1. Implementing IPsec Keromytis, Angelos D.; Ioannidis, John; Smith, Jonathan M. 1997 Articles Computer science
2. A Secure Active Network Environment Architecture: Realization in SwitchWare Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
3. KeyNote: Trust Management for Public-Key Infrastructures Blaze, Matt; Feigenbaum, Joan; Keromytis, Angelos D. 1998 Articles Computer science
4. Safety and Security of Programmable Network Infrastructures Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
5. The SwitchWare Active Network Architecture Alexander, D. Scott; Arbaugh, William A.; Hicks, Michael W.; Kakkar, Pankaj; Keromytis, Angelos D.; Moore, Jonathan T.; Gunter, Carl A.; Nettles, Scott M.; Smith, Jonathan M. 1998 Articles Computer science
7. Implementing a Distributed Firewall Ioannidis, Sotiris; Keromytis, Angelos D.; Bellovin, Steven Michael; Smith, Jonathan M. 2000 Articles Computer scienceFirewalls (Computer security)IPSec (Computer network protocol)Computer networks--Security measuresOpenBSD (Electronic resource)
8. Scalable Resource Control in Active Networks Anagnostakis, Kostas G.; Hicks, Michael W.; Ioannidis, Sotiris; Keromytis, Angelos D.; Smith, Jonathan M. 2000 Articles Computer science
9. Secure Quality of Service Handling: SQoSH Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Muir, Steve; Smith, Jonathan M. 2000 Articles Computer science
10. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Ioannidis, John; Canetti, Ran; Keromytis, Angelos D.; Reingold, Omer 2001 Articles Computer science
11. Offline Micropayments without Trusted Hardware Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2001 Articles Computer science
12. The Price of Safety in an Active Network Alexander, D. Scott; Menage, Paul B.; Keromytis, Angelos D.; Arbaugh, William A.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2001 Articles Computer science
13. A Secure PLAN (Extended Version) Hicks, Michael; Keromytis, Angelos D.; Smith, Jonathan M. 2002 Articles Computer science
14. A Study of the Relative Costs of Network Security Protocols Miltchev, Stefan; Ioannidis, Sotiris; Keromytis, Angelos D. 2002 Articles Computer science
15. Designing an Embedded Firewall/VPN Gateway Prevelakis, Vassilis; Keromytis, Angelos D. 2002 Articles Computer science
16. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2002 Articles Computer science
17. Fileteller: Paying and Getting Paid for File Storage Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Prevelakis, Vassilis 2002 Articles Computer science
18. Requirements for Scalable Access Control and Security Management Architectures Keromytis, Angelos D.; Smith, Jonathan M. 2002 Reports Computer science
19. Secure Overlay Services Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
20. Trust Management for IPsec Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
21. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
22. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
23. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
24. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
25. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science
26. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
27. A Network Worm Vaccine Architecture Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Articles Computer science
28. A Secure PLAN Hicks, Michael W.; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
29. Countering Code Injection Attacks With Instruction Set Randomization Kc, Gaurav S.; Keromytis, Angelos D.; Prevelakis, Vassilis 2003 Articles Computer science
30. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Reports Computer science
31. Design and Implementation of Virtual Private Services Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
32. Drop-in Security for Distributed and Portable Computing Elements Prevelakis, Vassilis; Keromytis, Angelos D. 2003 Articles Computer scienceData protectionFirewalls (Computer security)
33. EasyVPN: IPsec Remote Access Made Easy Benvenuto, Mark C.; Keromytis, Angelos D. 2003 Articles Computer science
34. Experience with the KeyNote Trust Management System: Applications and Future Directions Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2003 Articles Computer science
35. Managing Access Control in Large Scale Heterogeneous Networks Keromytis, Angelos D.; Anagnostakis, Kostas G.; Ioannidis, Sotiris; Greenwald, Michael; Smith, Jonathan M. 2003 Articles Computer science
36. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses Heller, Katherine; Svore, Krysta; Keromytis, Angelos D.; Stolfo, Salvatore 2003 Articles Computer science
37. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Stewart, Randall R. 2003 Reports Computer science
38. Secure and Flexible Global File Sharing Miltchev, Stefan; Prevelakis, Vassilis; Ioannidis, Sotiris; Ioannidis, John; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
39. SOS: An Architecture for Mitigating DDoS Attacks Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
40. Tagging Data In The Network Stack: mbuf tags Keromytis, Angelos D. 2003 Articles Computer science
41. TAPI: Transactions for Accessing Public Infrastructure Blaze, Matt; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Nikander, Pekka; Prevelakis, Vassilis 2003 Articles Computer science
42. The Design of the OpenBSD Cryptographic Framework Keromytis, Angelos D.; Wright, Jason L.; Raadt, Theo de 2003 Articles Computer science
43. The STRONGMAN Architecture Keromytis, Angelos D.; Ioannidis, Sotiris; Greenwald, Michael B.; Smith, Jonathan M. 2003 Articles Computer science
44. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
45. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
46. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
47. A Pay-per-Use DoS Protection Mechanism For the Web Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2004 Articles Computer science
48. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2004 Reports Computer science
49. CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap Locasto, Michael E.; Keromytis, Angelos D. 2004 Articles Computer science
50. Collaborative Distributed Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal 2004 Reports Computer science