BibTeX records: Angelos Stavrou

download as .bib file

@article{DBLP:journals/jcs/ZhangWS24,
  author       = {Yubao Zhang and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {A multiview clustering framework for detecting deceptive reviews},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {31--52},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220001},
  doi          = {10.3233/JCS-220001},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhangWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FamiliSWP24,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  title        = {{OPTILOD:} Optimal Beacon Placement for High-Accuracy Indoor Localization
                  of Drones},
  journal      = {Sensors},
  volume       = {24},
  number       = {6},
  pages        = {1865},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24061865},
  doi          = {10.3390/S24061865},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FamiliSWP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RobieFS23,
  author       = {John Robie and
                  Alireza Famili and
                  Angelos Stavrou},
  title        = {Revisiting the Spaceborne Illuminators of Opportunity for Airborne
                  Object Tracking},
  journal      = {Computer},
  volume       = {56},
  number       = {1},
  pages        = {82--92},
  year         = {2023},
  url          = {https://doi.org/10.1109/MC.2022.3196190},
  doi          = {10.1109/MC.2022.3196190},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RobieFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/FamiliSWP23,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Park},
  title        = {iDROP: Robust Localization for Indoor Navigation of Drones With Optimized
                  Beacon Placement},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {16},
  pages        = {14226--14238},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3280084},
  doi          = {10.1109/JIOT.2023.3280084},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/FamiliSWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/FamiliASWP23,
  author       = {Alireza Famili and
                  Tolga O. Atalay and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Park},
  title        = {{OFDRA:} Optimal Femtocell Deployment for Accurate Indoor Positioning
                  of RIS-Mounted AVs},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {41},
  number       = {12},
  pages        = {3783--3798},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSAC.2023.3322821},
  doi          = {10.1109/JSAC.2023.3322821},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/FamiliASWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/FamiliSWP23,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Park},
  title        = {{PILOT:} High-Precision Indoor Localization for Autonomous Drones},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {5},
  pages        = {6445--6459},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3229628},
  doi          = {10.1109/TVT.2022.3229628},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/FamiliSWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AtalayFSS23,
  author       = {Tolga O. Atalay and
                  Alireza Famili and
                  Dragoslav Stojadinovic and
                  Angelos Stavrou},
  title        = {Demystifying 5G Traffic Patterns with an Indoor {RAN} Measurement
                  Campaign},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {1185--1190},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437330},
  doi          = {10.1109/GLOBECOM54140.2023.10437330},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/AtalayFSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LiuJ0ZLSW23,
  author       = {Guannan Liu and
                  Lin Jin and
                  Shuai Hao and
                  Yubao Zhang and
                  Daiping Liu and
                  Angelos Stavrou and
                  Haining Wang},
  editor       = {Marie{-}Jos{\'{e}} Montpetit and
                  Aris Leivadeas and
                  Steve Uhlig and
                  Mobin Javed},
  title        = {Dial "N" for NXDomain: The Scale, Origin, and Security Implications
                  of {DNS} Queries to Non-Existent Domains},
  booktitle    = {Proceedings of the 2023 {ACM} on Internet Measurement Conference,
                  {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023},
  pages        = {198--212},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3618257.3624805},
  doi          = {10.1145/3618257.3624805},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/LiuJ0ZLSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AtalayMSSW23,
  author       = {Tolga O. Atalay and
                  Sudip Maitra and
                  Dragoslav Stojadinovic and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps},
  booktitle    = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications,
                  New York City, NY, USA, May 17-20, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/INFOCOM53939.2023.10228961},
  doi          = {10.1109/INFOCOM53939.2023.10228961},
  timestamp    = {Tue, 05 Sep 2023 20:33:21 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/AtalayMSSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metacom/FamiliASW23,
  author       = {Alireza Famili and
                  Tolga O. Atalay and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router
                  Deployment in 6G Networks},
  booktitle    = {{IEEE} International Conference on Metaverse Computing, Networking
                  and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023},
  pages        = {17--24},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MetaCom57706.2023.00019},
  doi          = {10.1109/METACOM57706.2023.00019},
  timestamp    = {Thu, 21 Mar 2024 17:12:49 +0100},
  biburl       = {https://dblp.org/rec/conf/metacom/FamiliASW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/FamiliSLS23,
  author       = {Alireza Famili and
                  Vladyslav Slyusar and
                  Yun Ho Lee and
                  Angelos Stavrou},
  title        = {Vehicular Teamwork for Better Positioning},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2023, Honolulu, Oahu, HI, USA, October 1-4, 2023},
  pages        = {3507--3513},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SMC53992.2023.10393920},
  doi          = {10.1109/SMC53992.2023.10393920},
  timestamp    = {Tue, 13 Feb 2024 09:22:04 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/FamiliSLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/svcc/FamiliSWP23,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  title        = {{EGO-6:} Enhancing Geofencing Security Systems with Optimal Deployment
                  of 6G TRPs},
  booktitle    = {Silicon Valley Cybersecurity Conference, {SVCC} 2023, San Jose, CA,
                  USA, May 17-19, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SVCC56964.2023.10165032},
  doi          = {10.1109/SVCC56964.2023.10165032},
  timestamp    = {Mon, 10 Jul 2023 15:09:49 +0200},
  biburl       = {https://dblp.org/rec/conf/svcc/FamiliSWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/FamiliASW23,
  author       = {Alireza Famili and
                  Tolga O. Atalay and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor
                  Drone Navigation},
  booktitle    = {97th {IEEE} Vehicular Technology Conference, {VTC} Spring 2023, Florence,
                  Italy, June 20-23, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTC2023-Spring57618.2023.10201144},
  doi          = {10.1109/VTC2023-SPRING57618.2023.10201144},
  timestamp    = {Fri, 25 Aug 2023 08:20:01 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/FamiliASW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-04833,
  author       = {Tolga O. Atalay and
                  Dragoslav Stojadinovic and
                  Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation
                  of Control and User Planes},
  journal      = {CoRR},
  volume       = {abs/2312.04833},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.04833},
  doi          = {10.48550/ARXIV.2312.04833},
  eprinttype    = {arXiv},
  eprint       = {2312.04833},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-04833.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/GaoXWS22,
  author       = {Xing Gao and
                  Jidong Xiao and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {Understanding the Security Implication of Aborting Virtual Machine
                  Live Migration},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {2},
  pages        = {1275--1286},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.2982900},
  doi          = {10.1109/TCC.2020.2982900},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/GaoXWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangEZ0SL22,
  author       = {Yuqing Yang and
                  Mohamed Elsabagh and
                  Chaoshun Zuo and
                  Ryan Johnson and
                  Angelos Stavrou and
                  Zhiqiang Lin},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Detecting and Measuring Misconfigured Manifests in Android Apps},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3063--3077},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560607},
  doi          = {10.1145/3548606.3560607},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YangEZ0SL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AtalaySFSW22,
  author       = {Tolga O. Atalay and
                  Dragoslav Stojadinovic and
                  Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End
                  5G Testbed},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {2056--2061},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10001579},
  doi          = {10.1109/GLOBECOM48099.2022.10001579},
  timestamp    = {Tue, 17 Jan 2023 08:56:31 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/AtalaySFSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincom/FamiliFASW22,
  author       = {Alireza Famili and
                  Mahsa Foruhandeh and
                  Tolga O. Atalay and
                  Angelos Stavrou and
                  Haining Wang},
  editor       = {Igor M. Moraes and
                  Miguel Elias M. Campista and
                  Yacine Ghamri{-}Doudane and
                  Lu{\'{\i}}s Henrique M. K. Costa and
                  Marcelo G. Rubinstein},
  title        = {{GPS} Spoofing Detection by Leveraging 5G Positioning Capabilities},
  booktitle    = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022,
                  Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/LATINCOM56090.2022.10000569},
  doi          = {10.1109/LATINCOM56090.2022.10000569},
  timestamp    = {Mon, 09 Jan 2023 17:07:16 +0100},
  biburl       = {https://dblp.org/rec/conf/latincom/FamiliFASW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincom/FamiliSWP22,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  editor       = {Igor M. Moraes and
                  Miguel Elias M. Campista and
                  Yacine Ghamri{-}Doudane and
                  Lu{\'{\i}}s Henrique M. K. Costa and
                  Marcelo G. Rubinstein},
  title        = {{SPIN:} Sensor Placement for Indoor Navigation of Drones},
  booktitle    = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022,
                  Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/LATINCOM56090.2022.10000583},
  doi          = {10.1109/LATINCOM56090.2022.10000583},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincom/FamiliSWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DittmerILOEKSS22,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky and
                  Mohamed Elsabagh and
                  Nikolaos Kiourtis and
                  Brian Schulte and
                  Angelos Stavrou},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Streaming and Unbalanced {PSI} from Function Secret Sharing},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {564--587},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_25},
  doi          = {10.1007/978-3-031-14791-3\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DittmerILOEKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/FamiliSWP22,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  title        = {{RAIL:} Robust Acoustic Indoor Localization for Drones},
  booktitle    = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki,
                  Finland, June 19-22, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860933},
  doi          = {10.1109/VTC2022-SPRING54318.2022.9860933},
  timestamp    = {Wed, 25 Jan 2023 10:28:23 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/FamiliSWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/RoySMZDK22,
  author       = {Sunanda Roy and
                  Angelos Stavrou and
                  Brian L. Mark and
                  Kai Zeng and
                  Sai Manoj P. D. and
                  Khaled N. Khasawneh},
  title        = {Characterization of {AES} Implementations on Microprocessor-based
                  IoT Devices},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2022,
                  Austin, TX, USA, April 10-13, 2022},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WCNC51071.2022.9771975},
