dblp.uni-trier.dewww.uni-trier.de

Kostas G. Anagnostakis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
36EEElias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos: Antisocial Networks: Turning a Social Network into a Botnet. ISC 2008: 146-160
35EESpyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis: Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
2007
34EEElias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos: GAS: Overloading a File Sharing Network as an Anonymizing System. IWSEC 2007: 365-379
33EEMichalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos: Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. RAID 2007: 87-106
32EESpyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis: Defending against hitlist worms using network address space randomization. Computer Networks 51(12): 3471-3490 (2007)
31EEKostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis: COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Int. J. Inf. Sec. 6(6): 361-378 (2007)
30EEMichalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos: Network-level polymorphic shellcode detection using emulation. Journal in Computer Virology 2(4): 257-274 (2007)
2006
29EEV. T. Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis: Puppetnets: misusing web browsers as a distributed attack infrastructure. ACM Conference on Computer and Communications Security 2006: 221-234
28EEElias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos: Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. ACNS 2006: 130-145
27EESpyros Antonatos, Kostas G. Anagnostakis: TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. Communications and Multimedia Security 2006: 12-21
26EED. Koukis, Spyros Antonatos, Kostas G. Anagnostakis: On the Privacy Risks of Publishing Anonymized IP Network Traces. Communications and Multimedia Security 2006: 22-32
25EEMichalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos: Network-Level Polymorphic Shellcode Detection Using Emulation. DIMVA 2006: 54-73
24EEKostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald: Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. ISC 2006: 427-442
23EEKostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, D. Li, Jonathan M. Smith: Flexible network monitoring with FLAME. Computer Networks 50(14): 2548-2563 (2006)
22EEKonstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos: An Active Splitter Architecture for Intrusion Detection and Prevention. IEEE Trans. Dependable Sec. Comput. 3(1): 31-44 (2006)
2005
21 Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos: Design and Implementation of a High-Performance Network Intrusion Prevention System. SEC 2005: 359-374
20 Periklis Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis: STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. SEC 2005: 375-392
19 Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos: Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC 2005: 393-408
18EESpyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis: Defending against hitlist worms using network address space randomization. WORM 2005: 30-40
2004
17EEKostas G. Anagnostakis, Michael Greenwald: Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing. ICDCS 2004: 524-533
16EEMichalis Polychronakis, Evangelos P. Markatos, Kostas G. Anagnostakis, Arne Øslebø: Design of an application programming interface for IP network monitoring. NOMS (1) 2004: 483-496
15EESpyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis: Performance Analysis of Content Matching Intrusion Detection Systems. SAINT 2004: 208-218
14EEKostas G. Anagnostakis, Michael Greenwald: A hybrid direct-indirect estimator of network internal delays. SIGMETRICS 2004: 426-427
13EESpyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos: Generating realistic workloads for network intrusion detection systems. WOSP 2004: 207-215
2003
12EEKostas G. Anagnostakis, Michael Greenwald, Raphael S. Ryger: cing: Measuring Network-Internal Delays using only Existing Infrastructure. INFOCOM 2003
11EEIoannis Charitakis, Kostas G. Anagnostakis, Evangelos P. Markatos: An Active Traffic Splitter Architecture for Intrusion Detection. MASCOTS 2003: 238-241
10EEIoannis Charitakis, Dionisios N. Pnevmatikatos, Evangelos P. Markatos, Kostas G. Anagnostakis: Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. SCOPES 2003: 226-239
9 Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis: E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. SEC 2003: 217-228
2002
8EEKostas G. Anagnostakis, Michael Greenwald, Sotiris Ioannidis, Stefan Miltchev: Open Packet Monitoring on FLAME: Safety, Performance, and Applications. IWAN 2002: 120-131
7EEKostas G. Anagnostakis, Michael Greenwald, Raphael S. Ryger: On the Sensitivity of Network Simulation to Topology. MASCOTS 2002: 117-
6EEKostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Michael Greenwald, Jonathan M. Smith, John Ioannidis: Efficient packet monitoring for network management. NOMS 2002: 423-436
5 Kostas G. Anagnostakis, Michael Greenwald: Direct measurement vs. indirect inference for determining network-internal delays. Perform. Eval. 49(1/4): 165-177 (2002)
2001
4EEKostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Jonathan M. Smith: Practical Network Applications on a Lightweight Active Management Environment. IWAN 2001: 101-115
3EEAthanasios V. Vasilakos, Kostas G. Anagnostakis, Witold Pedrycz: Application of computational intelligence techniques in active networks. SAC 2001: 448-455
2EEAthanasios V. Vasilakos, Kostas G. Anagnostakis, Witold Pedrycz: Application of computational intelligence techniques in active networks. Soft Comput. 5(4): 264-271 (2001)
2000
1EEKostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Scalable Resource Control in Active Networks. IWAN 2000: 343-357

Coauthor Index

1Periklis Akritidis [18] [19] [20] [29] [32] [35]
2Spyros Antonatos [9] [13] [15] [18] [19] [22] [26] [27] [29] [32] [35] [36]
3Demetres Antoniades [36]
4Elias Athanasopoulos [28] [34] [36]
5Ioannis Charitakis [10] [11] [22]
6Michael B. Greenwald (Michael Greenwald) [5] [6] [7] [8] [12] [14] [17] [23] [24] [31]
7Michael W. Hicks (Michael Hicks) [1]
8John Ioannidis [6]
9Sotiris Ioannidis [1] [4] [6] [8] [23] [24] [31] [36]
10Angelos D. Keromytis [1] [24] [31]
11D. Koukis [26]
12V. T. Lam [29]
13Vinh The Lam [35]
14D. Li [23]
15A. Makridakis [36]
16Evangelos P. Markatos [9] [10] [11] [13] [15] [16] [18] [19] [20] [21] [22] [25] [28] [30] [32] [33] [34] [36]
17Stefan Miltchev [4] [6] [8]
18Arne Øslebø [16]
19Witold Pedrycz [2] [3]
20Dionisios N. Pnevmatikatos [10]
21Michalis Polychronakis [9] [15] [16] [19] [20] [25] [30] [33]
22Mema Roussopoulos [34]
23Raphael S. Ryger [7] [12]
24Jonathan M. Smith [1] [4] [6] [23]
25Athanasios V. Vasilakos [2] [3]
26Konstantinos Xinidis [21] [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)