Sotiris Ioannidis
Sotiris Ioannidis
Technical University of Crete and Foundation for Research and Technology - Hellas
Email verificata su ece.tuc.gr - Home page
Titolo
Citata da
Citata da
Anno
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communicationsá…, 2000
8422000
Gnort: High performance network intrusion detection using graphics processors
G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 116-134, 2008
4172008
A new wireless communication paradigm through software-controlled metasurfaces
C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz
IEEE Communications Magazine 56 (9), 162-169, 2018
2532018
Rage against the Virtual Machine: Hindering Dynamic Analysis of Android Malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the Seventh European Workshop on System Security (EuroSec), 6, 2014
2172014
Regular expression matching on graphics hardware for intrusion detection
G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 265-283, 2009
1692009
MIDeA: a multi-parallel intrusion detection architecture
G Vasiliadis, M Polychronakis, S Ioannidis
Proceedings of the 18th ACM conference on Computer and communicationsá…, 2011
1462011
Detecting social network profile cloning
G Kontaxis, I Polakis, S Ioannidis, EP Markatos
2011 IEEE international conference on pervasive computing and communicationsá…, 2011
1312011
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
1242011
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
1042015
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
1022008
A cooperative immunization system for an untrusting internet
KG Anagnostakis, MB Greenwald, S Ioannidis, AD Keromytis, D Li
The 11th IEEE International Conference on Networks (ICON), 403-408, 2003
912003
Sub-operating systems: A new approach to application security
S Ioannidis, SM Bellovin, JM Smith
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 108-115, 2002
912002
Efficient packet monitoring for network management
KG Anagnostakis, S Ioannidis, S Miltchev, M Greenwald, JM Smith, ...
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Managementá…, 2002
902002
Gravity: a massively parallel antivirus engine
G Vasiliadis, S Ioannidis
International Workshop on Recent Advances in Intrusion Detection, 79-96, 2010
872010
A study of the relative costs of network security protocols
S Miltchev, S Ioannidis, AD Keromytis
USENIX Annual Technical Conference (ATC), Freenix Track, 41-48, 2002
872002
Fileteller: Paying and getting paid for file storage
J Ioannidis, S Ioannidis, AD Keromytis, V Prevelakis
International Conference on Financial Cryptography, 282-299, 2002
842002
HCFI: Hardware-enforced Control Flow Integrity
N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis
6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
702016
The STRONGMAN architecture
AD Keromytis, S Ioannidis, MB Greenwald, JM Smith
DARPA Information Survivability Conference and Exposition (DISCEX) 1, 178-188, 2003
702003
AndRadar: Fast Discovery of Android Applications in Alternative Markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
11th Conference on Detection of Intrusions and Malware & Vulnerabilityá…, 2014
672014
Two-factor authentication: is the world ready? Quantifying 2FA adoption
T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis
Proceedings of the eighth european workshop on system security, 1-7, 2015
662015
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20