  doi          = {10.1109/WCNC51071.2022.9771975},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/RoySMZDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/AtalaySSW22,
  author       = {Tolga O. Atalay and
                  Dragoslav Stojadinovic and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Scaling Network Slices with a 5G Testbed: {A} Resource Consumption
                  Study},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2022,
                  Austin, TX, USA, April 10-13, 2022},
  pages        = {2649--2654},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WCNC51071.2022.9771860},
  doi          = {10.1109/WCNC51071.2022.9771860},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/AtalaySSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2022,
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606},
  doi          = {10.1145/3548606},
  isbn         = {978-1-4503-9450-5},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-10488,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  title        = {{PILOT:} High-Precision Indoor Localization for Autonomous Drones},
  journal      = {CoRR},
  volume       = {abs/2201.10488},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.10488},
  eprinttype    = {arXiv},
  eprint       = {2201.10488},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-10488.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-10691,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Park},
  title        = {{OPTILOD:} Optimal Beacon Placement for High-Accuracy Indoor Localization
                  of Drones},
  journal      = {CoRR},
  volume       = {abs/2201.10691},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.10691},
  eprinttype    = {arXiv},
  eprint       = {2201.10691},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-10691.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-11465,
  author       = {Tolga O. Atalay and
                  Sudip Maitra and
                  Dragoslav Stojadinovic and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps},
  journal      = {CoRR},
  volume       = {abs/2212.11465},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.11465},
  doi          = {10.48550/ARXIV.2212.11465},
  eprinttype    = {arXiv},
  eprint       = {2212.11465},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-11465.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StarkDOBEKS21,
  author       = {Emily Stark and
                  Joe DeBlasio and
                  Devon O'Brien and
                  Davide Balzarotti and
                  William Enck and
                  Samuel King and
                  Angelos Stavrou},
  title        = {Certificate Transparency in Google Chrome: Past, Present, and Future},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {112--118},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3103461},
  doi          = {10.1109/MSEC.2021.3103461},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StarkDOBEKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ConnellyR0XWS21,
  author       = {Joseph Connelly and
                  Taylor Roberts and
                  Xing Gao and
                  Jidong Xiao and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {CloudSkulk: {A} Nested Virtual Machine Based Rootkit and Its Detection},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {350--362},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00047},
  doi          = {10.1109/DSN48987.2021.00047},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/ConnellyR0XWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/ChatzigiannisBK21,
  author       = {Panagiotis Chatzigiannis and
                  Foteini Baldimtsi and
                  Constantinos Kolias and
                  Angelos Stavrou},
  title        = {Black-Box IoT: Authentication and Distributed Storage of IoT Data
                  from Constrained Sensors},
  booktitle    = {IoTDI '21: International Conference on Internet-of-Things Design and
                  Implementation, Virtual Event / Charlottesville, VA, USA, May 18-21,
                  2021},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450268.3453536},
  doi          = {10.1145/3450268.3453536},
  timestamp    = {Thu, 20 May 2021 08:39:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iotdi/ChatzigiannisBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiE0S21,
  author       = {Yuede Ji and
                  Mohamed Elsabagh and
                  Ryan Johnson and
                  Angelos Stavrou},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {DEFInit: An Analysis of Exposed Android Init Routines},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3685--3702},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ji},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiE0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-04028,
  author       = {Panagiotis Chatzigiannis and
                  Foteini Baldimtsi and
                  Constantinos Kolias and
                  Angelos Stavrou},
  title        = {Black-Box IoT: Authentication and Distributed Storage of IoT Data
                  from Constrained Sensors},
  journal      = {CoRR},
  volume       = {abs/2103.04028},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.04028},
  eprinttype    = {arXiv},
  eprint       = {2103.04028},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-04028.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OsterweilSZ20,
  author       = {Eric Osterweil and
                  Angelos Stavrou and
                  Lixia Zhang},
  title        = {21 Years of Distributed Denial-of Service: Current State of Affairs},
  journal      = {Computer},
  volume       = {53},
  number       = {7},
  pages        = {88--92},
  year         = {2020},
  url          = {https://doi.org/10.1109/MC.2020.2983711},
  doi          = {10.1109/MC.2020.2983711},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/OsterweilSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OsterweilS020,
  author       = {Eric Osterweil and
                  Angelos Stavrou and
                  Lixia Zhang},
  title        = {21 Years of Distributed Denial-of-Service: {A} Call to Action},
  journal      = {Computer},
  volume       = {53},
  number       = {8},
  pages        = {94--99},
  year         = {2020},
  url          = {https://doi.org/10.1109/MC.2020.2993330},
  doi          = {10.1109/MC.2020.2993330},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/OsterweilS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/DouglisS20,
  author       = {Fred Douglis and
                  Angelos Stavrou},
  title        = {Distributed Ledger Technologies},
  journal      = {{IEEE} Internet Comput.},
  volume       = {24},
  number       = {3},
  pages        = {5--6},
  year         = {2020},
  url          = {https://doi.org/10.1109/MIC.2020.3002415},
  doi          = {10.1109/MIC.2020.3002415},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/DouglisS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/YuanWOLWRSZTBYW20,
  author       = {Yong Yuan and
                  Shouyang Wang and
                  David L. Olson and
                  James H. Lambert and
                  Fei{-}Yue Wang and
                  Chunming Rong and
                  Angelos Stavrou and
                  Jun Zhang and
                  Qiang Tang and
                  Foteini Baldimtsi and
                  Laurence T. Yang and
                  Desheng Wu},
  title        = {Guest Editorial Special Issue on Blockchain and Economic Knowledge
                  Automation},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {50},
  number       = {1},
  pages        = {2--8},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSMC.2019.2959929},
  doi          = {10.1109/TSMC.2019.2959929},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/YuanWOLWRSZTBYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/BaarziKFS20,
  author       = {Ataollah Fatahi Baarzi and
                  George Kesidis and
                  Dan Fleck and
                  Angelos Stavrou},
  editor       = {Lorenzo Cavallaro and
                  Andrea Lanzi},
  title        = {Microservices made attack-resilient using unsupervised service fissioning},
  booktitle    = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys
                  2020, Heraklion, Greece, April 27, 2020},
  pages        = {31--36},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380786.3391395},
  doi          = {10.1145/3380786.3391395},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/BaarziKFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Elsabagh0SZZL20,
  author       = {Mohamed Elsabagh and
                  Ryan Johnson and
                  Angelos Stavrou and
                  Chaoshun Zuo and
                  Qingchuan Zhao and
                  Zhiqiang Lin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{FIRMSCOPE:} Automatic Uncovering of Privilege-Escalation Vulnerabilities
                  in Pre-Installed Apps in Android Firmware},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2379--2396},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/elsabagh},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Elsabagh0SZZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-13053,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky and
                  Mohamed Elsabagh and
                  Nikolaos Kiourtis and
                  Brian Schulte and
                  Angelos Stavrou},
  title        = {Function Secret Sharing for {PSI-CA:} With Applications to Private
                  Contact Tracing},
  journal      = {CoRR},
  volume       = {abs/2012.13053},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.13053},
  eprinttype    = {arXiv},
  eprint       = {2012.13053},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-13053.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DittmerILOEKSS20,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky and
                  Mohamed Elsabagh and
                  Nikolaos Kiourtis and
                  Brian Schulte and
                  Angelos Stavrou},
  title        = {Function Secret Sharing for {PSI-CA:} With Applications to Private
                  Contact Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1599},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1599},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DittmerILOEKSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-02739,
  author       = {Eric Osterweil and
                  Angelos Stavrou and
                  Lixia Zhang},
  title        = {20 Years of DDoS: a Call to Action},
  journal      = {CoRR},
  volume       = {abs/1904.02739},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.02739},
  eprinttype    = {arXiv},
  eprint       = {1904.02739},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-02739.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VoasKKSK18,
  author       = {Jeffrey M. Voas and
                  Rick Kuhn and
                  Constantinos Kolias and
                  Angelos Stavrou and
                  Georgios Kambourakis},
  title        = {Cybertrust in the IoT Age},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {12--15},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011043},
  doi          = {10.1109/MC.2018.3011043},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VoasKKSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ElsabaghBFS18,
  author       = {Mohamed Elsabagh and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck and
                  Angelos Stavrou},
  title        = {On early detection of application-level resource exhaustion and starvation},
  journal      = {J. Syst. Softw.},
  volume       = {137},
  pages        = {430--447},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jss.2017.02.043},
  doi          = {10.1016/J.JSS.2017.02.043},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/ElsabaghBFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLSW18,
  author       = {Fengwei Zhang and
                  Kevin Leach and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Towards Transparent Debugging},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {321--335},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2545671},
  doi          = {10.1109/TDSC.2016.2545671},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0002ESO18,
  author       = {Ryan Johnson and
                  Mohamed Elsabagh and
                  Angelos Stavrou and
                  Jeff Offutt},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Dazed Droids: {A} Longitudinal Study of Android Inter-App Vulnerabilities},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {777--791},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196549},
  doi          = {10.1145/3196494.3196549},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0002ESO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/Elsabagh0S18,
  author       = {Mohamed Elsabagh and
                  Ryan Johnson and
                  Angelos Stavrou},
  title        = {Resilient and Scalable Cloned App Detection Using Forced Execution
                  and Compression Trees},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625133},
