101. Ethics in Security Vulnerability Research Matwyshyn, Andrea M.; Cui, Ang; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
102. Evaluation of a Spyware Detection System Using Thin Client Computing Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
103. Fast and Practical Instruction-Set Randomization for Commodity Systems Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
104. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
105. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
106. iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Kemerlis, Vasileios; Pappas, Vasileios; Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
107. JISTIC: Identification of Significant Targets in Cancer Pe'er, Dana; Mozes, Eyal; Sanchez-Garcia, Felix; Akavia, Uri David 2010 Articles OncologyBioinformatics
108. On The General Applicability of Instruction-Set Randomization Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis 2010 Articles Computer science
109. Prosodic Predictors of Upcoming Positive or Negative Content in Spoken Messages Swerts, Marc; Hirschberg, Julia Bell 2010 Articles CommunicationPsychology
110. Robot learning of everyday object manipulations via human demonstration Dang, Hao; Allen, Peter K. 2010 Articles Robotics
111. Securing MANET Multicast Using DIPLOMA Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science
112. Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Polychronakis, Michalis; Keromytis, Angelos D.; Markatos, Evangelos P. 2010 Articles Computer science
113. Simple and Fast Biased Locks Vasudevan, Nalini; Namjoshi, Kedar S.; Edwards, Stephen A. 2010 Articles Computer science
114. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
115. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
116. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
117. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
118. Addressing the Insider Threat Pfleeger, Shari Lawrence; Stolfo, Salvatore 2009 Articles Computer science
119. A design and analysis tool for underactuated compliant hands Ciocarlie, Matei; Allen, Peter K. 2009 Articles Robotics
121. A Disruptive Computer Design Idea: Architectures with Repeatable Timing Edwards, Stephen A.; Kim, Sungjun; Lee, Edward A.; Liu, Isaac; Patel, Hiren D.; Schoeberl, Martin 2009 Articles Computer science
122. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
123. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
124. Anonymity in Wireless Broadcast Networks Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.; Malkin, Tal G.; Rubin, Avi 2009 Articles Computer science
125. A novel analysis space for pointer analysis and its application for bug finding Buss, Marcio; Brand, Daniel; Sreedhar, Vugranam; Edwards, Stephen A. 2009 Articles Computer science
126. APOD: Anonymous Physical Object Delivery Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
127. ASSURE: Automatic Software Self-healing Using Rescue Points Sidiroglou, Stelios; Laadan, Oren; Perez, Carlos R.; Viennot, Nicolas; Nieh, Jason; Keromytis, Angelos D. 2009 Articles Computer science
128. A Survey of Voice Over IP Security Research Keromytis, Angelos D. 2009 Articles Computer science
129. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
130. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
131. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D. 2009 Articles Computer science
132. Brave New World: Pervasive Insecurity of Embedded Network Devices Cui, Ang; Song, Yingbo; Prabhu, Pratap; Stolfo, Salvatore 2009 Articles Computer scienceRouters (Computer networks)Webcams
133. Buffer Sharing in CSP-like Programs Vasudevan, Nalini; Edwards, Stephen A. 2009 Articles Computer science
134. Capturing Information Flow with Concatenated Dynamic Taint Analysis Kim, Hyung Chan; Keromytis, Angelos D.; Covington, Michael; Sahita, Ravi 2009 Articles Computer science
135. Celling SHIM: Compiling Deterministic Concurrency to a Heterogeneous Multicore Vasudevan, Nalini; Edwards, Stephen A. 2009 Articles Computer science
136. Compile-Time Analysis and Specialization of Clocks in Concurrent Programs Vasudevan, Nalini; Tardieu, Olivier; Dolby, Julian; Edwards, Stephen A. 2009 Articles Computer science
137. Concurrency and Communication: Lessons from the SHIM Project Edwards, Stephen A. 2009 Articles Computer science
138. Configuration Management and Security Bellovin, Steven Michael; Bush, Randy 2009 Articles Computer science
139. Cybersecurity through an Identity Management System Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2009 Articles Computer science
140. Data-driven grasping with partial sensor data Goldfeder, Corey; Ciocarlie, Matei; Peretzman, Jaime; Dang, Hao; Allen, Peter K. 2009 Articles Robotics
141. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
142. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
143. DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Alicherry, Mansoor; Keromytis, Angelos D. 2009 Articles Computer science
144. Dynamic Trust Management Blaze, Matt; Kannan, Sampath; Lee, Insup; Sokolsky, Oleg; Smith, Jonathan M.; Keromytis, Angelos D.; Lee, Wenke 2009 Articles Computer science
145. Elastic Block Ciphers: Method, Security and Instantiations Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2009 Articles Computer science
146. Evaluating a Collaborative Defense Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
147. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Burnside, Matthew Spindel; Keromytis, Angelos D. 2009 Articles Computer science
148. Functional analysis of finger contact locations during grasping Ciocarlie, Matei; Dang, Hao; Lukos, Jamie; Santello, Marco; Allen, Peter K. 2009 Articles Robotics
149. Gone Rogue: An Analysis of Rogue Security Software Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2009 Articles Computer science
150. Laissez-faire file sharing: Access control designed for individuals at the endpoints Johnson, Maritza Lupe; Bellovin, Steven Michael; Reeder, Robert W.; Schechter, Stuart E. 2009 Articles Computer scienceComputer file sharingComputers--Access control
151. On the Deployment of Dynamic Taint Analysis for Application Communities Kim, Hyung Chan; Keromytis, Angelos D. 2009 Articles Computer science
152. Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions Keromytis, Angelos D. 2009 Articles Computer science
153. Reconciling Repeatable Timing with Pipelining and Memory Hierarchy Edwards, Stephen A.; Kim, Sungjun; Lee, Edward A.; Patel, Hiren D.; Schoeberl, Martin 2009 Articles Computer science
154. Secure Anonymous Database Search Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2009 Articles Computer science
156. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
157. Synthesis and Optimization of Pipelined Packet Processors Soviani, Cristian; Hadzic, Ilija; Edwards, Stephen A. 2009 Articles Computer science
158. System design of an Insertable Robotic Effector Platform for Single Port Access (SPA) Surgery Xu, Kai; Goldman, Roger Eric; Ding, Jienan; Allen, Peter K.; Fowler, Dennis L.; Simaan, Nabil 2009 Articles RoboticsSurgery
159. The Columbia grasp database Goldfeder, Corey; Ciocarlie, Matei; Dang, Hao; Allen, Peter K. 2009 Articles RoboticsArtificial intelligence
161. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
162. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
163. A Deterministic Multi-Way Rendezvous Library for Haskell Vasudevan, Nalini; Singh, Satnam; Edwards, Stephen A. 2008 Articles Computer science
164. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
165. Asynchronous Policy Evaluation and Enforcement Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
166. Authentication on Untrusted Remote Hosts with Public-key Sudo Burnside, Matthew Spindel; Lu, Mack; Keromytis, Angelos D. 2008 Articles Computer science
167. Autotagging to improve text search for 3D models Goldfeder, Corey; Allen, Peter K. 2008 Articles RoboticsArtificial intelligence
168. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
169. Biomimetic grasp planning for cortical control of a robotic hand Ciocarlie, Matei; Clanton, Samuel T.; Spalding, M. Chance; Allen, Peter K. 2008 Articles Robotics
170. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism
171. Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2008 Articles Computer science
172. Decentralized Access Control in Distributed File Systems Miltchev, Stefan; Smith, Jonathan M.; Prevelakis, Vassilis; Ioannidis, Sotiris; Keromytis, Angelos D. 2008 Articles Computer science
173. Flexible Pointer Analysis Using Assign-Fetch Graphs Buss, Marcio; Edwards, Stephen A.; Brand, Daniel; Sreedhar, Vugranam 2008 Articles Computer scienceMathematics
174. Identifying Proxy Nodes in a Tor Anonymization Circuit Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Articles Computer science
175. Insertable stereoscopic 3D surgical imaging device with pan and tilt Hu, Tie; Allen, Peter K.; Hogle, Nancy J.; Nadkarni, Tejas; Fowler, Dennis L. 2008 Articles RoboticsSurgery
176. Insertable surgical imaging device with pan, tilt, zoom, and lighting Hu, Tie; Allen, Peter K.; Hogle, Nancy J.; Fowler, Dennis 2008 Articles RoboticsDiagnostic imaging
177. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2008 Articles Computer science
178. Online Network Forensics for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
179. PAR: Payment for Anonymous Routing Androulaki, Elli; Raykova, Mariana Petrova; Srivatsan, Shreyas; Stavrou, Angelos; Bellovin, Steven Michael 2008 Articles Computer science
180. Path-based Access Control for Enterprise Networks Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
181. Predictable Programming on a Precision Timed Architecture Lickly, Ben; Liu, Isaac; Kim, Sungjun; Patel, Hiren D.; Edwards, Stephen A.; Lee, Edward A. 2008 Articles Computer science
182. Programming Shared Memory Multiprocessors with DeterministicMessage-Passing Concurrency: Compiling SHIM to Pthreads Edwards, Stephen A.; Vasudevan, Nalini; Tardieu, Olivier 2008 Articles Computer science
183. Pushback for Overlay Networks: Protecting Against Malicious Insiders Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2008 Articles Computer science
184. Race to the Bottom: Malicious Hardware Keromytis, Angelos D.; Sethumadhavan, Lakshminarasimhan; Shepard, Kenneth L. 2008 Articles Computer science
185. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2008 Articles Computer science
186. Return Value Predictability Profiles for Self–healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer science
187. Return Value Predictability Profiles for Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer scienceAnomaly detection (Computer security)
188. Risking Communications Security: Potential Hazards of the Protect America Act Bellovin, Steven Michael; Blaze, Matt; Diffie, Whitfield; Landau, Susan; Neumann, Peter G.; Rexford, Jennifer 2008 Articles Computer science
189. RUST: A Retargetable Usability Testbed for Website Authentication Technologies Johnson, Maritza Lupe; Atreya, Chaitanya; Aviv, Adam; Raykova, Mariana Petrova; Bellovin, Steven Michael; Kaiser, Gail E. 2008 Articles Computer science
190. Security Assurance for Web Device APIs Johnson, Maritza Lupe; Bellovin, Steven Michael 2008 Articles Computer science
191. Security by Checklist Bellovin, Steven Michael 2008 Articles Computer scienceComputer securityComputers--Access controlUser interfaces (Computer systems)
192. SHREC'08 entry: Training set expansion via autotags Goldfeder, Corey; Feng, Haoyun; Allen, Peter K. 2008 Articles RoboticsArtificial intelligence
193. Static Deadlock Detection for the SHIM Concurrent Language Vasudevan, Nalini; Edwards, Stephen A. 2008 Articles Computer science
194. Static Elaboration of Recursion for Concurrent Software Edwards, Stephen A.; Zeng, Jia 2008 Articles Computer science
195. Taming the Devil: Techniques for Evaluating Anonymized Network Data Coull, Scott E.; Wright, Charles V.; Keromytis, Angelos D.; Monrose, Fabian; Reiter, Michael K. 2008 Articles Computer science
197. Two-stage robotic crystal mounting of protein crystals for X-ray data collection Georgiev, Atanas; Allen, Peter K. 2008 Articles Robotics
198. Arachne: Integrated Enterprise Security Management Burnside, Matthew Spindel; Keromytis, Angelos D. 2007 Articles Computer science
199. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
200. Band-aid Patching Sidiroglou, Stelios; Ioannidis, Sotiris; Keromytis, Angelos D. 2007 Articles Computer science