Sotiris Ioannidis
TitleCited byYear
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Gnort: High performance network intrusion detection using graphics processors
G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 116-134, 2008
Rage against the Virtual Machine: Hindering Dynamic Analysis of Android Malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the Seventh European Workshop on System Security (EuroSec), 6, 2014
Regular expression matching on graphics hardware for intrusion detection
G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 265-283, 2009
MIDeA: a multi-parallel intrusion detection architecture
G Vasiliadis, M Polychronakis, S Ioannidis
Proceedings of the 18th ACM conference on Computer and communications …, 2011
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
Detecting social network profile cloning
G Kontaxis, I Polakis, S Ioannidis, EP Markatos
2011 IEEE international conference on pervasive computing and communications …, 2011
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
A cooperative immunization system for an untrusting internet
KG Anagnostakis, MB Greenwald, S Ioannidis, AD Keromytis, D Li
The 11th IEEE International Conference on Networks (ICON), 403-408, 2003
Sub-operating systems: A new approach to application security
S Ioannidis, SM Bellovin, JM Smith
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 108-115, 2002
Efficient packet monitoring for network management
KG Anagnostakis, S Ioannidis, S Miltchev, M Greenwald, JM Smith, ...
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
A study of the relative costs of network security protocols
S Miltchev, S Ioannidis, AD Keromytis
Fileteller: Paying and getting paid for file storage
J Ioannidis, S Ioannidis, AD Keromytis, V Prevelakis
International Conference on Financial Cryptography, 282-299, 2002
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Gravity: a massively parallel antivirus engine
G Vasiliadis, S Ioannidis
International Workshop on Recent Advances in Intrusion Detection, 79-96, 2010
The STRONGMAN architecture
AD Keromytis, S Ioannidis, MB Greenwald, JM Smith
DARPA Information Survivability Conference and Exposition (DISCEX) 1, 178-188, 2003
Censmon: A web censorship monitor
A Sfakianakis, E Athanasopoulos, S Ioannidis
Free and Open Communications on the Internet. USENIX, 113, 2011
A new wireless communication paradigm through software-controlled metasurfaces
C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz
IEEE Communications Magazine 56 (9), 162-169, 2018
Building a secure web browser
S Ioannidis, Bellovin
USENIX Annual Technical Conference, FREENIX Track, 127--134, 2001
AndRadar: Fast Discovery of Android Applications in Alternative Markets” Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwan
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
11th Conference on Detection of Intrusions and Malware & Vulnerability …, 0
The system can't perform the operation now. Try again later.
Articles 1–20