Angelos D. Keromytis
ЗаглавиеПозоваванияГодина
KeyNote: Trust management for public-key infrastructures
M Blaze, J Feigenbaum, A Keromytis
Security Protocols, 59-63, 1999
9061999
The KeyNote trust-management system, version 2
M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis
Request for Comments (RFC) 2704, 1999
896*1999
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communications …, 2000
8152000
Countering code-injection attacks with instruction-set randomization
GS Kc, AD Keromytis, V Prevelakis
Proceedings of the 10th ACM conference on Computer and communications …, 2003
7972003
The role of trust management in distributed systems security
M Blaze, J Feigenbaum, J Ioannidis, A Keromytis
Secure Internet Programming, 185-210, 1999
753*1999
SOS: Secure Overlay Services
AD Keromytis, V Misra, D Rubenstein
ACM SIGCOMM Computer Communication Review 32 (4), 61-72, 2002
7382002
SQLrand: Preventing SQL injection attacks
S Boyd, A Keromytis
Applied Cryptography and Network Security, 292-302, 2004
5252004
The SwitchWare active network architecture
DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ...
Network, IEEE 12 (3), 29-36, 1998
4991998
Secure and Reliable Bootstrap Architecture
W Arbaugh, D Farber, A Keromytis, S Jonathan
US Patent 6,185,678, 2001
3732001
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
V Pappas, M Polychronakis, AD Keromytis
2012 IEEE Symposium on Security and Privacy, 601-615, 2012
3392012
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
3352013
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing
V Pappas, M Polychronakis, AD Keromytis
USENIX Security, 447-462, 2013
2912013
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,009,829, 2015
2872015
Active network encapsulation protocol (ANEP)
DS Alexander, B Braden, CA Gunter, AW Jackson, AD Keromytis, ...
URL http://www. cis. upenn. edu/switchware/ANEP/docs/ANEP. txt, 1997
284*1997
Detecting targeted attacks using shadow honeypots
KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ...
Proceedings of the 14th USENIX security symposium 144, 2005
2802005
Systems and methods for detecting and inhibiting attacks using honeypots
S Sidiroglou, AD Keromytis, KG Anagnostakis
US Patent 7,904,959, 2011
2722011
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh
US Patent 7,779,463, 2010
2592010
SOS: An architecture for mitigating DDoS attacks
AD Keromytis, V Misra, D Rubenstein
Selected Areas in Communications, IEEE Journal on 22 (1), 176-188, 2004
2582004
Systems, methods, and media for detecting network anomalies using a trained probabilistic model
Y Song, AD Keromytis, SJ Stolfo
US Patent 8,844,033, 2014
2542014
Fog computing: Mitigating insider data theft attacks in the cloud
SJ Stolfo, MB Salem, AD Keromytis
2012 IEEE symposium on security and privacy workshops, 125-128, 2012
2472012
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20