2008 |
15 | | Spyros Antonatos,
Michele Bezzi,
Elisa Boschi,
Brian Trammell,
William Yurcik:
Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008
ACM 2008 |
14 | EE | Elias Athanasopoulos,
A. Makridakis,
Spyros Antonatos,
Demetres Antoniades,
Sotiris Ioannidis,
Kostas G. Anagnostakis,
Evangelos P. Markatos:
Antisocial Networks: Turning a Social Network into a Botnet.
ISC 2008: 146-160 |
13 | EE | Giorgos Vasiliadis,
Spyros Antonatos,
Michalis Polychronakis,
Evangelos P. Markatos,
Sotiris Ioannidis:
Gnort: High Performance Network Intrusion Detection Using Graphics Processors.
RAID 2008: 116-134 |
12 | EE | Spyros Antonatos,
Periklis Akritidis,
Vinh The Lam,
Kostas G. Anagnostakis:
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure.
ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
2007 |
11 | EE | Spyros Antonatos,
Periklis Akritidis,
Evangelos P. Markatos,
Kostas G. Anagnostakis:
Defending against hitlist worms using network address space randomization.
Computer Networks 51(12): 3471-3490 (2007) |
2006 |
10 | EE | V. T. Lam,
Spyros Antonatos,
Periklis Akritidis,
Kostas G. Anagnostakis:
Puppetnets: misusing web browsers as a distributed attack infrastructure.
ACM Conference on Computer and Communications Security 2006: 221-234 |
9 | EE | Spyros Antonatos,
Kostas G. Anagnostakis:
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.
Communications and Multimedia Security 2006: 12-21 |
8 | EE | D. Koukis,
Spyros Antonatos,
Kostas G. Anagnostakis:
On the Privacy Risks of Publishing Anonymized IP Network Traces.
Communications and Multimedia Security 2006: 22-32 |
7 | EE | Elias Athanasopoulos,
Spyros Antonatos:
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.
Communications and Multimedia Security 2006: 97-108 |
6 | EE | Konstantinos Xinidis,
Ioannis Charitakis,
Spyros Antonatos,
Kostas G. Anagnostakis,
Evangelos P. Markatos:
An Active Splitter Architecture for Intrusion Detection and Prevention.
IEEE Trans. Dependable Sec. Comput. 3(1): 31-44 (2006) |
2005 |
5 | | Spyros Antonatos,
Michalis Polychronakis,
Periklis Akritidis,
Kostas G. Anagnostakis,
Evangelos P. Markatos:
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
SEC 2005: 393-408 |
4 | EE | Spyros Antonatos,
Periklis Akritidis,
Evangelos P. Markatos,
Kostas G. Anagnostakis:
Defending against hitlist worms using network address space randomization.
WORM 2005: 30-40 |
2004 |
3 | EE | Spyros Antonatos,
Kostas G. Anagnostakis,
Evangelos P. Markatos,
Michalis Polychronakis:
Performance Analysis of Content Matching Intrusion Detection Systems.
SAINT 2004: 208-218 |
2 | EE | Spyros Antonatos,
Kostas G. Anagnostakis,
Evangelos P. Markatos:
Generating realistic workloads for network intrusion detection systems.
WOSP 2004: 207-215 |
2003 |
1 | | Kostas G. Anagnostakis,
Spyros Antonatos,
Evangelos P. Markatos,
Michalis Polychronakis:
E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection.
SEC 2003: 217-228 |