1. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
2. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
3. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
4. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
5. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
6. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
7. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
8. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
9. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science
11. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
12. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
13. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
14. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
15. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
16. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
17. A Network Worm Vaccine Architecture Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Articles Computer science
18. Anonymity in Wireless Broadcast Networks Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.; Malkin, Tal G.; Rubin, Avi 2009 Articles Computer science
19. A Pay-per-Use DoS Protection Mechanism For the Web Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2004 Articles Computer science
20. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science