  doi          = {10.1109/DESEC.2018.8625133},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/Elsabagh0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/FleckSKNSK18,
  author       = {Daniel Fleck and
                  Angelos Stavrou and
                  George Kesidis and
                  Neda Nasiriani and
                  Yuquan Shan and
                  Takis Konstantopoulos},
  title        = {Moving-Target Defense Against Botnet Reconnaissance and an Adversarial
                  Coupon-Collection Model},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625162},
  doi          = {10.1109/DESEC.2018.8625162},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/FleckSKNSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuLCCYLWS18,
  author       = {Haitao Xu and
                  Zhao Li and
                  Chen Chu and
                  Yuanmi Chen and
                  Yifan Yang and
                  Haifeng Lu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Detecting and Characterizing Web Bot Traffic in a Large E-commerce
                  Marketplace},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_8},
  doi          = {10.1007/978-3-319-98989-1\_8},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/XuLCCYLWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KesidisSFSK18,
  author       = {George Kesidis and
                  Yuquan Shan and
                  Daniel Fleck and
                  Angelos Stavrou and
                  Takis Konstantopoulos},
  title        = {An adversarial coupon-collector model of asynchronous moving-target
                  defense against botnet reconnaissance\({}^{\mbox{*}}\)},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {61--67},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659359},
  doi          = {10.1109/MALWARE.2018.8659359},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/KesidisSFSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HaoZWS18,
  author       = {Shuai Hao and
                  Yubao Zhang and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking
                  in Content Delivery Networks},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1129--1145},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/hao},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HaoZWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosys/2018eurosec,
  editor       = {Angelos Stavrou and
                  Konrad Rieck},
  title        = {Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys
                  2018, Porto, Portugal, April 23, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3193111},
  doi          = {10.1145/3193111},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/2018eurosec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StavrouV17,
  author       = {Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {Verified Time},
  journal      = {Computer},
  volume       = {50},
  number       = {3},
  pages        = {78--82},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.63},
  doi          = {10.1109/MC.2017.63},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/StavrouV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KoliasKSV17,
  author       = {Constantinos Kolias and
                  Georgios Kambourakis and
                  Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {DDoS in the IoT: Mirai and Other Botnets},
  journal      = {Computer},
  volume       = {50},
  number       = {7},
  pages        = {80--84},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.201},
  doi          = {10.1109/MC.2017.201},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/KoliasKSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/join/AuffretSSKKRSSA17,
  author       = {Jean{-}Pierre Auffret and
                  Jane L. Snowdon and
                  Angelos Stavrou and
                  Jeffrey S. Katz and
                  Diana Kelley and
                  Rasheq S. Rahman and
                  Frank Stein and
                  Lisa Sokol and
                  Peter Allor and
                  Peng Warweg},
  title        = {Cybersecurity Leadership: Competencies, Governance, and Technologies
                  for Industrial Control Systems},
  journal      = {J. Interconnect. Networks},
  volume       = {17},
  number       = {1},
  pages        = {1740001:1--1740001:20},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0219265917400011},
  doi          = {10.1142/S0219265917400011},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/join/AuffretSSKKRSSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/XuLWS17,
  author       = {Haitao Xu and
                  Daiping Liu and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service},
  journal      = {{ACM} Trans. Web},
  volume       = {11},
  number       = {2},
  pages        = {13:1--13:35},
  year         = {2017},
  url          = {https://doi.org/10.1145/2983646},
  doi          = {10.1145/2983646},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tweb/XuLWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SrinivasanDS17,
  author       = {Avinash Srinivasan and
                  Hunter Dong and
                  Angelos Stavrou},
  title        = {{FROST:} Anti-Forensics Digital-Dead-DROp Information Hiding RobuST
                  to Detection {\&} Data Loss with Fault tolerance},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {82:1--82:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3106069},
  doi          = {10.1145/3098954.3106069},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SrinivasanDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ElsabaghFS17,
  author       = {Mohamed Elsabagh and
                  Dan Fleck and
                  Angelos Stavrou},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Strict Virtual Call Integrity Checking for {C++} Binaries},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {140--154},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052976},
  doi          = {10.1145/3052973.3052976},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ElsabaghFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarameS17,
  author       = {Ghassan O. Karame and
                  Angelos Stavrou},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {CCSW'17: 2017 {ACM} Cloud Computing Security},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2627--2628},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3137050},
  doi          = {10.1145/3133956.3137050},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KarameS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ElsabaghBFS17,
  author       = {Mohamed Elsabagh and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck and
                  Angelos Stavrou},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Detecting {ROP} with Statistical Learning of Program Characteristics},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {219--226},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029812},
  doi          = {10.1145/3029806.3029812},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ElsabaghBFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiuGZWS17,
  author       = {Daiping Liu and
                  Xing Gao and
                  Mingwei Zhang and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {Detecting Passive Cheats in Online Games via Performance-Skillfulness
                  Inconsistency},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {615--626},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.20},
  doi          = {10.1109/DSN.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiuGZWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/KoliasCZS17,
  author       = {Constantinos Kolias and
                  Lucas Copi and
                  Fengwei Zhang and
                  Angelos Stavrou},
  editor       = {Cristiano Giuffrida and
                  Angelos Stavrou},
  title        = {Breaking {BLE} Beacons For Fun But Mostly Profit},
  booktitle    = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC}
                  2017, Belgrade, Serbia, April 23, 2017},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3065913.3065923},
  doi          = {10.1145/3065913.3065923},
  timestamp    = {Tue, 06 Nov 2018 16:58:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/KoliasCZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GaoLLWS17,
  author       = {Xing Gao and
                  Dachuan Liu and
                  Daiping Liu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {E-Android: {A} New Energy Profiling Tool for Smartphones},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {492--502},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.218},
  doi          = {10.1109/ICDCS.2017.218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/GaoLLWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BellLBS17,
  author       = {Jonathan Bell and
                  Thomas D. LaToza and
                  Foteini Baldimtsi and
                  Angelos Stavrou},
  title        = {Advancing Open Science with Version Control and Blockchains},
  booktitle    = {12th {IEEE/ACM} International Workshop on Software Engineering for
                  Science, SE4Science@ICSE 2017, Buenos Aires, Argentina, May 22, 2017},
  pages        = {13--14},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SE4Science.2017.11},
  doi          = {10.1109/SE4SCIENCE.2017.11},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/BellLBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ShanKFS17,
  author       = {Yuquan Shan and
                  George Kesidis and
                  Daniel Fleck and
                  Angelos Stavrou},
  title        = {Preliminary study of fission defenses against low-volume DoS attacks
                  on proxied multiserver systems},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {67--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323958},
  doi          = {10.1109/MALWARE.2017.8323958},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ShanKFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/KambourakisKS17,
  author       = {Georgios Kambourakis and
                  Constantinos Kolias and
                  Angelos Stavrou},
  title        = {The Mirai botnet and the IoT Zombie Armies},
  booktitle    = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
                  MD, USA, October 23-25, 2017},
  pages        = {267--272},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MILCOM.2017.8170867},
  doi          = {10.1109/MILCOM.2017.8170867},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/KambourakisKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/0002MSS17,
  author       = {Ryan Johnson and
                  Rahul Murmuria and
                  Angelos Stavrou and
                  Vincent Sritapan},
  title        = {Pairing continuous authentication with proactive platform hardening},
  booktitle    = {2017 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
                  13-17, 2017},
  pages        = {88--90},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PERCOMW.2017.7917532},
  doi          = {10.1109/PERCOMW.2017.7917532},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/0002MSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MurmuriaSBS17,
  author       = {Rahul Murmuria and
                  Angelos Stavrou and
                  Daniel Barbar{\'{a}} and
                  Vincent Sritapan},
  title        = {Your data in your hands: Privacy-preserving user behavior models for
                  context computation},
  booktitle    = {2017 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
                  13-17, 2017},
  pages        = {170--175},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PERCOMW.2017.7917552},
  doi          = {10.1109/PERCOMW.2017.7917552},
  timestamp    = {Thu, 11 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/MurmuriaSBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ElsabaghFSKB17,
  author       = {Mohamed Elsabagh and
                  Dan Fleck and
                  Angelos Stavrou and
                  Michael Kaplan and
                  Thomas Bowen},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Practical and Accurate Runtime Application Protection Against DoS
                  Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {450--471},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_20},
  doi          = {10.1007/978-3-319-66332-6\_20},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ElsabaghFSKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017ccsw,
  editor       = {Bhavani Thuraisingham and
                  Ghassan Karame and
                  Angelos Stavrou},
  title        = {Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS
                  2017, Dallas, TX, USA, November 3, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3140649},
  isbn         = {978-1-4503-5204-8},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2017ccsw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosec/2017,
  editor       = {Cristiano Giuffrida and
                  Angelos Stavrou},
  title        = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC}
                  2017, Belgrade, Serbia, April 23, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3065913},
