Demetris Antoniades
Demetris Antoniades
Head of R&D, Software Division, CyRIC
Email verificata su cs.ucy.ac.cy
TitoloCitata daAnno
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World wide web, 715-724, 2011
1162011
One-click hosting services: a file-sharing hideout
D Antoniades, EP Markatos, C Dovrolis
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 223-234, 2009
982009
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
962008
A generic anonymization framework for network traffic
D Koukis, S Antonatos, D Antoniades, EP Markatos, P Trimintzios
2006 IEEE International Conference on Communications 5, 2302-2309, 2006
832006
Available bandwidth measurement as simple as running wget
D Antoniades, M Athanatos, A Papadogiannakis, EP Markatos, C Dovrolis
Proc. of Passive and Active Measurement Conference (PAM 2006), 61-70, 2006
822006
Appmon: An application for accurate per application network traffic characterization
D Antoniades, M Polychronakis, S Antonatos, EP Markatos, S Ubik, ...
In IST Broadband Europe 2006 Conference, 2006
422006
Co-evolutionary dynamics in social networks: A case study of Twitter
D Antoniades, C Dovrolis
Computational Social Networks 2 (1), 14, 2015
372015
Understanding the behavior of malicious applications in social networks
A Makridakis, E Athanasopoulos, S Antonatos, D Antoniades, S Ioannidis, ...
IEEE network 24 (5), 14-19, 2010
342010
Improving the performance of passive network monitoring applications with memory locality enhancements
A Papadogiannakis, G Vasiliadis, D Antoniades, M Polychronakis, ...
Computer Communications 35 (1), 129-140, 2012
232012
Flexible and high-performance anonymization of NetFlow records using anontool
M Foukarakis, D Antoniades, S Antonatos, EP Markatos
2007 Third International Conference on Security and Privacy in …, 2007
232007
Identification of Key Locations based on Online Social Network Activity
H Efstathiades, D Antoniades, G Pallis, MD Dikaiakos
Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015
202015
Deep packet anonymization
M Foukarakis, D Antoniades, M Polychronakis
Proceedings of the Second European Workshop on System Security, 16-21, 2009
192009
LOBSTER: a European platform for passive network traffic monitoring
D Antoniades, P Trimintzios, M Polychronakis, S Ubik, ...
Proceedings of the 4th International Conference on Testbeds and research …, 2008
162008
Improving the performance of passive network monitoring applications using locality buffering
A Papadogiannakis, D Antoniades, M Polychronakis, EP Markatos
2007 15th International Symposium on Modeling, Analysis, and Simulation of …, 2007
152007
Estimating and Forecasting Network Traffic Performance based on Statistical Patterns Observed in SNMP data.
K Hu, A Sim, D Antoniades, C Dovrolis
methods 3, 4, 0
15*
An empirical study on the security of cross-domain policies in rich Internet applications
G Kontaxis, D Antoniades, I Polakis, EP Markatos
Proceedings of the Fourth European Workshop on System Security, 7, 2011
132011
On the anonymization and deanonymization of netflow traffic
M Foukarakis, D Antoniades, S Antonatos, EP Markatos
Proc. of FloCon, 2008
112008
On the integration of passive and active network monitoring in grid systems
S Andreozzi, A Ciuffoletti, A Ghiselli, D Antoniades, M Polychronakis, ...
Integrated Research in GRID Computing, 147-161, 2007
102007
Issues about the integration of passive and active monitoring for grid networks
S Andreozzi, D Antoniades, A Ciuffoletti, A Ghiselli, EP Markatos, ...
CoreGRID workshop “Integrated research in Grid Computing”, 277, 2005
102005
Designing malicious applications in social networks
A Makridakis, E Athanasopoulos, S Antonatos, D Antoniades, S Ioannidis, ...
IEEE Network Special Issue on Online Social Networks, 2010
82010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20