1. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
2. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
3. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
4. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
5. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
6. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
7. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
8. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
9. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science