  doi          = {10.1145/3065913},
  isbn         = {978-1-4503-4935-2},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShanKFS17,
  author       = {Yuquan Shan and
                  George Kesidis and
                  Daniel Fleck and
                  Angelos Stavrou},
  title        = {Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS
                  Attacks on Proxied Multiserver Systems},
  journal      = {CoRR},
  volume       = {abs/1704.06794},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.06794},
  eprinttype    = {arXiv},
  eprint       = {1704.06794},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShanKFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-01102,
  author       = {Neda Nasiriani and
                  Yuquan Shan and
                  George Kesidis and
                  Daniel Fleck and
                  Angelos Stavrou},
  title        = {Changing proxy-server identities as a proactive moving-target defense
                  against reconnaissance for DDoS attacks},
  journal      = {CoRR},
  volume       = {abs/1712.01102},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.01102},
  eprinttype    = {arXiv},
  eprint       = {1712.01102},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-01102.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StavrouFK16,
  author       = {Angelos Stavrou and
                  Daniel Fleck and
                  Constantinos Kolias},
  title        = {On the Move: Evading Distributed Denial-of-Service Attacks},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {104--107},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.85},
  doi          = {10.1109/MC.2016.85},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/StavrouFK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KoliasKSG16,
  author       = {Constantinos Kolias and
                  Georgios Kambourakis and
                  Angelos Stavrou and
                  Stefanos Gritzalis},
  title        = {Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats
                  and a Public Dataset},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {1},
  pages        = {184--208},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2015.2402161},
  doi          = {10.1109/COMST.2015.2402161},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KoliasKSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KoliasSVBK16,
  author       = {Constantinos Kolias and
                  Angelos Stavrou and
                  Jeffrey M. Voas and
                  Irena Bojanova and
                  D. Richard Kuhn},
  title        = {Learning Internet-of-Things Security "Hands-On"},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {37--46},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.4},
  doi          = {10.1109/MSP.2016.4},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KoliasSVBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/0002ES16,
  author       = {Ryan Johnson and
                  Mohamed Elsabagh and
                  Angelos Stavrou},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Why Software DoS Is Hard to Fix: Denying Access in Embedded Android
                  Platforms},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {193--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_11},
  doi          = {10.1007/978-3-319-39555-5\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/0002ES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SmutzS16,
  author       = {Charles Smutz and
                  Angelos Stavrou},
  title        = {When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify
                  Evasion in Malware Detectors},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/when-tree-falls-using-diversity-ensemble-classifiers-identify-evasion-malware-detectors.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SmutzS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/MurmuriaS16,
  author       = {Rahul Murmuria and
                  Angelos Stavrou},
  title        = {Authentication Feature and Model Selection using Penalty Algorithms},
  booktitle    = {Who Are You?! Adventures in Authentication, WAY@SOUPS 2016, Denver,
                  CO, USA, June 22, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/workshop-program/way2016/presentation/murmuria},
  timestamp    = {Thu, 04 Aug 2016 15:59:21 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/MurmuriaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KoliasSV15,
  author       = {Constantinos Kolias and
                  Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {Securely Making "Things" Right},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {84--88},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.258},
  doi          = {10.1109/MC.2015.258},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KoliasSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangLWS15,
  author       = {Fengwei Zhang and
                  Kevin Leach and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {TrustLogin: Securing Password-Login on Commodity Operating Systems},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {333--344},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714614},
  doi          = {10.1145/2714576.2714614},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangLWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/0002KSS15,
  author       = {Ryan Johnson and
                  Nikolaos Kiourtis and
                  Angelos Stavrou and
                  Vincent Sritapan},
  title        = {Analysis of content copyright infringement in mobile application markets},
  booktitle    = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona,
                  Spain, May 26-29, 2015},
  pages        = {43--52},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECRIME.2015.7120798},
  doi          = {10.1109/ECRIME.2015.7120798},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/0002KSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/HaoWSS15,
  author       = {Shuai Hao and
                  Haining Wang and
                  Angelos Stavrou and
                  Evgenia Smirni},
  title        = {On the {DNS} Deployment of Modern Web Services},
  booktitle    = {23rd {IEEE} International Conference on Network Protocols, {ICNP}
                  2015, San Francisco, CA, USA, November 10-13, 2015},
  pages        = {100--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICNP.2015.37},
  doi          = {10.1109/ICNP.2015.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/HaoWSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/0002ESS15,
  author       = {Ryan Johnson and
                  Mohamed Elsabagh and
                  Angelos Stavrou and
                  Vincent Sritapan},
  title        = {Targeted DoS on android: how to disable android in 10 seconds or less},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {136--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413694},
  doi          = {10.1109/MALWARE.2015.7413694},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/0002ESS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SmutzS15,
  author       = {Charles Smutz and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Preventing Exploits in Microsoft Office Documents Through Content
                  Randomization},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {225--246},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_11},
  doi          = {10.1007/978-3-319-26362-5\_11},
  timestamp    = {Sun, 25 Oct 2020 22:56:09 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SmutzS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MurmuriaSBF15,
  author       = {Rahul Murmuria and
                  Angelos Stavrou and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Continuous Authentication on Mobile Devices Using Power Consumption,
                  Touch Gestures and Physical Movement of Users},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {405--424},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_19},
  doi          = {10.1007/978-3-319-26362-5\_19},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MurmuriaSBF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuWS15,
  author       = {Haitao Xu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Privacy Risk Assessment on Online Photos},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {427--447},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_20},
  doi          = {10.1007/978-3-319-26362-5\_20},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/XuWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ElsabaghBFS15,
  author       = {Mohamed Elsabagh and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Radmin: Early Detection of Application-Level Resource Exhaustion and
                  Starvation Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {515--537},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_24},
  doi          = {10.1007/978-3-319-26362-5\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ElsabaghBFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangLSWS15,
  author       = {Fengwei Zhang and
                  Kevin Leach and
                  Angelos Stavrou and
                  Haining Wang and
                  Kun Sun},
  title        = {Using Hardware Features for Increased Debugging Transparency},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {55--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.11},
  doi          = {10.1109/SP.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangLSWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/XuLWS15,
  author       = {Haitao Xu and
                  Daiping Liu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Aldo Gangemi and
                  Stefano Leonardi and
                  Alessandro Panconesi},
  title        = {E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service},
  booktitle    = {Proceedings of the 24th International Conference on World Wide Web,
                  {WWW} 2015, Florence, Italy, May 18-22, 2015},
  pages        = {1296--1306},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2736277.2741650},
  doi          = {10.1145/2736277.2741650},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/XuLWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangJFPLS14,
  author       = {Huangxin Wang and
                  Quan Jia and
                  Dan Fleck and
                  Walter Powell and
                  Fei Li and
                  Angelos Stavrou},
  title        = {A moving target DDoS defense mechanism},
  journal      = {Comput. Commun.},
  volume       = {46},
  pages        = {10--21},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comcom.2014.03.009},
  doi          = {10.1016/J.COMCOM.2014.03.009},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/WangJFPLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWSS14,
  author       = {Fengwei Zhang and
                  Jiang Wang and
                  Kun Sun and
                  Angelos Stavrou},
  title        = {HyperCheck: {A} Hardware-AssistedIntegrity Monitor},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {332--344},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.53},
  doi          = {10.1109/TDSC.2013.53},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangWSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CooleyWS14,
  author       = {Brett Cooley and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Activity Spoofing and Its Defense in Android Smartphones},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {494--512},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_29},
  doi          = {10.1007/978-3-319-07536-5\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CooleyWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiuWS14,
  author       = {Daiping Liu and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {Detecting Malicious Javascript in {PDF} through Document Instrumentation},
  booktitle    = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014},
  pages        = {100--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DSN.2014.92},
  doi          = {10.1109/DSN.2014.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiuWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/JiaWFLSP14,
  author       = {Quan Jia and
                  Huangxin Wang and
                  Dan Fleck and
                  Fei Li and
                  Angelos Stavrou and
                  Walter Powell},
  title        = {Catch Me If You Can: {A} Cloud-Enabled DDoS Defense},
  booktitle    = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014},
  pages        = {264--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DSN.2014.35},
  doi          = {10.1109/DSN.2014.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/JiaWFLSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangWLS14,
  author       = {Fengwei Zhang and
                  Haining Wang and
                  Kevin Leach and
                  Angelos Stavrou},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {A Framework to Secure Peripherals at Runtime},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_13},
  doi          = {10.1007/978-3-319-11203-9\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangWLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuLKWS14,
