151. Return Value Predictability Profiles for Self–healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer science
152. Return Value Predictability Profiles for Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer scienceAnomaly detection (Computer security)
153. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Reports Computer science
154. Taming the Devil: Techniques for Evaluating Anonymized Network Data Coull, Scott E.; Wright, Charles V.; Keromytis, Angelos D.; Monrose, Fabian; Reiter, Michael K. 2008 Articles Computer science
155. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
156. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
157. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
158. Anonymity in Wireless Broadcast Networks Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.; Malkin, Tal G.; Rubin, Avi 2009 Articles Computer science
159. ASSURE: Automatic Software Self-healing Using Rescue Points Sidiroglou, Stelios; Laadan, Oren; Perez, Carlos R.; Viennot, Nicolas; Nieh, Jason; Keromytis, Angelos D. 2009 Articles Computer science
160. A Survey of Voice Over IP Security Research Keromytis, Angelos D. 2009 Articles Computer science
161. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
162. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
163. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D. 2009 Articles Computer science
164. Capturing Information Flow with Concatenated Dynamic Taint Analysis Kim, Hyung Chan; Keromytis, Angelos D.; Covington, Michael; Sahita, Ravi 2009 Articles Computer science
165. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
166. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
167. DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Alicherry, Mansoor; Keromytis, Angelos D. 2009 Articles Computer science
168. Dynamic Trust Management Blaze, Matt; Kannan, Sampath; Lee, Insup; Sokolsky, Oleg; Smith, Jonathan M.; Keromytis, Angelos D.; Lee, Wenke 2009 Articles Computer science
169. Elastic Block Ciphers: Method, Security and Instantiations Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2009 Articles Computer science
170. Evaluating a Collaborative Defense Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
171. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Burnside, Matthew Spindel; Keromytis, Angelos D. 2009 Articles Computer science
172. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Burnside, Matthew Spindel; Keromytis, Angelos D. 2009 Reports Computer science
173. Gone Rogue: An Analysis of Rogue Security Software Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2009 Articles Computer science
174. On the Deployment of Dynamic Taint Analysis for Application Communities Kim, Hyung Chan; Keromytis, Angelos D. 2009 Articles Computer science
175. Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions Keromytis, Angelos D. 2009 Articles Computer science
176. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
177. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
178. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
180. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
181. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
182. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
183. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
184. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
185. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science
186. Crimeware Swindling without Virtual Machines Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
187. DIPLOMA: Distributed Policy Enforcement Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science
188. Ethics in Security Vulnerability Research Matwyshyn, Andrea M.; Cui, Ang; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
189. Evaluation of a Spyware Detection System Using Thin Client Computing Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
190. Fast and Practical Instruction-Set Randomization for Commodity Systems Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
191. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
192. iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Kemerlis, Vasileios; Pappas, Vasileios; Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
193. On The General Applicability of Instruction-Set Randomization Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis 2010 Articles Computer science
194. Securing MANET Multicast Using DIPLOMA Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science
195. Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Polychronakis, Michalis; Keromytis, Angelos D.; Markatos, Evangelos P. 2010 Articles Computer science
196. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
197. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
198. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
199. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
200. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science