1. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2004 Reports Computer science
2. CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap Locasto, Michael E.; Keromytis, Angelos D. 2004 Articles Computer science
3. Collaborative Distributed Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal 2004 Reports Computer science
4. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
5. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2005 Articles Computer science
6. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
7. PachyRand: SQL Randomization for the PostgreSQL JDBC Driver Locasto, Michael E.; Keromytis, Angelos D. 2005 Reports Computer science
8. Speculative Virtual Verification: Policy-Constrained Speculative Execution Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
9. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
10. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
11. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Reports Computer science
12. Dark Application Communities Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
13. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
14. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
15. Quantifying Application Behavior Space for Detection and Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2006 Reports Computer science
16. Software Self-Healing Using Collaborative Application Communities Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
17. Speculative Execution as an Operating System Service Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
18. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
19. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
20. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science