  author       = {Haitao Xu and
                  Daiping Liu and
                  Aaron Koehl and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Click Fraud Detection on the Advertiser Side},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {419--438},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_24},
  doi          = {10.1007/978-3-319-11212-1\_24},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/XuLKWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HiremagaloreBFPS14,
  author       = {Sharath Hiremagalore and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck and
                  Walter Powell and
                  Angelos Stavrou},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {transAD: An Anomaly Detection Network Intrusion Sensor for the Web},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {477--489},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_30},
  doi          = {10.1007/978-3-319-13257-0\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HiremagaloreBFPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2014,
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1},
  doi          = {10.1007/978-3-319-11379-1},
  isbn         = {978-3-319-11378-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/HiremagaloreLSR13,
  author       = {Sharath Hiremagalore and
                  Chen Liang and
                  Angelos Stavrou and
                  Huzefa Rangwala},
  title        = {Improving network response times using social information},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {3},
  number       = {2},
  pages        = {209--220},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13278-012-0065-9},
  doi          = {10.1007/S13278-012-0065-9},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/HiremagaloreLSR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ArdagnaJSS13,
  author       = {Claudio A. Ardagna and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Angelos Stavrou},
  title        = {Providing Users' Anonymity in Mobile Hybrid Networks},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {12},
  number       = {3},
  pages        = {7:1--7:33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2461321.2461322},
  doi          = {10.1145/2461321.2461322},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/ArdagnaJSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/JiaSS13,
  author       = {Quan Jia and
                  Kun Sun and
                  Angelos Stavrou},
  title        = {Capability-Based Defenses Against DoS Attacks in Multi-path {MANET}
                  Communications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {73},
  number       = {1},
  pages        = {127--148},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11277-013-1297-3},
  doi          = {10.1007/S11277-013-1297-3},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/JiaSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FleckTASN13,
  author       = {Dan Fleck and
                  Arnur G. Tokhtabayev and
                  Alex Alarif and
                  Angelos Stavrou and
                  Tomas Nykodym},
  title        = {PyTrigger: {A} System to Trigger {\&} Extract User-Activated Malware
                  Behavior},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {92--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.16},
  doi          = {10.1109/ARES.2013.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FleckTASN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/ApplegateS13,
  author       = {Scott D. Applegate and
                  Angelos Stavrou},
  editor       = {Karlis Podins and
                  Jan Stinissen and
                  Markus Maybaum},
  title        = {Towards a Cyber Conflict Taxonomy},
  booktitle    = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn,
                  Estonia, June 4-7, 2013},
  pages        = {1--18},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6568391/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/ApplegateS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZhangLSS13,
  author       = {Fengwei Zhang and
                  Kevin Leach and
                  Kun Sun and
                  Angelos Stavrou},
  title        = {{SPECTRE:} {A} dependable introspection framework via System Management
                  Mode},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575343},
  doi          = {10.1109/DSN.2013.6575343},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ZhangLSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/JiaSS13,
  author       = {Quan Jia and
                  Kun Sun and
                  Angelos Stavrou},
  title        = {{MOTAG:} Moving Target Defense against Internet Denial of Service
                  Attacks},
  booktitle    = {22nd International Conference on Computer Communication and Networks,
                  {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCCN.2013.6614155},
  doi          = {10.1109/ICCCN.2013.6614155},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/JiaSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/SrinivasanNS13,
  author       = {Avinash Srinivasan and
                  Srinath Thirthahalli Nazaraj and
                  Angelos Stavrou},
  title        = {{HIDEINSIDE} - {A} novel randomized {\&} encrypted antiforensic
                  information hiding},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2013, San Diego, CA, USA, January 28-31, 2013},
  pages        = {626--631},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCNC.2013.6504159},
  doi          = {10.1109/ICCNC.2013.6504159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/SrinivasanNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Stavrou13,
  author       = {Angelos Stavrou},
  title        = {Programming on Android: Best Practices for Security and Reliability},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.37},
  doi          = {10.1109/SERE.2013.37},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Stavrou13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KaramiENS13,
  author       = {Mohammad Karami and
                  Mohamed Elsabagh and
                  Parnian Najafiborazjani and
                  Angelos Stavrou},
  title        = {Behavioral Analysis of Android Applications Using Automated Instrumentation},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {182--187},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.35},
  doi          = {10.1109/SERE-C.2013.35},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/KaramiENS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/0002S13,
  author       = {Ryan Johnson and
                  Angelos Stavrou},
  title        = {Forced-Path Execution for Android Applications on x86 Platforms},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {188--197},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.36},
  doi          = {10.1109/SERE-C.2013.36},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/0002S13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2013,
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4},
  doi          = {10.1007/978-3-642-41284-4},
  isbn         = {978-3-642-41283-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StavrouVKQ12,
  author       = {Angelos Stavrou and
                  Jeffrey M. Voas and
                  Tom Karygiannis and
                  Steve Quirolgico},
  title        = {Building Security into Off-the-Shelf Smartphones},
  journal      = {Computer},
  volume       = {45},
  number       = {2},
  pages        = {82--84},
  year         = {2012},
  url          = {https://doi.org/10.1109/MC.2012.44},
  doi          = {10.1109/MC.2012.44},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/StavrouVKQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeSK12,
  author       = {Meixing Le and
                  Angelos Stavrou and
                  Brent ByungHoon Kang},
  title        = {DoubleGuard: Detecting Intrusions in Multitier Web Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {512--525},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.59},
  doi          = {10.1109/TDSC.2011.59},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SmutzS12,
  author       = {Charles Smutz and
                  Angelos Stavrou},
  editor       = {Robert H'obbes' Zakon},
  title        = {Malicious {PDF} detection using metadata and structural features},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {239--248},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420987},
  doi          = {10.1145/2420950.2420987},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SmutzS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SchulteASS12,
  author       = {Brian Schulte and
                  Haris Andrianakis and
                  Kun Sun and
                  Angelos Stavrou},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {NetGator: Malware Detection Using Program Interactive Challenges},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {164--183},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_10},
  doi          = {10.1007/978-3-642-37300-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SchulteASS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WangSS12,
  author       = {Jiang Wang and
                  Kun Sun and
                  Angelos Stavrou},
  editor       = {Robert S. Swarz and
                  Philip Koopman and
                  Michel Cukier},
  title        = {A dependability analysis of hardware-assisted polling integrity checking
                  systems},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks,
                  {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSN.2012.6263962},
  doi          = {10.1109/DSN.2012.6263962},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WangSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WangSS12,
  author       = {Jiang Wang and
                  Kun Sun and
                  Angelos Stavrou},
  title        = {Hardware-Assisted Application Integrity Monitor},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {5375--5383},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.299},
  doi          = {10.1109/HICSS.2012.299},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WangSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/KeromytisGSSYBDEKS12,
  author       = {Angelos D. Keromytis and
                  Roxana Geambasu and
                  Simha Sethumadhavan and
                  Salvatore J. Stolfo and
                  Junfeng Yang and
                  Azzedine Benameur and
                  Marc Dacier and
                  Matthew C. Elder and
                  Darrell M. Kienzle and
                  Angelos Stavrou},
  title        = {The {MEERKATS} Cloud Security Architecture},
  booktitle    = {32nd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012},
  pages        = {446--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCSW.2012.42},
  doi          = {10.1109/ICDCSW.2012.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/KeromytisGSSYBDEKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/MahmoodEKMMS12,
  author       = {Riyadh Mahmood and
                  Naeem Esfahani and
                  Thabet Kacem and
                  Nariman Mirzaei and
                  Sam Malek and
                  Angelos Stavrou},
  editor       = {Daniel Hoffman and
                  John Hughes and
                  Dianxiang Xu},
  title        = {A whitebox approach for automated security testing of Android applications
                  on the cloud},
  booktitle    = {7th International Workshop on Automation of Software Test, {AST} 2012,
                  Zurich, Switzerland, June 2-3, 2012},
  pages        = {22--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IWAST.2012.6228986},
  doi          = {10.1109/IWAST.2012.6228986},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/MahmoodEKMMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/WangMS12,
  author       = {Zhaohui Wang and
                  Rahul Murmuria and
                  Angelos Stavrou},
  editor       = {Karl Aberer and
                  Anupam Joshi and
                  Sougata Mukherjea and
                  Dipanjan Chakraborty and
                  Hua Lu and
                  Nalini Venkatasubramanian and
                  Salil S. Kanhere},
  title        = {Implementing and Optimizing an Encryption Filesystem on Android},
  booktitle    = {13th {IEEE} International Conference on Mobile Data Management, {MDM}
                  2012, Bengaluru, India, July 23-26, 2012},
  pages        = {52--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MDM.2012.31},
  doi          = {10.1109/MDM.2012.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/WangMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/WangJMS12,
  author       = {Zhaohui Wang and
                  Ryan Johnson and
                  Rahul Murmuria and
                  Angelos Stavrou},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Exposing Security Risks for Commercial Mobile Devices},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_2},
  doi          = {10.1007/978-3-642-33704-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/WangJMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YavvariTRS12,
  author       = {Chaitanya Yavvari and
