1. Requirements for Scalable Access Control and Security Management Architectures Keromytis, Angelos D.; Smith, Jonathan M. 2002 Reports Computer science
2. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
3. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Reports Computer science
4. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2004 Reports Computer science
5. Collaborative Distributed Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal 2004 Reports Computer science
6. Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2004 Reports Computer science
7. Elastic Block Ciphers: The Feistel Cipher Case Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2004 Reports Computer science
8. Exploiting the Structure in DHT Overlays for DoS Protection Stavrou, Angelos; Keromytis, Angelos D.; Rubenstein, Daniel Stuart 2004 Reports Computer science
9. Remotely Keyed CryptoGraphics - Secure Remote Display Access Using (Mostly) Untrusted Hardware - Extended Version Cook, Debra L.; Baratto, Ricardo A.; Keromytis, Angelos D. 2004 Reports Computer science
10. Secret Key Cryptography Using Graphics Cards Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake 2004 Reports Computer science