Sotiris Ioannidis
Sotiris Ioannidis
Technical University of Crete and Foundation for Research and Technology - Hellas
Потвърден имейл адрес: - Начална страница
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communications …, 2000
Gnort: High performance network intrusion detection using graphics processors
G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 116-134, 2008
A new wireless communication paradigm through software-controlled metasurfaces
C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz
IEEE Communications Magazine 56 (9), 162-169, 2018
Rage against the Virtual Machine: Hindering Dynamic Analysis of Android Malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the Seventh European Workshop on System Security (EuroSec), 6, 2014
Regular expression matching on graphics hardware for intrusion detection
G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 265-283, 2009
MIDeA: a multi-parallel intrusion detection architecture
G Vasiliadis, M Polychronakis, S Ioannidis
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Detecting social network profile cloning
G Kontaxis, I Polakis, S Ioannidis, EP Markatos
2011 IEEE international conference on pervasive computing and communications …, 2011
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
Sub-operating systems: A new approach to application security
S Ioannidis, SM Bellovin, JM Smith
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 108-115, 2002
Efficient packet monitoring for network management
KG Anagnostakis, S Ioannidis, S Miltchev, M Greenwald, JM Smith, ...
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
A cooperative immunization system for an untrusting internet
KG Anagnostakis, MB Greenwald, S Ioannidis, AD Keromytis, D Li
The 11th IEEE International Conference on Networks (ICON), 403-408, 2003
Gravity: a massively parallel antivirus engine
G Vasiliadis, S Ioannidis
International Workshop on Recent Advances in Intrusion Detection, 79-96, 2010
A study of the relative costs of network security protocols
S Miltchev, S Ioannidis, AD Keromytis
USENIX Annual Technical Conference (ATC), Freenix Track, 41-48, 2002
Fileteller: Paying and getting paid for file storage
J Ioannidis, S Ioannidis, AD Keromytis, V Prevelakis
International Conference on Financial Cryptography, 282-299, 2002
HCFI: Hardware-enforced Control Flow Integrity
N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis
6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
Two-factor authentication: is the world ready? Quantifying 2FA adoption
T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis
Proceedings of the eighth european workshop on system security, 1-7, 2015
Censmon: A web censorship monitor
A Sfakianakis, E Athanasopoulos, S Ioannidis
USENIX Workshop on Free and Open Communication on the Internet (FOCI), 2, 2011
The STRONGMAN architecture
AD Keromytis, S Ioannidis, MB Greenwald, JM Smith
DARPA Information Survivability Conference and Exposition (DISCEX) 1, 178-188, 2003
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20