                  Arnur G. Tokhtabayev and
                  Huzefa Rangwala and
                  Angelos Stavrou},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Malware Characterization Using Behavioral Components},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {226--239},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_20},
  doi          = {10.1007/978-3-642-33704-8\_20},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YavvariTRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SunWZS12,
  author       = {Kun Sun and
                  Jiang Wang and
                  Fengwei Zhang and
                  Angelos Stavrou},
  title        = {SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and
                  Untrusted Commodity OSes},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/secureswitch-bios-assisted-isolation-and-switch-between-trusted-and-untrusted-commodity-oses},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SunWZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MalekEKMMS12,
  author       = {Sam Malek and
                  Naeem Esfahani and
                  Thabet Kacem and
                  Riyadh Mahmood and
                  Nariman Mirzaei and
                  Angelos Stavrou},
  title        = {A Framework for Automated Security Testing of Android Applications
                  on the Cloud},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {35--36},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.39},
  doi          = {10.1109/SERE-C.2012.39},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MalekEKMMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangS12,
  author       = {Zhaohui Wang and
                  Angelos Stavrou},
  title        = {Attestation {\&} Authentication for {USB} Communications},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {43--44},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.43},
  doi          = {10.1109/SERE-C.2012.43},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JohnsonWGS12,
  author       = {Ryan Johnson and
                  Zhaohui Wang and
                  Corey Gagnon and
                  Angelos Stavrou},
  title        = {Analysis of Android Applications' Permissions},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {45--46},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.44},
  doi          = {10.1109/SERE-C.2012.44},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/JohnsonWGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MurmuriaMSV12,
  author       = {Rahul Murmuria and
                  Jeffrey Medsger and
                  Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {Mobile Application and Device Power Usage Measurements},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {147--156},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.19},
  doi          = {10.1109/SERE.2012.19},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MurmuriaMSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/NazzicariASJ12,
  author       = {Nelson Nazzicari and
                  Javier Almillategui and
                  Angelos Stavrou and
                  Sushil Jajodia},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Switchwall: Automated Topology Fingerprinting and Behavior Deviation
                  Identification},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_11},
  doi          = {10.1007/978-3-642-38004-4\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/NazzicariASJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LocastoGJS11,
  author       = {Michael E. Locasto and
                  Anup K. Ghosh and
                  Sushil Jajodia and
                  Angelos Stavrou},
  title        = {The ephemeral legion: producing an expert cyber-security work force
                  from thin air},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {1},
  pages        = {129--131},
  year         = {2011},
  url          = {https://doi.org/10.1145/1866739.1866764},
  doi          = {10.1145/1866739.1866764},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/LocastoGJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/LiangHSR11,
  author       = {Chen Liang and
                  Sharath Hiremagalore and
                  Angelos Stavrou and
                  Huzefa Rangwala},
  title        = {Predicting Network Response Times Using Social Information},
  booktitle    = {International Conference on Advances in Social Networks Analysis and
                  Mining, {ASONAM} 2011, Kaohsiung, Taiwan, 25-27 July 2011},
  pages        = {527--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ASONAM.2011.22},
  doi          = {10.1109/ASONAM.2011.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/LiangHSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/centeris/YuVWSS11,
  author       = {Bo Yu and
                  J. Varga and
                  Duminda Wijesekera and
                  Angelos Stavrou and
                  Anoop Singhal},
  editor       = {Maria Manuela Cruz{-}Cunha and
                  Jo{\~{a}}o Varaj{\~{a}}o and
                  Philip Powell and
                  Ricardo Martinho},
  title        = {Specifying Time-Out Points in Surgical EMRs-Work in Progress},
  booktitle    = {ENTERprise Information Systems - International Conference, {CENTERIS}
                  2011, Vilamoura, Portugal, October 5-7, 2011, Proceedings, Part {III}},
  series       = {Communications in Computer and Information Science},
  volume       = {221},
  pages        = {165--174},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24352-3\_18},
  doi          = {10.1007/978-3-642-24352-3\_18},
  timestamp    = {Tue, 23 Apr 2024 23:18:35 +0200},
  biburl       = {https://dblp.org/rec/conf/centeris/YuVWSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KeromytisSYSGED11,
  author       = {Angelos D. Keromytis and
                  Salvatore J. Stolfo and
                  Junfeng Yang and
                  Angelos Stavrou and
                  Anup K. Ghosh and
                  Dawson R. Engler and
                  Marc Dacier and
                  Matthew C. Elder and
                  Darrell M. Kienzle},
  title        = {The {MINESTRONE} Architecture Combining Static and Dynamic Analysis
                  Techniques for Software Security},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {53--56},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.33},
  doi          = {10.1109/SYSSEC.2011.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/KeromytisSYSGED11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KenneallySMC11,
  author       = {Erin Kenneally and
                  Angelos Stavrou and
                  John McHugh and
                  Nicolas Christin},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Moving Forward, Building an Ethics Community (Panel Statements)},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {178--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_16},
  doi          = {10.1007/978-3-642-29889-9\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KenneallySMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/JiaSS11,
  author       = {Quan Jia and
                  Kun Sun and
                  Angelos Stavrou},
  editor       = {Haohong Wang and
                  Jin Li and
                  George N. Rouskas and
                  Xiaobo Zhou},
  title        = {CapMan: Capability-Based Defense against Multi-Path Denial of Service
                  (DoS) Attacks in {MANET}},
  booktitle    = {Proceedings of 20th International Conference on Computer Communications
                  and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4,
                  2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICCCN.2011.6005808},
  doi          = {10.1109/ICCCN.2011.6005808},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/JiaSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoggsHSS11,
  author       = {Nathaniel Boggs and
                  Sharath Hiremagalore and
                  Angelos Stavrou and
                  Salvatore J. Stolfo},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {142--160},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_8},
  doi          = {10.1007/978-3-642-23644-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoggsHSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/WangZSS11,
  author       = {Jiang Wang and
                  Fengwei Zhang and
                  Kun Sun and
                  Angelos Stavrou},
  editor       = {Robert F. Erbacher and
                  Roy H. Campbell and
                  Yong Guan},
  title        = {Firmware-assisted Memory Acquisition and Analysis tools for Digital
                  Forensics},
  booktitle    = {2011 {IEEE} Sixth International Workshop on Systematic Approaches
                  to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May
                  26, 2011},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SADFE.2011.7},
  doi          = {10.1109/SADFE.2011.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/WangZSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LeWJSGJ11,
  author       = {Meixing Le and
                  Zhaohui Wang and
                  Quan Jia and
                  Angelos Stavrou and
                  Anup K. Ghosh and
                  Sushil Jajodia},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Trading Elephants for Ants: Efficient Post-attack Reconstitution},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {460--469},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_27},
  doi          = {10.1007/978-3-642-31909-9\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LeWJSGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Stavrou11,
  author       = {Angelos Stavrou},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Overlay-Based DoS Defenses},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {891--897},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_273},
  doi          = {10.1007/978-1-4419-5906-5\_273},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Stavrou11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Stavrou11a,
  author       = {Angelos Stavrou},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{TCP} Modulation Attacks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1279--1281},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_277},
  doi          = {10.1007/978-1-4419-5906-5\_277},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Stavrou11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-2245,
  author       = {DaeHun Nyang and
                  Abedelaziz Mohaisen and
                  Taekyoung Kwon and
                  Brent ByungHoon Kang and
                  Angelos Stavrou},
  title        = {Decryptable to Your Eyes: Visualization of Security Protocols at the
                  User Interface},
  journal      = {CoRR},
  volume       = {abs/1112.2245},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.2245},
  eprinttype    = {arXiv},
  eprint       = {1112.2245},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-2245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ml/SongLSKS10,
  author       = {Yingbo Song and
                  Michael E. Locasto and
                  Angelos Stavrou and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  title        = {On the infeasibility of modeling polymorphic shellcode - Re-thinking
                  the role of learning in intrusion detection systems},
  journal      = {Mach. Learn.},
  volume       = {81},
  number       = {2},
  pages        = {179--205},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10994-009-5143-5},
  doi          = {10.1007/S10994-009-5143-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ml/SongLSKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangS10,
  author       = {Zhaohui Wang and
                  Angelos Stavrou},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Exploiting smart-phone {USB} connectivity for fun and profit},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {357--366},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920314},
  doi          = {10.1145/1920261.1920314},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChakravartySK10,
  author       = {Sambuddho Chakravarty and
                  Angelos Stavrou and
                  Angelos D. Keromytis},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Traffic Analysis against Low-Latency Anonymity Networks Using Available
                  Bandwidth Estimation},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {249--267},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_16},
  doi          = {10.1007/978-3-642-15497-3\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChakravartySK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArdagnaJSS10,
  author       = {Claudio A. Ardagna and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Angelos Stavrou},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Providing Mobile Users' Anonymity in Hybrid Networks},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {540--557},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_33},
  doi          = {10.1007/978-3-642-15497-3\_33},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ArdagnaJSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WangNSG10,
