1. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
2. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
3. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
4. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
5. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
6. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
7. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
8. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
9. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
10. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
11. A General Analysis of the Security of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
12. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science
13. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
15. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
16. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
17. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
18. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
19. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
20. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
21. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
22. A Network Worm Vaccine Architecture Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Articles Computer science
23. Anonymity in Wireless Broadcast Networks Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.; Malkin, Tal G.; Rubin, Avi 2009 Articles Computer science
24. A Pay-per-Use DoS Protection Mechanism For the Web Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2004 Articles Computer science
25. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
26. Approximating a Global Passive Adversary Against Tor Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer scienceComputer networksComputer networks--Security measures
27. Arachne: Integrated Enterprise Security Management Burnside, Matthew Spindel; Keromytis, Angelos D. 2007 Articles Computer science
28. A Repeater Encryption Unit for IPv4 and IPv6 Nagashima, Norimitsu; Keromytis, Angelos D. 2005 Articles Computer science
29. A Secure Active Network Environment Architecture: Realization in SwitchWare Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
30. A Secure PLAN Hicks, Michael W.; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
32. A Secure PLAN (Extended Version) Hicks, Michael; Keromytis, Angelos D.; Smith, Jonathan M. 2002 Articles Computer science
33. ASSURE: Automatic Software Self-healing Using Rescue Points Sidiroglou, Stelios; Laadan, Oren; Perez, Carlos R.; Viennot, Nicolas; Nieh, Jason; Keromytis, Angelos D. 2009 Articles Computer science
34. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
35. A Study of the Relative Costs of Network Security Protocols Miltchev, Stefan; Ioannidis, Sotiris; Keromytis, Angelos D. 2002 Articles Computer science
37. Asynchronous Policy Evaluation and Enforcement Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
38. Authentication on Untrusted Remote Hosts with Public-key Sudo Burnside, Matthew Spindel; Lu, Mack; Keromytis, Angelos D. 2008 Articles Computer science
39. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
40. Bait and Snitch: Defending Computer Systems with Decoys Voris, Jonathan A.; Jermyn, Jill; Keromytis, Angelos D.; Stolfo, Salvatore 2013 Reports Computer science
41. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
42. Band-aid Patching Sidiroglou, Stelios; Ioannidis, Sotiris; Keromytis, Angelos D. 2007 Articles Computer science
43. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
44. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
45. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
46. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D. 2009 Articles Computer science
47. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
48. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Reports Computer science
49. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
50. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science