and …, 2002 | 124 | 2002 |
Antisocial networks: Turning a social network into a botnet E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ... International Conference on Information Security, 146-160, 2008 | 117 | 2008 |
Comprehensive shellcode detection using runtime heuristics M Polychronakis, KG Anagnostakis, EP Markatos Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 109 | 2010 |
Efficient packet monitoring for network management KG Anagnostakis, S Ioannidis, S Miltchev, M Greenwald, JM Smith, ... NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002 | 98 | 2002 |
Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks A Vasilakos, C Ricudis, K Anagnostakis, W Pedryca, A Pitsillides 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World …, 1998 | 96 | 1998 |
A cooperative immunization system for an untrusting internet KG Anagnostakis, MB Greenwald, S Ioannidis, AD Keromytis, D Li The 11th IEEE International Conference on Networks, 2003. ICON2003., 403-408, 2003 | 93 | 2003 |
An active splitter architecture for intrusion detection and prevention K Xinidis, I Charitakis, S Antonatos, KG Anagnostakis, EP Markatos IEEE Transactions on Dependable and Secure Computing 3 (1), 31-44, 2006 | 91 | 2006 |
Puppetnets: Misusing web browsers as a distributed attack infrastructure VT Lam, S Antonatos, P Akritidis, KG Anagnostakis Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 90 | 2006 |
Performance analysis of content matching intrusion detection systems S Antonatos, KG Anagnostakis, EP Markatos, M Polychronakis 2004 International Symposium on Applications and the Internet. Proceedings …, 2004 | 85 | 2004 |