  author       = {Jiang Wang and
                  Sameer Niphadkar and
                  Angelos Stavrou and
                  Anup K. Ghosh},
  title        = {A Virtualization Architecture for In-Depth Kernel Isolation},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.41},
  doi          = {10.1109/HICSS.2010.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WangNSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JeeSSK10,
  author       = {Kangkook Jee and
                  Stelios Sidiroglou{-}Douskos and
                  Angelos Stavrou and
                  Angelos D. Keromytis},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {An Adversarial Evaluation of Network Signaling and Control Mechanisms},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {252--265},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_17},
  doi          = {10.1007/978-3-642-24209-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/JeeSSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicase/YangSDW10,
  author       = {Xiaohui Yang and
                  Angelos Stavrou and
                  Ram Dantu and
                  Duminda Wijesekera},
  editor       = {Martin L. Griss and
                  Guang Yang},
  title        = {Small World VoIP},
  booktitle    = {Mobile Computing, Applications, and Services - Second International
                  {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {76},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-29336-8\_8},
  doi          = {10.1007/978-3-642-29336-8\_8},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicase/YangSDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/SeymerSWJ10,
  author       = {Paul Seymer and
                  Angelos Stavrou and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {QoP and QoS Policy Cognizant Module Composition},
  booktitle    = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages        = {77--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/POLICY.2010.16},
  doi          = {10.1109/POLICY.2010.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/SeymerSWJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangSG10,
  author       = {Jiang Wang and
                  Angelos Stavrou and
                  Anup K. Ghosh},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {HyperCheck: {A} Hardware-Assisted Integrity Monitor},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {158--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_9},
  doi          = {10.1007/978-3-642-15512-3\_9},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AndrianakisSS10,
  author       = {Charalampos Andrianakis and
                  Paul Seymer and
                  Angelos Stavrou},
  editor       = {Wietse Z. Venema},
  title        = {Scalable Web Object Inspection and Malfease Collection},
  booktitle    = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
                  D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/hotsec10/scalable-web-object-inspection-and-malfease-collection},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AndrianakisSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FaresiYMSWS10,
  author       = {Ahmed A. L. Faresi and
                  Bo Yu and
                  Khalid Moidu and
                  Angelos Stavrou and
                  Duminda Wijesekera and
                  Anoop Singhal},
  editor       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Aviel D. Rubin},
  title        = {Fine-grained Sharing of Health Records using {XSPA} Profile for {XACML}
                  - An Extended Abstract},
  booktitle    = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/healthsec10/fine-grained-sharing-health-records-using-xspa-profile-xacml\%E2\%80\%94-extended},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FaresiYMSWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010cset,
  editor       = {Terry V. Benzel and
                  Jelena Mirkovic and
                  Angelos Stavrou},
  title        = {3rd Workshop on Cyber Security Experimentation and Test, {CSET} '10,
                  Washington, D.C., USA, August 9, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/cset10},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2010cset.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderCCGKSB09,
  author       = {D. Scott Alexander and
                  Yuu{-}Heng Cheng and
                  Brian A. Coan and
                  Andrei Ghetie and
                  Vikram Kaul and
                  Bruce Siegell and
                  Steven M. Bellovin and
                  Nicholas F. Maxemchuk and
                  Henning Schulzrinne and
                  Stephen Schwab and
                  Angelos Stavrou and
                  Jonathan M. Smith},
  title        = {The dynamic community of interest and its realization in {ZODIAC}},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {47},
  number       = {10},
  pages        = {40--47},
  year         = {2009},
  url          = {https://doi.org/10.1109/MCOM.2009.5273807},
  doi          = {10.1109/MCOM.2009.5273807},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderCCGKSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StavrouCLS09,
  author       = {Angelos Stavrou and
                  Gabriela F. Cretu{-}Ciocarlie and
                  Michael E. Locasto and
                  Salvatore J. Stolfo},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Keep your friends close: the necessity for updating an anomaly sensor
                  with legitimate environment changes},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {39--46},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1655000},
  doi          = {10.1145/1654988.1655000},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StavrouCLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArdagnaJSS09,
  author       = {Claudio A. Ardagna and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Angelos Stavrou},
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {Privacy Preservation over Untrusted Mobile Networks},
  booktitle    = {Privacy in Location-Based Applications, Research Issues and Emerging
                  Trends [This book was partially born out of the First International
                  Workshop on Privacy in Location-Based Applications (PiLBA 2008) held
                  in Malaga, Spain, in October 2008, in conjunction with the 13th European
                  Symposium on Research in Computer Security]},
  series       = {Lecture Notes in Computer Science},
  volume       = {5599},
  pages        = {84--105},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03511-1\_4},
  doi          = {10.1007/978-3-642-03511-1\_4},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ArdagnaJSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/StavrouBKN09,
  author       = {Angelos Stavrou and
                  Ricardo A. Barrato and
                  Angelos D. Keromytis and
                  Jason Nieh},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {A\({}^{\mbox{2}}\)M: Access-Assured Mobile Desktop Computing},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {186--201},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_16},
  doi          = {10.1007/978-3-642-04474-8\_16},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/StavrouBKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ShermanSNKS09,
  author       = {Alex Sherman and
                  Angelos Stavrou and
                  Jason Nieh and
                  Angelos D. Keromytis and
                  Clifford Stein},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Adding Trust to {P2P} Distribution of Paid Content},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {459--474},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_36},
  doi          = {10.1007/978-3-642-04474-8\_36},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ShermanSNKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Cretu-CiocarlieSLS09,
  author       = {Gabriela F. Cretu{-}Ciocarlie and
                  Angelos Stavrou and
                  Michael E. Locasto and
                  Salvatore J. Stolfo},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Adaptive Anomaly Detection via Self-calibration and Dynamic Updating},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_3},
  doi          = {10.1007/978-3-642-04342-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Cretu-CiocarlieSLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/LiuYWS09,
  author       = {Anyi Liu and
                  Yi Yuan and
                  Duminda Wijesekera and
                  Angelos Stavrou},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {SQLProb: a proxy-based architecture towards preventing {SQL} injection
                  attacks},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {2054--2061},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529737},
  doi          = {10.1145/1529282.1529737},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/LiuYWS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AlicherryKS09,
  author       = {Mansoor Alicherry and
                  Angelos D. Keromytis and
                  Angelos Stavrou},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {Deny-by-Default Distributed Security Policy Enforcement in Mobile
                  Ad Hoc Networks},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {41--50},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_3},
  doi          = {10.1007/978-3-642-05284-2\_3},
  timestamp    = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AlicherryKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiaWS09,
  author       = {Quan Jia and
                  Zhaohui Wang and
                  Angelos Stavrou},
  editor       = {Terry V. Benzel and
                  Jelena Mirkovic and
                  Angelos Stavrou},
  title        = {The Heisenberg Measuring Uncertainty in Lightweight Virtualization
                  Testbeds},
  booktitle    = {2nd Workshop on Cyber Security Experimentation and Test, {CSET} '09,
                  Montreal, Canada, August 10, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/cset-09/heisenberg-measuring-uncertainty-lightweight-virtualization-testbeds},
  timestamp    = {Mon, 01 Feb 2021 08:43:01 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiaWS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009vmsec,
  editor       = {Angelos Stavrou},
  title        = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security,
                  VMSec '09, Chicago, Illinois, USA, November 9, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655148},
  doi          = {10.1145/1655148},
  isbn         = {978-1-60558-780-6},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2009vmsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2009cset,
  editor       = {Terry V. Benzel and
                  Jelena Mirkovic and
                  Angelos Stavrou},
  title        = {2nd Workshop on Cyber Security Experimentation and Test, {CSET} '09,
                  Montreal, Canada, August 10, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/cset09},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2009cset.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LocastoS08,
  author       = {Michael E. Locasto and
                  Angelos Stavrou},
  title        = {The Hidden Difficulties of Watching and Rebuilding Networks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {2},
  pages        = {79--82},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.48},
  doi          = {10.1109/MSP.2008.48},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LocastoS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/StavrouLK08,
  author       = {Angelos Stavrou and
                  Michael E. Locasto and
                  Angelos D. Keromytis},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Pushback for Overlay Networks: Protecting Against Malicious Insiders},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {39--54},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_3},
  doi          = {10.1007/978-3-540-68914-0\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/StavrouLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangSGJ08,
  author       = {Yih Huang and
                  Angelos Stavrou and
                  Anup K. Ghosh and
                  Sushil Jajodia},
  editor       = {Jason Nieh and
                  Angelos Stavrou},
  title        = {Efficiently tracking application interactions using lightweight virtualization},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security,
                  VMSec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456482.1456486},
  doi          = {10.1145/1456482.1456486},
  timestamp    = {Wed, 04 May 2022 13:02:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangSGJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArdagnaSJSM08,
  author       = {Claudio A. Ardagna and
                  Angelos Stavrou and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Rhandi Martin},
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks},
  booktitle    = {Proceedings of the 1st International Workshop on Privacy in Location-Based
