1. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
2. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
4. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
5. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks Stavrou, Angelos; Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
6. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
7. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
8. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
9. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
10. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
11. View planning for automated site modeling Blaer, Paul S.; Allen, Peter K. 2006 Articles Computer science
12. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
13. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
14. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
15. Using Program Specialization to Speed SystemC Fixed-Point Simulation Edwards, Stephen A. 2006 Articles Computer science
16. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
17. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
18. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
19. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
20. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
21. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
23. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
24. Tutorial: Compiling Concurrent Languages for Sequential Processors Edwards, Stephen A. 2003 Articles Computer science
25. Trust Management for IPsec Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
26. Translating Collocations for Bilingual Lexicons: A Statistical Approach McKeown, Kathleen; Smadja, Frank; Hatzivassiloglou, Vasileios 1996 Articles Computer science
27. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host Gleitz, Peter M.; Bellovin, Steven Michael 2001 Articles Computer science
28. Transforming Cyclic Circuits Into Acyclic Equivalents Neiroukh, Osama; Edwards, Stephen A.; Song, Xiaoyu 2008 Articles Computer science
29. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
30. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
31. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
32. Towards a Forensic Analysis for Multimedia Communication Services Geneiatakis, Dimitris; Keromytis, Angelos D. 2011 Articles Computer science
33. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
34. Three-dimensional interface modelling with two-dimensional seismic data: the Alpine crust–mantle boundary Waldhauser, Felix; Kissling, Edi; Ansorge, Jörg; Mueller, St. 1998 Articles Plate tectonicsComputer science
35. The Use of yig-cha and chos-kyi-rnam-grangs in Computing Lexical Cohesion for Tibetan Topic Boundary Detection Hackett, Paul G. 2010 Articles Computer science
36. The Synchronous Languages 12 Years Later Edwards, Stephen A.; Albert, Benveniste; Caspi, Paul; Halbwachs, Nicolas; Le Guernic, Paul; De Simone, Robert 2003 Articles Computer science
37. The SwitchWare Active Network Architecture Alexander, D. Scott; Arbaugh, William A.; Hicks, Michael W.; Kakkar, Pankaj; Keromytis, Angelos D.; Moore, Jonathan T.; Gunter, Carl A.; Nettles, Scott M.; Smith, Jonathan M. 1998 Articles Computer science
38. The STRONGMAN Architecture Keromytis, Angelos D.; Ioannidis, Sotiris; Greenwald, Michael B.; Smith, Jonathan M. 2003 Articles Computer science
39. The SPARCHS Project: Hardware Support for Software Security Sethumadhavan, Lakshminarasimhan; Stolfo, Salvatore; Keromytis, Angelos D.; Yang, Junfeng; August, David 2011 Articles Computer science
41. The Semantics and Execution of a Synchronous Block-Diagram Language Edwards, Stephen A.; Lee, Edward A. 2003 Articles Computer science
42. The Security of Elastic Block Ciphers Against Key-Recovery Attacks Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2007 Articles Computer science
43. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce 1997 Articles Computer science
45. The Pyramid Method: Incorporating human content selection variation in summarization evaluation. Nenkova, Ani; Passonneau, Rebecca; McKeown, Kathleen 2007 Articles Computer science
47. The Price of Safety in an Active Network Alexander, D. Scott; Menage, Paul B.; Keromytis, Angelos D.; Arbaugh, William A.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2001 Articles Computer science
48. The Monte Carlo Algorithm With a Pseudorandom Generator Traub, Joseph F.; Wozniakowski, Henryk 1992 Articles Computer science
49. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
51. The folded k-spectrum kernel: A machine learning approach to detecting transcription factor binding sites with gapped nucleotide dependencies Elmas, Abdulkadir; Wang, Xiaodong; Dresch, Jacqueline M. 2017 Articles Machine learningNucleotide sequence--Data processingElectrical engineeringComputer science
52. The Efficient Dual Receiver Cryptosystem and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2011 Articles Computer science
53. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet Kamra, Abhinav; Feng, Hanhua; Misra, Vishal; Keromytis, Angelos D. 2005 Articles Computer science
54. The Dual Receiver Cryptogram and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2004 Articles Computer science
55. The Design of the OpenBSD Cryptographic Framework Keromytis, Angelos D.; Wright, Jason L.; Raadt, Theo de 2003 Articles Computer science
56. The Challenges of Synthesizing Hardware from C-Like Languages Edwards, Stephen A. 2006 Articles Computer science
57. The Challenges of Hardware Synthesis from C-like Languages Edwards, Stephen A. 2004 Articles Computer science
