Kostas Anagnostakis
Kostas Anagnostakis
Niometrics
Email verificata su tla.org
TitoloCitata daAnno
Paranoid Android: versatile protection for smartphones
G Portokalidis, P Homburg, K Anagnostakis, H Bos
Proceedings of the 26th annual computer security applications conference …, 2010
4492010
Detecting targeted attacks using shadow honeypots
KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ...
2742005
Systems and methods for detecting and inhibiting attacks using honeypots
S Sidiroglou, AD Keromytis, KG Anagnostakis
US Patent 7,904,959, 2011
2672011
Defending against hitlist worms using network address space randomization
S Antonatos, P Akritidis, EP Markatos, KG Anagnostakis
Computer Networks 51 (12), 3471-3490, 2007
2522007
Generating realistic workloads for network intrusion detection systems
S Antonatos, KG Anagnostakis, EP Markatos
ACM SIGSOFT Software Engineering Notes 29 (1), 207-215, 2004
2252004
Exchange-based incentive mechanisms for peer-to-peer file sharing
KG Anagnostakis, MB Greenwald
24th International Conference on Distributed Computing Systems, 2004 …, 2004
2012004
Network–Level polymorphic shellcode detection using emulation
M Polychronakis, KG Anagnostakis, EP Markatos
International Conference on Detection of Intrusions and Malware, and …, 2006
1502006
Emulation-based detection of non-self-contained polymorphic shellcode
M Polychronakis, KG Anagnostakis, EP Markatos
International Workshop on Recent Advances in Intrusion Detection, 87-106, 2007
1362007
E 2 xB: A Domain-Specific String Matching Algorithm for Intrusion Detection
KG Anagnostakis, S Antonatos, EP Markatos, M Polychronakis
IFIP International Information Security Conference, 217-228, 2003
1192003
cing: Measuring network-internal delays using only existing infrastructure
KG Anagnostakis, M Greenwald, RS Ryger
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
1192003
Stride: Polymorphic sled detection through instruction sequence analysis
P Akritidis, EP Markatos, M Polychronakis, K Anagnostakis
IFIP International Information Security Conference, 375-391, 2005
1172005
Exclusion-based signature matching for intrusion detection
EP Markatos, S Antonatos, M Polychronakis, KG Anagnostakis
Proceedings of the IASTED International Conference on Communications and …, 2002
1052002
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
972008
Comprehensive shellcode detection using runtime heuristics
M Polychronakis, KG Anagnostakis, EP Markatos
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
912010
A cooperative immunization system for an untrusting internet
KG Anagnostakis, MB Greenwald, S Ioannidis, AD Keromytis, D Li
The 11th IEEE International Conference on Networks, 2003. ICON2003., 403-408, 2003
912003
Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks
A Vasilakos, C Ricudis, K Anagnostakis, W Pedryca, A Pitsillides
1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World …, 1998
911998
Puppetnets: misusing web browsers as a distributed attack infrastructure
VT Lam, S Antonatos, P Akritidis, KG Anagnostakis
Proceedings of the 13th ACM conference on Computer and communications …, 2006
862006
Efficient packet monitoring for network management
KG Anagnostakis, S Ioannidis, S Miltchev, M Greenwald, JM Smith, ...
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
862002
Performance analysis of content matching intrusion detection systems
S Antonatos, KG Anagnostakis, EP Markatos, M Polychronakis
2004 International Symposium on Applications and the Internet. Proceedings …, 2004
812004
An active splitter architecture for intrusion detection and prevention
K Xinidis, I Charitakis, S Antonatos, KG Anagnostakis, EP Markatos
IEEE Transactions on Dependable and Secure Computing 3 (1), 31-44, 2006
782006
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20