1. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
2. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
3. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
4. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks Stavrou, Angelos; Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
5. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
6. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
7. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
8. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
9. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
10. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
11. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
12. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
13. Trust Management for IPsec Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
14. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
15. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
16. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
17. Towards a Forensic Analysis for Multimedia Communication Services Geneiatakis, Dimitris; Keromytis, Angelos D. 2011 Articles Computer science
18. The SwitchWare Active Network Architecture Alexander, D. Scott; Arbaugh, William A.; Hicks, Michael W.; Kakkar, Pankaj; Keromytis, Angelos D.; Moore, Jonathan T.; Gunter, Carl A.; Nettles, Scott M.; Smith, Jonathan M. 1998 Articles Computer science
19. The STRONGMAN Architecture Keromytis, Angelos D.; Ioannidis, Sotiris; Greenwald, Michael B.; Smith, Jonathan M. 2003 Articles Computer science
20. The SPARCHS Project: Hardware Support for Software Security Sethumadhavan, Lakshminarasimhan; Stolfo, Salvatore; Keromytis, Angelos D.; Yang, Junfeng; August, David 2011 Articles Computer science
21. The Security of Elastic Block Ciphers Against Key-Recovery Attacks Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2007 Articles Computer science
22. The Price of Safety in an Active Network Alexander, D. Scott; Menage, Paul B.; Keromytis, Angelos D.; Arbaugh, William A.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2001 Articles Computer science
23. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
24. The Efficient Dual Receiver Cryptosystem and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2011 Articles Computer science
25. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet Kamra, Abhinav; Feng, Hanhua; Misra, Vishal; Keromytis, Angelos D. 2005 Articles Computer science
26. The Dual Receiver Cryptogram and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2004 Articles Computer science
27. The Design of the OpenBSD Cryptographic Framework Keromytis, Angelos D.; Wright, Jason L.; Raadt, Theo de 2003 Articles Computer science
28. The Case for Crypto Protocol Awareness Inside the OS Kernel Burnside, Matthew Spindel; Keromytis, Angelos D. 2005 Articles Computer science
29. The Bandwidth Exchange Architecture Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2005 Articles Computer science
30. TAPI: Transactions for Accessing Public Infrastructure Blaze, Matt; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Nikander, Pekka; Prevelakis, Vassilis 2003 Articles Computer science
31. Taming the Devil: Techniques for Evaluating Anonymized Network Data Coull, Scott E.; Wright, Charles V.; Keromytis, Angelos D.; Monrose, Fabian; Reiter, Michael K. 2008 Articles Computer science
32. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
33. Tagging Data In The Network Stack: mbuf tags Keromytis, Angelos D. 2003 Articles Computer science
34. SSARES: Secure Searchable Automated Remote Email Storage Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D. 2007 Articles Computer science
35. SQLrand: Preventing SQL Injection Attacks Boyd, Stephen W.; Keromytis, Angelos D. 2004 Articles Computer science
36. Speculative Virtual Verification: Policy-Constrained Speculative Execution Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
37. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
38. SOS: An Architecture for Mitigating DDoS Attacks Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
39. Software Self-Healing Using Collaborative Application Communities Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
40. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
41. Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Polychronakis, Michalis; Keromytis, Angelos D.; Markatos, Evangelos P. 2010 Articles Computer science
42. Self-Healing Multitier Architectures Using Cascading Rescue Points Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2012 Articles Information science
43. Securing MANET Multicast Using DIPLOMA Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science
44. Secure Quality of Service Handling: SQoSH Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Muir, Steve; Smith, Jonathan M. 2000 Articles Computer science
45. Secure Overlay Services Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
46. Secure and Flexible Global File Sharing Miltchev, Stefan; Prevelakis, Vassilis; Ioannidis, Sotiris; Ioannidis, John; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
47. Scalable Resource Control in Active Networks Anagnostakis, Kostas G.; Hicks, Michael W.; Ioannidis, Sotiris; Keromytis, Angelos D.; Smith, Jonathan M. 2000 Articles Computer science
48. Safety and Security of Programmable Network Infrastructures Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
49. ROP Payload Detection Using Speculative Code Execution Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science
50. Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation Anagnostakis, Kostas G.; Ioannidis, Sotiris; Keromytis, Angelos D.; Greenwald, Michael B. 2006 Articles Computer science
51. Return Value Predictability Profiles for Self–healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer science
52. Return Value Predictability Profiles for Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer scienceAnomaly detection (Computer security)
53. Retrofitting Security in COTS Software with Binary Rewriting O'Sullivan, Pádraig; Anand, Kapil; Kotha, Aparna; Smithson, Matthew; Barua, Rajeev; Keromytis, Angelos D. 2011 Articles Computer science
