1. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
2. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
4. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
5. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks Stavrou, Angelos; Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
6. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
7. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
8. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
9. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
10. Visual servoing by partitioning degrees of freedom Oh, Paul Y.; Allen, Peter K. 2001 Articles Robotics
11. Visual servoed micropositioning for protein manipulation tasks Mezouar, Youcef; Allen, Peter K. 2002 Articles Nanotechnology
12. Visually-guided protein crystal manipulation using micromachined silicon tools Georgiev, Atanas; Allen, Peter K.; Edstrom, William 2004 Articles Nanotechnology
13. Visual control of grasping and manipulation tasks Yoshimi, Billibon; Allen, Peter K. 1994 Articles Robotics
14. Vision for mobile robot localization in urban environments Georgiev, Atanas; Allen, Peter K. 2002 Articles Robotics
15. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
16. View planning for automated site modeling Blaer, Paul S.; Allen, Peter K. 2006 Articles Computer science
17. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
18. Variational Calculations of the 2³S State of Helium Traub, Joseph F. 1958 Articles Helium ionsElectron configurationChemistry--Mathematical models
19. Variational Calculations of Energy and Fine Structure for the 2³P State of Helium Traub, Joseph F. 1959 Articles ChemistryNumerical calculations--Data processingMicrophysics
20. Variants in exons and in transcription factors affect gene expression in trans Kreimer, Anat; Pe'er, Itshack G. 2013 Articles Gene regulatory networksGene expressionGeneticsBiology--Classification
21. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
22. Using Tactile and Visual Sensing with a Robotic Hand Allen, Peter K.; Miller, Andrew T.; Oh, Paul Y.; Leibowitz, Brian S. 1997 Articles Robotics
23. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
24. Using Program Specialization to Speed SystemC Fixed-Point Simulation Edwards, Stephen A. 2006 Articles Computer science
25. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
26. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
27. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
28. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
29. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
30. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
32. Two Stage View Planning for Large-Scale Site Modeling Blaer, Paul S.; Allen, Peter K. 2007 Articles RoboticsArtificial intelligence
33. Two-stage robotic crystal mounting of protein crystals for X-ray data collection Georgiev, Atanas; Allen, Peter K. 2008 Articles Robotics
34. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
35. Tutorial: Compiling Concurrent Languages for Sequential Processors Edwards, Stephen A. 2003 Articles Computer science
36. Trust Management for IPsec Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
37. Translating Collocations for Bilingual Lexicons: A Statistical Approach McKeown, Kathleen; Smadja, Frank; Hatzivassiloglou, Vasileios 1996 Articles Computer science
38. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host Gleitz, Peter M.; Bellovin, Steven Michael 2001 Articles Computer science
39. Trajectory filtering and prediction for automated tracking and grasping of a moving object Allen, Peter K.; Timcenko, Aleksandar; Yoshimi, Billibon; Michelman, Paul 1992 Articles Robotics
40. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
41. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
42. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
43. Towards a Forensic Analysis for Multimedia Communication Services Geneiatakis, Dimitris; Keromytis, Angelos D. 2011 Articles Computer science
44. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
