1. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
2. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
3. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
4. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
5. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
6. A Pay-per-Use DoS Protection Mechanism For the Web Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2004 Articles Computer science
7. Approximating a Global Passive Adversary Against Tor Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer scienceComputer networksComputer networks--Security measures
8. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
9. Bridging the Network Reservation Gap Using Overlays Stavrou, Angelos; Turner, David; Keromytis, Angelos D.; Prevelakis, Vassilis 2007 Articles Computer science
10. Can P2P Replace Direct Download for Content Distribution Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2007 Reports Computer science
11. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism
12. Countering DDoS Attacks with Multi-Path Overlay Networks Stavrou, Angelos; Keromytis, Angelos D. 2006 Articles Computer science
13. Countering DoS Attacks With Stateless Multipath Overlays Stavrou, Angelos; Keromytis, Angelos D. 2005 Articles Computer science
14. Dark Application Communities Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
15. Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Articles Computer science
16. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
17. Distributed Firewall For MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2008 Reports Computer science
18. Evaluating a Collaborative Defense Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
19. Exploiting the Structure in DHT Overlays for DoS Protection Stavrou, Angelos; Keromytis, Angelos D.; Rubenstein, Daniel Stuart 2004 Reports Computer science
20. From STEM to SEAD: Speculative Execution for Automated Defense Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D. 2007 Articles Computer science
21. gore: Routing-Assisted Defense Against DDoS Attacks Chou, Stephen T.; Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D. 2005 Articles Computer science
22. Identifying Proxy Nodes in a Tor Anonymization Circuit Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Articles Computer science
23. LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer science
24. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2006 Reports Computer science
25. Mediated Overlay Services (MOSES): Network Security as a Composable Service Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2007 Articles Computer science
26. MOVE: An End-to-End Solution To Network Denial of Service Stavrou, Angelos; Keromytis, Angelos D.; Nieh, Jason; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
27. On the Infeasibility of Modeling Polymorphic Shellcode Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Articles Computer scienceDigital signatures
28. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Reports Computer science
29. Pushback for Overlay Networks: Protecting Against Malicious Insiders Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2008 Articles Computer science
30. Quantifying Application Behavior Space for Detection and Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2006 Reports Computer science
31. Return Value Predictability Profiles for Self–healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer science
32. Return Value Predictability Profiles for Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer scienceAnomaly detection (Computer security)
33. STAND: Sanitization Tool for ANomaly Detection Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
34. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
35. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
36. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
37. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
38. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
39. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks Stavrou, Angelos; Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science