101. Elastic Block Ciphers in Practice: Constructions and Modes of Encryption Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2007 Articles Computer science
102. Elastic Block Ciphers: The Basic Design Cook, Debra L.; Keromytis, Angelos D.; Yung, Moti 2007 Articles Computer science
103. From STEM to SEAD: Speculative Execution for Automated Defense Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D. 2007 Articles Computer science
104. Mediated Overlay Services (MOSES): Network Security as a Composable Service Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2007 Articles Computer science
105. On the Infeasibility of Modeling Polymorphic Shellcode Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Articles Computer scienceDigital signatures
106. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Reports Computer science
107. Requirements for Scalable Access Control and Security Management Architectures Keromytis, Angelos D.; Smith, Jonathan M. 2007 Articles Computer science
108. SSARES: Secure Searchable Automated Remote Email Storage Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D. 2007 Articles Computer science
109. STAND: Sanitization Tool for ANomaly Detection Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
110. The Security of Elastic Block Ciphers Against Key-Recovery Attacks Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2007 Articles Computer science
111. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
112. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
113. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
114. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
115. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Reports Computer science
116. Conversion Functions for Symmetric Key Ciphers Cook, Debra L.; Keromytis, Angelos D. 2006 Articles Computer science
117. Countering DDoS Attacks with Multi-Path Overlay Networks Stavrou, Angelos; Keromytis, Angelos D. 2006 Articles Computer science
118. Dark Application Communities Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
119. Execution transactions for defending against software failures: use and evaluation Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
120. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2006 Reports Computer science
121. Low Latency Anonymity with Mix Rings Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Articles Computer science
122. Next Generation Attacks on the Internet Markatos, Evangelos; Keromytis, Angelos D. 2006 Articles Computer science
123. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
124. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
125. Privacy as an Operating System Service Loannidis, Sotiris; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
126. Quantifying Application Behavior Space for Detection and Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2006 Reports Computer science
127. Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation Anagnostakis, Kostas G.; Ioannidis, Sotiris; Keromytis, Angelos D.; Greenwald, Michael B. 2006 Articles Computer science
128. Software Self-Healing Using Collaborative Application Communities Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
129. Speculative Execution as an Operating System Service Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
130. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
131. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
132. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
133. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
134. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
135. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
136. A General Analysis of the Security of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
137. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
138. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
139. A Repeater Encryption Unit for IPv4 and IPv6 Nagashima, Norimitsu; Keromytis, Angelos D. 2005 Articles Computer science
140. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2005 Articles Computer science
141. Conversion and Proxy Functions for Symmetric Key Ciphers Cook, Debra L.; Keromytis, Angelos D. 2005 Articles Computer science
142. Countering DoS Attacks With Stateless Multipath Overlays Stavrou, Angelos; Keromytis, Angelos D. 2005 Articles Computer science
143. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
144. CryptoGraphics: Secret Key Cryptography Using Graphics Cards Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake 2005 Articles Computer science
145. Detecting Targeted Attacks Using Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Xinidis, Konstantinos; Markatos, Evangelos; Keromytis, Angelos D. 2005 Articles Computer science
146. e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing Kc, Gaurav S.; Keromytis, Angelos D. 2005 Articles Computer science
147. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
148. FlowPuter: A Cluster Architecture Unifying Switch, Server and Storage Processing Aho, Alfred V.; Keromytis, Angelos D.; Misra, Vishal; Nieh, Jason; Ross, Kenneth A.; Yemini, Yechiam 2005 Articles Computer science
149. gore: Routing-Assisted Defense Against DDoS Attacks Chou, Stephen T.; Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D. 2005 Articles Computer science
150. MOVE: An End-to-End Solution To Network Denial of Service Stavrou, Angelos; Keromytis, Angelos D.; Nieh, Jason; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science