1. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
3. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
4. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
5. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
6. An online learning approach to in-vivo tracking using synergistic features Reiter, Austin David; Allen, Peter K. 2010 Articles Robotics
7. A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Cui, Ang; Stolfo, Salvatore 2010 Articles Computer science
8. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
9. Automatic Attribution of Quoted Speech in Literary Narrative McKeown, Kathleen; Elson, David K. 2010 Presentations (Communicative Events) Computer science
10. Automatic Detection of Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science