22. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
23. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
24. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
25. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
26. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
27. Crimeware Swindling without Virtual Machines Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
28. DIPLOMA: Distributed Policy Enforcement Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science
29. Ethics in Security Vulnerability Research Matwyshyn, Andrea M.; Cui, Ang; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
30. Evaluation of a Spyware Detection System Using Thin Client Computing Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
31. Fast and Practical Instruction-Set Randomization for Commodity Systems Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
32. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
33. iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Kemerlis, Vasileios; Pappas, Vasileios; Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
34. On The General Applicability of Instruction-Set Randomization Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis 2010 Articles Computer science
35. Securing MANET Multicast Using DIPLOMA Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science
36. Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Polychronakis, Michalis; Keromytis, Angelos D.; Markatos, Evangelos P. 2010 Articles Computer science
37. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
38. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
39. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
40. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science