58. The Challenge of Spoken Language Systems: Research Directions for the Nineties McKeown, Kathleen; Cole, Ron; Hirschman, Lynette; Atlas, Les; Beckman, Mary; Biermann, Alan; Bush, Marcia; Clements, Mark; Cohen, Jordan; Garcia, Oscar; Hanson, Brian; Hermansky, Hynek; Levinson, Steve; Morgan, Nelson; Novick, David G.; Ostendorf, Mari; Oviatt, Sharon; Price, Patti; Silverman, Harvey; Spitz, Judy; Waibel, Alex; Weinstein, Clifford; Zahorian, Steve; Zue, Victor 1995 Articles Computer science
59. The Challenge of Hardware Synthesis from C-like Languages Edwards, Stephen A. 2005 Articles Computer science
60. The Case for the Precision Timed (PRET) Machine Edwards, Stephen A.; Lee, Edward A. 2007 Articles Computer science
61. The Case for the Precision Timed (PRET) Machine Edwards, Stephen A.; Lee, Edward A. 2006 Articles Computer science
62. The Case for Crypto Protocol Awareness Inside the OS Kernel Burnside, Matthew Spindel; Keromytis, Angelos D. 2005 Articles Computer science
63. The Bandwidth Exchange Architecture Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2005 Articles Computer science
64. Text-based approaches for non-topical image categorization Sable, Carl L.; Hatzivassiloglou, Vasileios 2000 Articles Computer scienceInformation technology
65. TAPI: Transactions for Accessing Public Infrastructure Blaze, Matt; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Nikander, Pekka; Prevelakis, Vassilis 2003 Articles Computer science
66. Taming the Devil: Techniques for Evaluating Anonymized Network Data Coull, Scott E.; Wright, Charles V.; Keromytis, Angelos D.; Monrose, Fabian; Reiter, Michael K. 2008 Articles Computer science
67. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
68. Tagging Data In The Network Stack: mbuf tags Keromytis, Angelos D. 2003 Articles Computer science
69. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
70. Synthesis of High-Performance Packet Processing Pipelines Soviani, Cristian; Hadzic, Ilija; Edwards, Stephen A. 2006 Articles Computer science
71. Synthesis and Optimization of Pipelined Packet Processors Soviani, Cristian; Hadzic, Ilija; Edwards, Stephen A. 2009 Articles Computer science
72. Syntactic Simplification and Text Cohesion Siddharthan, Advaith 2006 Articles Computer scienceLinguistics
73. Symposium on Advances in Ocean Observation Rajan, Kanna; Alvera-Azcárate, Aida; Eidsvik, Jo; Subramaniam, Ajit 2023 Articles OceanographyOceanography--ObservationsRoboticsComputer science
74. Surveillance Detection in High Bandwidth Environments Robertson, Seth; Siegel, Eric V.; Miller, Matt; Stolfo, Salvatore 2003 Articles Computer science
75. Sub-Operating Systems: A New Approach to Application Security Ioannidis, Sotiris; Bellovin, Steven Michael; Smith, Jonathan M. 2002 Articles Computer science
76. Subgroup Detection in Ideological Discussions Abu-Jbara, Amjad; Dasigi, Pradeep; Diab, Mona; Radev, Dragomir R. 2012 Articles Computer scienceLinguistics
77. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
78. Static Elaboration of Recursion for Concurrent Software Edwards, Stephen A.; Zeng, Jia 2008 Articles Computer science
79. Static Deadlock Detection for the SHIM Concurrent Language Vasudevan, Nalini; Edwards, Stephen A. 2008 Articles Computer science
80. SSARES: Secure Searchable Automated Remote Email Storage Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D. 2007 Articles Computer science
81. SQLrand: Preventing SQL Injection Attacks Boyd, Stephen W.; Keromytis, Angelos D. 2004 Articles Computer science
82. Speculative Virtual Verification: Policy-Constrained Speculative Execution Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
83. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
84. Spamming, Phishing, Authentication, and Privacy Bellovin, Steven Michael 2004 Articles Computer science
85. SOS: An Architecture for Mitigating DDoS Attacks Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
86. Software Self-Healing Using Collaborative Application Communities Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
87. Software-based Decoy System for Insider Threats Park, Younghee; Stolfo, Salvatore 2012 Articles Computer science
88. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
89. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
90. Simple and Fast Biased Locks Vasudevan, Nalini; Namjoshi, Kedar S.; Edwards, Stephen A. 2010 Articles Computer science
91. SHIM: A Language for Hardware/Software Integration Edwards, Stephen A. 2004 Articles Computer science
92. SHIM: A Deterministic Model for Heterogeneous Embedded Systems Edwards, Stephen A.; Tardieu, Olivier 2006 Articles Computer science
93. SHIM: A Deterministic Model for Heterogeneous Embedded Systems Edwards, Stephen A.; Tardieu, Olivier 2005 Articles Computer science
94. Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Polychronakis, Michalis; Keromytis, Angelos D.; Markatos, Evangelos P. 2010 Articles Computer science
95. {sets} -- A lightweight constraint programming language based on ROBDDs Cohen, Haim; Edwards, Stephen A. 2007 Articles Computer science
97. Separate Compilation for Synchronous Modules Zeng, Jia; Edwards, Stephen A. 2005 Articles Computer science
98. Sentence Fusion for Multidocument News Summarization McKeown, Kathleen; Barzilay, Regina 2005 Articles Computer science
99. Sentence Fusion for Multidocument News Summarization Barzilay, Regina; McKeown, Kathleen; Elhadad, Noemie 2002 Articles Computer science
100. Semi-automated Color Segmentation of Anatomical Tissue Imielinska, Celina Z.; Downes, M. S.; Yuan, W. 2000 Articles Diagnostic imagingBioinformaticsComputer science