45. Topological mobile robot localization using fast vision techniques Blaer, Paul S.; Allen, Peter K. 2002 Articles Robotics
46. TopBot: Automated network topology detection with a mobile robot Blaer, Paul S.; Allen, Peter K. 2003 Articles Robotics
47. The time and place of European admixture in Ashkenazi Jewish history Xue, James; Lencz, Todd; Darvasi, Ariel; Pe'er, Itsik; Carmi, Shai 2017 Articles Gene flowGeneticsPopulation geneticsAshkenazimHistorical geography
48. The Synchronous Languages 12 Years Later Edwards, Stephen A.; Albert, Benveniste; Caspi, Paul; Halbwachs, Nicolas; Le Guernic, Paul; De Simone, Robert 2003 Articles Computer science
49. The SwitchWare Active Network Architecture Alexander, D. Scott; Arbaugh, William A.; Hicks, Michael W.; Kakkar, Pankaj; Keromytis, Angelos D.; Moore, Jonathan T.; Gunter, Carl A.; Nettles, Scott M.; Smith, Jonathan M. 1998 Articles Computer science
50. The STRONGMAN Architecture Keromytis, Angelos D.; Ioannidis, Sotiris; Greenwald, Michael B.; Smith, Jonathan M. 2003 Articles Computer science
51. The SPARCHS Project: Hardware Support for Software Security Sethumadhavan, Lakshminarasimhan; Stolfo, Salvatore; Keromytis, Angelos D.; Yang, Junfeng; August, David 2011 Articles Computer science
53. The Semantics and Execution of a Synchronous Block-Diagram Language Edwards, Stephen A.; Lee, Edward A. 2003 Articles Computer science
54. The Security of Elastic Block Ciphers Against Key-Recovery Attacks Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2007 Articles Computer science
55. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce 1997 Articles Computer science
57. The Pyramid Method: Incorporating human content selection variation in summarization evaluation. Nenkova, Ani; Passonneau, Rebecca; McKeown, Kathleen 2007 Articles Computer science
59. The Price of Safety in an Active Network Alexander, D. Scott; Menage, Paul B.; Keromytis, Angelos D.; Arbaugh, William A.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2001 Articles Computer science
60. The MVP sensor planning system for robotic vision tasks Tarabanis, Konstantinos; Tsai, Roger Y.; Allen, Peter K. 1995 Articles Robotics
61. The Monte Carlo Algorithm With a Pseudorandom Generator Traub, Joseph F.; Wozniakowski, Henryk 1992 Articles Computer science
62. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
63. The Impact of Comprehensive Case Management on HIV Client Outcomes Brennan-Ing, Mark; Seidel, Liz; Rodgers, Leslie; Ernst, Jerome; Wirth, Doug; Tietz, Daniel; Moretti, Antonio; Karpiak, Stephen E. 2016 Articles Hospitals--Case management servicesHIV infections--EpidemiologyHIV-positive persons--Care--Government policyEpidemiologyHealth services administrationMedical carePublic health
65. The Efficient Dual Receiver Cryptosystem and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2011 Articles Computer science
66. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet Kamra, Abhinav; Feng, Hanhua; Misra, Vishal; Keromytis, Angelos D. 2005 Articles Computer science
67. The Dual Receiver Cryptogram and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2004 Articles Computer science
68. The Design of the OpenBSD Cryptographic Framework Keromytis, Angelos D.; Wright, Jason L.; Raadt, Theo de 2003 Articles Computer science
69. The Columbia grasp database Goldfeder, Corey; Ciocarlie, Matei; Dang, Hao; Allen, Peter K. 2009 Articles RoboticsArtificial intelligence
70. The Challenges of Synthesizing Hardware from C-Like Languages Edwards, Stephen A. 2006 Articles Computer science
71. The Challenges of Hardware Synthesis from C-like Languages Edwards, Stephen A. 2004 Articles Computer science
72. The Challenge of Spoken Language Systems: Research Directions for the Nineties McKeown, Kathleen; Cole, Ron; Hirschman, Lynette; Atlas, Les; Beckman, Mary; Biermann, Alan; Bush, Marcia; Clements, Mark; Cohen, Jordan; Garcia, Oscar; Hanson, Brian; Hermansky, Hynek; Levinson, Steve; Morgan, Nelson; Novick, David G.; Ostendorf, Mari; Oviatt, Sharon; Price, Patti; Silverman, Harvey; Spitz, Judy; Waibel, Alex; Weinstein, Clifford; Zahorian, Steve; Zue, Victor 1995 Articles Computer science