                  Applications, Malaga, Spain, October 9, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {397},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-397/paper6.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:59 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ArdagnaSJSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LocastoSCKS08,
  author       = {Michael E. Locasto and
                  Angelos Stavrou and
                  Gabriela F. Cretu and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Return Value Predictability Profiles for Self-healing},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {152--166},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_10},
  doi          = {10.1007/978-3-540-89598-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LocastoSCKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AndroulakiRSSB08,
  author       = {Elli Androulaki and
                  Mariana Raykova and
                  Shreyas Srivatsan and
                  Angelos Stavrou and
                  Steven M. Bellovin},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {{PAR:} Payment for Anonymous Routing},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_14},
  doi          = {10.1007/978-3-540-70630-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AndroulakiRSSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/SabzevarS08,
  author       = {Alireza Pirayesh Sabzevar and
                  Angelos Stavrou},
  editor       = {Richard Chbeir and
                  Albert Dipanda and
                  Kokou Y{\'{e}}tongnon},
  title        = {Universal Multi-Factor Authentication Using Graphical Passwords},
  booktitle    = {4th {IEEE} International Conference on Signal Image Technology and
                  Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30
                  - December 3, 2008},
  pages        = {625--632},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SITIS.2008.92},
  doi          = {10.1109/SITIS.2008.92},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/SabzevarS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/ChakravartySK08,
  author       = {Sambuddho Chakravarty and
                  Angelos Stavrou and
                  Angelos D. Keromytis},
  editor       = {Richard Chbeir and
                  Albert Dipanda and
                  Kokou Y{\'{e}}tongnon},
  title        = {Identifying Proxy Nodes in a Tor Anonymization Circuit},
  booktitle    = {4th {IEEE} International Conference on Signal Image Technology and
                  Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30
                  - December 3, 2008},
  pages        = {633--639},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SITIS.2008.93},
  doi          = {10.1109/SITIS.2008.93},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/ChakravartySK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CretuSLSK08,
  author       = {Gabriela F. Cretu and
                  Angelos Stavrou and
                  Michael E. Locasto and
                  Salvatore J. Stolfo and
                  Angelos D. Keromytis},
  title        = {Casting out Demons: Sanitizing Training Data for Anomaly Sensors},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {81--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.11},
  doi          = {10.1109/SP.2008.11},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CretuSLSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008vmsec,
  editor       = {Jason Nieh and
                  Angelos Stavrou},
  title        = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security,
                  VMSec 2008, Alexandria, VA, USA, October 27, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://dl.acm.org/doi/10.1145/1456482},
  doi          = {10.1145/1456482},
  isbn         = {978-1-60558-298-6},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2008vmsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SongLSKS07,
  author       = {Yingbo Song and
                  Michael E. Locasto and
                  Angelos Stavrou and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {On the infeasibility of modeling polymorphic shellcode},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {541--551},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315312},
  doi          = {10.1145/1315245.1315312},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SongLSKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsware/StavrouTKP07,
  author       = {Angelos Stavrou and
                  David Turner and
                  Angelos D. Keromytis and
                  Vassilis Prevelakis},
  editor       = {Sanjoy Paul and
                  Henning Schulzrinne and
                  G. Venkatesh},
  title        = {Bridging the Network Reservation Gap Using Overlays},
  booktitle    = {Proceedings of the Second International Conference on COMmunication
                  System softWAre and MiddlewaRE {(COMSWARE} 2007), January 7-12, 2007,
                  Bangalore, India},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/COMSWA.2007.382490},
  doi          = {10.1109/COMSWA.2007.382490},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/comsware/StavrouTKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LiSSAK07,
  author       = {Wei{-}Jen Li and
                  Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Elli Androulaki and
                  Angelos D. Keromytis},
  editor       = {Bernhard M. H{\"{a}}mmerli and
                  Robin Sommer},
  title        = {A Study of Malcode-Bearing Documents},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
                  July 12-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4579},
  pages        = {231--250},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73614-1\_14},
  doi          = {10.1007/978-3-540-73614-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LiSSAK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/LocastoSCS07,
  author       = {Michael E. Locasto and
                  Angelos Stavrou and
                  Gabriela F. Cretu and
                  Angelos D. Keromytis},
  editor       = {Jeff Chase and
                  Srinivasan Seshan},
  title        = {From {STEM} to {SEAD:} Speculative Execution for Automated Defense},
  booktitle    = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa
                  Clara, CA, USA, June 17-22, 2007},
  pages        = {219--232},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/usenix07/tech/locasto.html},
  timestamp    = {Mon, 01 Feb 2021 08:43:36 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/LocastoSCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/StavrouLK06,
  author       = {Angelos Stavrou and
                  Michael E. Locasto and
                  Angelos D. Keromytis},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {W3Bcrypt: Encryption as a Stylesheet},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {349--364},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_24},
  doi          = {10.1007/11767480\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/StavrouLK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LocastoSK06,
  author       = {Michael E. Locasto and
                  Angelos Stavrou and
                  Angelos D. Keromytis},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Dark application communities},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278943},
  timestamp    = {Thu, 29 Nov 2018 11:17:10 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LocastoSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/StavrouCMKMR05,
  author       = {Angelos Stavrou and
                  Debra L. Cook and
                  William G. Morein and
                  Angelos D. Keromytis and
                  Vishal Misra and
                  Dan Rubenstein},
  title        = {WebSOS: an overlay-based system for protecting web servers from denial
                  of service attacks},
  journal      = {Comput. Networks},
  volume       = {48},
  number       = {5},
  pages        = {781--807},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.comnet.2005.01.005},
  doi          = {10.1016/J.COMNET.2005.01.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/StavrouCMKMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StavrouK05,
  author       = {Angelos Stavrou and
                  Angelos D. Keromytis},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Countering DoS attacks with stateless multipath overlays},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {249--259},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102153},
  doi          = {10.1145/1102120.1102153},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/StavrouK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChouSIK05,
  author       = {Stephen T. Chou and
                  Angelos Stavrou and
                  John Ioannidis and
                  Angelos D. Keromytis},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {\emph{gore}: Routing-Assisted Defense Against DDoS Attacks},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_13},
  doi          = {10.1007/11556992\_13},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ChouSIK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StavrouKNMR05,
  author       = {Angelos Stavrou and
                  Angelos D. Keromytis and
                  Jason Nieh and
                  Vishal Misra and
                  Dan Rubenstein},
  title        = {{MOVE:} An End-to-End Solution to Network Denial of Service},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2005, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2005},
  url          = {https://www.ndss-symposium.org/ndss2005/move-end-end-solution-network-denial-service/},
  timestamp    = {Mon, 01 Feb 2021 08:42:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/StavrouKNMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/StavrouRS04,
  author       = {Angelos Stavrou and
                  Dan Rubenstein and
                  Sambit Sahu},
  title        = {A lightweight, robust {P2P} system to handle flash crowds},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {22},
  number       = {1},
  pages        = {6--17},
  year         = {2004},
  url          = {https://doi.org/10.1109/JSAC.2003.818778},
  doi          = {10.1109/JSAC.2003.818778},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/StavrouRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/CoffmanCRSS04,
  author       = {Edward G. Coffman Jr. and
                  Andreas Constantinides and
                  Dan Rubenstein and
                  F. Bruce Shepherd and
                  Angelos Stavrou},
  title        = {Content distribution for seamless transmission},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {32},
  number       = {2},
  pages        = {31--32},
  year         = {2004},
  url          = {https://doi.org/10.1145/1035334.1035347},
  doi          = {10.1145/1035334.1035347},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/CoffmanCRSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/StavrouIKMR04,
  author       = {Angelos Stavrou and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Vishal Misra and
                  Dan Rubenstein},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {A Pay-per-Use DoS Protection Mechanism for the Web},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {120--134},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_9},
  doi          = {10.1007/978-3-540-24852-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/StavrouIKMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoreinSCKMR03,
  author       = {William G. Morein and
                  Angelos Stavrou and
                  Debra L. Cook and
                  Angelos D. Keromytis and
                  Vishal Misra and
                  Dan Rubenstein},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Using graphic turing tests to counter automated DDoS attacks against
                  web servers},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {8--19},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948114},
  doi          = {10.1145/948109.948114},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MoreinSCKMR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/StavrouRS02,
  author       = {Angelos Stavrou and
                  Dan Rubenstein and
                  Sambit Sahu},
  title        = {A lightweight, robust {P2P} system to handle flash crowds},
  journal      = {Comput. Commun. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {17},
  year         = {2002},
  url          = {https://doi.org/10.1145/571697.571706},
  doi          = {10.1145/571697.571706},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/StavrouRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/StavrouRS02,
  author       = {Angelos Stavrou and
                  Dan Rubenstein and
                  Sambit Sahu},
  title        = {A Lightweight, Robust {P2P} System to Handle Flash Crowds},
  booktitle    = {10th {IEEE} International Conference on Network Protocols {(ICNP}
                  2002), 12-15 November 2002, Paris, France, Proceedings},
  pages        = {226--235},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICNP.2002.1181410},
  doi          = {10.1109/ICNP.2002.1181410},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/StavrouRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics