21. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
22. A Network Worm Vaccine Architecture Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Articles Computer science
23. A Secure PLAN Hicks, Michael W.; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
24. Countering Code Injection Attacks With Instruction Set Randomization Kc, Gaurav S.; Keromytis, Angelos D.; Prevelakis, Vassilis 2003 Articles Computer science
25. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Reports Computer science
26. Design and Implementation of Virtual Private Services Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
27. Drop-in Security for Distributed and Portable Computing Elements Prevelakis, Vassilis; Keromytis, Angelos D. 2003 Articles Computer scienceData protectionFirewalls (Computer security)
28. EasyVPN: IPsec Remote Access Made Easy Benvenuto, Mark C.; Keromytis, Angelos D. 2003 Articles Computer science
29. Experience with the KeyNote Trust Management System: Applications and Future Directions Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2003 Articles Computer science
30. Managing Access Control in Large Scale Heterogeneous Networks Keromytis, Angelos D.; Anagnostakis, Kostas G.; Ioannidis, Sotiris; Greenwald, Michael; Smith, Jonathan M. 2003 Articles Computer science