dblp.uni-trier.dewww.uni-trier.de

Spyros Antonatos Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
16EEGiorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis: Regular Expression Matching on Graphics Hardware for Intrusion Detection. RAID 2009: 265-283
2008
15 Spyros Antonatos, Michele Bezzi, Elisa Boschi, Brian Trammell, William Yurcik: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
14EEElias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos: Antisocial Networks: Turning a Social Network into a Botnet. ISC 2008: 146-160
13EEGiorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis: Gnort: High Performance Network Intrusion Detection Using Graphics Processors. RAID 2008: 116-134
12EESpyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis: Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
2007
11EESpyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis: Defending against hitlist worms using network address space randomization. Computer Networks 51(12): 3471-3490 (2007)
2006
10EEV. T. Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis: Puppetnets: misusing web browsers as a distributed attack infrastructure. ACM Conference on Computer and Communications Security 2006: 221-234
9EESpyros Antonatos, Kostas G. Anagnostakis: TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. Communications and Multimedia Security 2006: 12-21
8EED. Koukis, Spyros Antonatos, Kostas G. Anagnostakis: On the Privacy Risks of Publishing Anonymized IP Network Traces. Communications and Multimedia Security 2006: 22-32
7EEElias Athanasopoulos, Spyros Antonatos: Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. Communications and Multimedia Security 2006: 97-108
6EEKonstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos: An Active Splitter Architecture for Intrusion Detection and Prevention. IEEE Trans. Dependable Sec. Comput. 3(1): 31-44 (2006)
2005
5 Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos: Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC 2005: 393-408
4EESpyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis: Defending against hitlist worms using network address space randomization. WORM 2005: 30-40
2004
3EESpyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis: Performance Analysis of Content Matching Intrusion Detection Systems. SAINT 2004: 208-218
2EESpyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos: Generating realistic workloads for network intrusion detection systems. WOSP 2004: 207-215
2003
1 Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis: E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. SEC 2003: 217-228

Coauthor Index

1Periklis Akritidis [4] [5] [10] [11] [12]
2Kostas G. Anagnostakis [1] [2] [3] [4] [5] [6] [8] [9] [10] [11] [12] [14]
3Demetres Antoniades [14]
4Elias Athanasopoulos [7] [14]
5Michele Bezzi [15]
6Elisa Boschi [15]
7Ioannis Charitakis [6]
8Sotiris Ioannidis [13] [14] [16]
9D. Koukis [8]
10V. T. Lam [10]
11Vinh The Lam [12]
12A. Makridakis [14]
13Evangelos P. Markatos [1] [2] [3] [4] [5] [6] [11] [13] [14] [16]
14Michalis Polychronakis [1] [3] [5] [13] [16]
15Brian Trammell [15]
16Giorgos Vasiliadis [13] [16]
17Konstantinos Xinidis [6]
18William Yurcik [15]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)