1. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
2. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
4. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
5. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks Stavrou, Angelos; Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
6. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
7. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
8. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
9. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
10. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
11. View planning for automated site modeling Blaer, Paul S.; Allen, Peter K. 2006 Articles Computer science
12. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
13. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
14. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
15. Using Program Specialization to Speed SystemC Fixed-Point Simulation Edwards, Stephen A. 2006 Articles Computer science
16. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
17. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
18. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
19. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
20. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
21. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
23. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
24. Tutorial: Compiling Concurrent Languages for Sequential Processors Edwards, Stephen A. 2003 Articles Computer science
25. Trust Management for IPsec Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
26. Translating Collocations for Bilingual Lexicons: A Statistical Approach McKeown, Kathleen; Smadja, Frank; Hatzivassiloglou, Vasileios 1996 Articles Computer science
27. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host Gleitz, Peter M.; Bellovin, Steven Michael 2001 Articles Computer science
28. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
29. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
30. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
31. Towards a Forensic Analysis for Multimedia Communication Services Geneiatakis, Dimitris; Keromytis, Angelos D. 2011 Articles Computer science
32. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
33. The Synchronous Languages 12 Years Later Edwards, Stephen A.; Albert, Benveniste; Caspi, Paul; Halbwachs, Nicolas; Le Guernic, Paul; De Simone, Robert 2003 Articles Computer science
34. The SwitchWare Active Network Architecture Alexander, D. Scott; Arbaugh, William A.; Hicks, Michael W.; Kakkar, Pankaj; Keromytis, Angelos D.; Moore, Jonathan T.; Gunter, Carl A.; Nettles, Scott M.; Smith, Jonathan M. 1998 Articles Computer science
35. The STRONGMAN Architecture Keromytis, Angelos D.; Ioannidis, Sotiris; Greenwald, Michael B.; Smith, Jonathan M. 2003 Articles Computer science
36. The SPARCHS Project: Hardware Support for Software Security Sethumadhavan, Lakshminarasimhan; Stolfo, Salvatore; Keromytis, Angelos D.; Yang, Junfeng; August, David 2011 Articles Computer science
38. The Semantics and Execution of a Synchronous Block-Diagram Language Edwards, Stephen A.; Lee, Edward A. 2003 Articles Computer science
39. The Security of Elastic Block Ciphers Against Key-Recovery Attacks Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2007 Articles Computer science
40. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce 1997 Articles Computer science
42. The Pyramid Method: Incorporating human content selection variation in summarization evaluation. Nenkova, Ani; Passonneau, Rebecca; McKeown, Kathleen 2007 Articles Computer science
44. The Price of Safety in an Active Network Alexander, D. Scott; Menage, Paul B.; Keromytis, Angelos D.; Arbaugh, William A.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2001 Articles Computer science
45. The Monte Carlo Algorithm With a Pseudorandom Generator Traub, Joseph F.; Wozniakowski, Henryk 1992 Articles Computer science
46. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
48. The Efficient Dual Receiver Cryptosystem and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2011 Articles Computer science
49. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet Kamra, Abhinav; Feng, Hanhua; Misra, Vishal; Keromytis, Angelos D. 2005 Articles Computer science
50. The Dual Receiver Cryptogram and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2004 Articles Computer science