1. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
2. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
3. Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Polychronakis, Michalis; Keromytis, Angelos D.; Markatos, Evangelos P. 2010 Articles Computer science
4. ASSURE: Automatic Software Self-healing Using Rescue Points Sidiroglou, Stelios; Laadan, Oren; Perez, Carlos R.; Viennot, Nicolas; Nieh, Jason; Keromytis, Angelos D. 2009 Articles Computer science
5. Band-aid Patching Sidiroglou, Stelios; Ioannidis, Sotiris; Keromytis, Angelos D. 2007 Articles Computer science
6. Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction Antonatos, Spiros; Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.; Markatos, Evangelos 2007 Articles Computer science
7. Mediated Overlay Services (MOSES): Network Security as a Composable Service Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2007 Articles Computer science
8. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
9. Execution transactions for defending against software failures: use and evaluation Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
10. Privacy as an Operating System Service Loannidis, Sotiris; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
11. Software Self-Healing Using Collaborative Application Communities Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
12. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
13. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
14. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
15. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2005 Articles Computer science
16. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
17. Detecting Targeted Attacks Using Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Xinidis, Konstantinos; Markatos, Evangelos; Keromytis, Angelos D. 2005 Articles Computer science
18. Speculative Virtual Verification: Policy-Constrained Speculative Execution Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
19. A Network Worm Vaccine Architecture Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Articles Computer science