31. Asynchronous Policy Evaluation and Enforcement Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
32. Authentication on Untrusted Remote Hosts with Public-key Sudo Burnside, Matthew Spindel; Lu, Mack; Keromytis, Angelos D. 2008 Articles Computer science
33. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
34. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
35. Band-aid Patching Sidiroglou, Stelios; Ioannidis, Sotiris; Keromytis, Angelos D. 2007 Articles Computer science
36. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
37. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
38. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D. 2009 Articles Computer science
39. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
40. Bridging the Network Reservation Gap Using Overlays Stavrou, Angelos; Turner, David; Keromytis, Angelos D.; Prevelakis, Vassilis 2007 Articles Computer science