54. Requirements for Scalable Access Control and Security Management Architectures Keromytis, Angelos D.; Smith, Jonathan M. 2007 Articles Computer science
55. Remotely Keyed Cryptographics: Secure Remote Display Access Using (Mostly) Untrusted Hardware Cook, Debra L.; Baratto, Ricardo A.; Keromytis, Angelos D. 2005 Articles Computer science
56. Recursive Sandboxes: Extending Systrace To Empower Applications Kurchuk, Aleksey; Keromytis, Angelos D. 2004 Articles Computer science
57. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
58. Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions Keromytis, Angelos D. 2009 Articles Computer science
59. Race to the Bottom: Malicious Hardware Keromytis, Angelos D.; Sethumadhavan, Lakshminarasimhan; Shepard, Kenneth L. 2008 Articles Computer science
60. Pushback for Overlay Networks: Protecting Against Malicious Insiders Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2008 Articles Computer science
61. Privacy as an Operating System Service Loannidis, Sotiris; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
62. Path-based Access Control for Enterprise Networks Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
64. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
65. On the Infeasibility of Modeling Polymorphic Shellcode Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Articles Computer scienceDigital signatures
66. On The General Applicability of Instruction-Set Randomization Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis 2010 Articles Computer science
67. On the Deployment of Dynamic Taint Analysis for Application Communities Kim, Hyung Chan; Keromytis, Angelos D. 2009 Articles Computer science
68. Online Network Forensics for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
69. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses Heller, Katherine; Svore, Krysta; Keromytis, Angelos D.; Stolfo, Salvatore 2003 Articles Computer science
70. Offline Micropayments without Trusted Hardware Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2001 Articles Computer science
71. Next Generation Attacks on the Internet Markatos, Evangelos; Keromytis, Angelos D. 2006 Articles Computer science
72. MOVE: An End-to-End Solution To Network Denial of Service Stavrou, Angelos; Keromytis, Angelos D.; Nieh, Jason; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
73. Misuse Detection in Consent-based Networks Alicherry, Mansoor; Keromytis, Angelos D. 2011 Articles Computer science
74. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2008 Articles Computer science
75. Mediated Overlay Services (MOSES): Network Security as a Composable Service Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2007 Articles Computer science
76. Measuring the Deployment Hiccups of DNSSEC Pappas, Vasileios; Keromytis, Angelos D. 2011 Articles Computer science
77. Managing Access Control in Large Scale Heterogeneous Networks Keromytis, Angelos D.; Anagnostakis, Kostas G.; Ioannidis, Sotiris; Greenwald, Michael; Smith, Jonathan M. 2003 Articles Computer science
78. Low Latency Anonymity with Mix Rings Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Articles Computer science
79. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
80. KeyNote: Trust Management for Public-Key Infrastructures Blaze, Matt; Feigenbaum, Joan; Keromytis, Angelos D. 1998 Articles Computer science
81. Just Fast Keying: Key Agreement in a Hostile Internet Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2004 Articles Computer science
82. Implementing IPsec Keromytis, Angelos D.; Ioannidis, John; Smith, Jonathan M. 1997 Articles Computer science
83. Implementing a Distributed Firewall Ioannidis, Sotiris; Keromytis, Angelos D.; Bellovin, Steven Michael; Smith, Jonathan M. 2000 Articles Computer scienceFirewalls (Computer security)IPSec (Computer network protocol)Computer networks--Security measuresOpenBSD (Electronic resource)
84. iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Kemerlis, Vasileios; Pappas, Vasileios; Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
85. Identifying Proxy Nodes in a Tor Anonymization Circuit Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Articles Computer science
86. Hydan: Hiding Information in Program Binaries El-Khalil, Rakan; Keromytis, Angelos D. 2004 Articles Computer science
87. gore: Routing-Assisted Defense Against DDoS Attacks Chou, Stephen T.; Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D. 2005 Articles Computer science
88. Gone Rogue: An Analysis of Rogue Security Software Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2009 Articles Computer science
89. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
90. From STEM to SEAD: Speculative Execution for Automated Defense Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D. 2007 Articles Computer science
91. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
92. FlowPuter: A Cluster Architecture Unifying Switch, Server and Storage Processing Aho, Alfred V.; Keromytis, Angelos D.; Misra, Vishal; Nieh, Jason; Ross, Kenneth A.; Yemini, Yechiam 2005 Articles Computer science
93. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
94. Fileteller: Paying and Getting Paid for File Storage Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Prevelakis, Vassilis 2002 Articles Computer science
95. Fast and Practical Instruction-Set Randomization for Commodity Systems Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
96. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Burnside, Matthew Spindel; Keromytis, Angelos D. 2009 Articles Computer science
97. Exploiting Split Browsers for Efficiently Protecting User Data Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D.; Athanasopoulos, Elias 2012 Articles Information science
98. Experience with the KeyNote Trust Management System: Applications and Future Directions Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2003 Articles Computer science
99. Execution transactions for defending against software failures: use and evaluation Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
100. Evaluation of a Spyware Detection System Using Thin Client Computing Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science