73. The Challenge of Hardware Synthesis from C-like Languages Edwards, Stephen A. 2005 Articles Computer science
74. The Case for the Precision Timed (PRET) Machine Edwards, Stephen A.; Lee, Edward A. 2007 Articles Computer science
75. The Case for the Precision Timed (PRET) Machine Edwards, Stephen A.; Lee, Edward A. 2006 Articles Computer science
76. The Case for Crypto Protocol Awareness Inside the OS Kernel Burnside, Matthew Spindel; Keromytis, Angelos D. 2005 Articles Computer science
77. The Bandwidth Exchange Architecture Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2005 Articles Computer science
78. The Algebraic Theory of Matrix Polynomials Dennis Jr., J.E.; Traub, Joseph F.; Weber, R.P. 1976 Articles Computer science--MathematicsMatricesPolynomials--Computer programs
79. Text-based approaches for non-topical image categorization Sable, Carl L.; Hatzivassiloglou, Vasileios 2000 Articles Computer scienceInformation technology
80. TAPI: Transactions for Accessing Public Infrastructure Blaze, Matt; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Nikander, Pekka; Prevelakis, Vassilis 2003 Articles Computer science
81. Taming the Devil: Techniques for Evaluating Anonymized Network Data Coull, Scott E.; Wright, Charles V.; Keromytis, Angelos D.; Monrose, Fabian; Reiter, Michael K. 2008 Articles Computer science
82. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
83. Tagging Data In The Network Stack: mbuf tags Keromytis, Angelos D. 2003 Articles Computer science
84. System design of an Insertable Robotic Effector Platform for Single Port Access (SPA) Surgery Xu, Kai; Goldman, Roger Eric; Ding, Jienan; Allen, Peter K.; Fowler, Dennis L.; Simaan, Nabil 2009 Articles RoboticsSurgery
85. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
86. Synthesis of High-Performance Packet Processing Pipelines Soviani, Cristian; Hadzic, Ilija; Edwards, Stephen A. 2006 Articles Computer science
87. Synthesis and Optimization of Pipelined Packet Processors Soviani, Cristian; Hadzic, Ilija; Edwards, Stephen A. 2009 Articles Computer science
88. Syntactic Simplification and Text Cohesion Siddharthan, Advaith 2006 Articles Computer scienceLinguistics
89. Swept volumes and their use in viewpoint computation in robot work-cells Abrams, Steven; Allen, Peter K. 1995 Articles Robotics
90. Surveillance Detection in High Bandwidth Environments Robertson, Seth; Siegel, Eric V.; Miller, Matt; Stolfo, Salvatore 2003 Articles Computer science
91. Subregional Nowcasts of Seasonal Influenza Using Search Trends Kandula, Sasikiran; Shaman, Jeffrey L. 2017 Articles InfluenzaEpidemiology--Statistical methodsForecasting
92. Sub-Operating Systems: A New Approach to Application Security Ioannidis, Sotiris; Bellovin, Steven Michael; Smith, Jonathan M. 2002 Articles Computer science
93. Subgroup Detection in Ideological Discussions Abu-Jbara, Amjad; Dasigi, Pradeep; Diab, Mona; Radev, Dragomir R. 2012 Articles Computer scienceLinguistics
94. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
95. Statistical correction of the Winner’s Curse explains replication variability in quantitative trait genome-wide association studies Palmer, Cameron Douglas; Pe'er, Itshack G. 2017 Articles DNA replicationGenomes--Data processingHuman genetics--VariationGeneticsStatistics
96. Static Elaboration of Recursion for Concurrent Software Edwards, Stephen A.; Zeng, Jia 2008 Articles Computer science
97. Static Deadlock Detection for the SHIM Concurrent Language Vasudevan, Nalini; Edwards, Stephen A. 2008 Articles Computer science
98. SSARES: Secure Searchable Automated Remote Email Storage Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D. 2007 Articles Computer science
99. SQLrand: Preventing SQL Injection Attacks Boyd, Stephen W.; Keromytis, Angelos D. 2004 Articles Computer science
100. Speculative Virtual Verification: Policy-Constrained Speculative Execution Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science