Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Angelos Stavrou
@article{DBLP:journals/jcs/ZhangWS24, author = {Yubao Zhang and Haining Wang and Angelos Stavrou}, title = {A multiview clustering framework for detecting deceptive reviews}, journal = {J. Comput. Secur.}, volume = {32}, number = {1}, pages = {31--52}, year = {2024}, url = {https://doi.org/10.3233/JCS-220001}, doi = {10.3233/JCS-220001}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/ZhangWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FamiliSWP24, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, title = {{OPTILOD:} Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones}, journal = {Sensors}, volume = {24}, number = {6}, pages = {1865}, year = {2024}, url = {https://doi.org/10.3390/s24061865}, doi = {10.3390/S24061865}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FamiliSWP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RobieFS23, author = {John Robie and Alireza Famili and Angelos Stavrou}, title = {Revisiting the Spaceborne Illuminators of Opportunity for Airborne Object Tracking}, journal = {Computer}, volume = {56}, number = {1}, pages = {82--92}, year = {2023}, url = {https://doi.org/10.1109/MC.2022.3196190}, doi = {10.1109/MC.2022.3196190}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RobieFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/FamiliSWP23, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Park}, title = {iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {16}, pages = {14226--14238}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3280084}, doi = {10.1109/JIOT.2023.3280084}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/FamiliSWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/FamiliASWP23, author = {Alireza Famili and Tolga O. Atalay and Angelos Stavrou and Haining Wang and Jung{-}Min Park}, title = {{OFDRA:} Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {41}, number = {12}, pages = {3783--3798}, year = {2023}, url = {https://doi.org/10.1109/JSAC.2023.3322821}, doi = {10.1109/JSAC.2023.3322821}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/FamiliASWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/FamiliSWP23, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Park}, title = {{PILOT:} High-Precision Indoor Localization for Autonomous Drones}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {5}, pages = {6445--6459}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3229628}, doi = {10.1109/TVT.2022.3229628}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/FamiliSWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AtalayFSS23, author = {Tolga O. Atalay and Alireza Famili and Dragoslav Stojadinovic and Angelos Stavrou}, title = {Demystifying 5G Traffic Patterns with an Indoor {RAN} Measurement Campaign}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {1185--1190}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437330}, doi = {10.1109/GLOBECOM54140.2023.10437330}, timestamp = {Sun, 10 Mar 2024 10:39:12 +0100}, biburl = {https://dblp.org/rec/conf/globecom/AtalayFSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LiuJ0ZLSW23, author = {Guannan Liu and Lin Jin and Shuai Hao and Yubao Zhang and Daiping Liu and Angelos Stavrou and Haining Wang}, editor = {Marie{-}Jos{\'{e}} Montpetit and Aris Leivadeas and Steve Uhlig and Mobin Javed}, title = {Dial "N" for NXDomain: The Scale, Origin, and Security Implications of {DNS} Queries to Non-Existent Domains}, booktitle = {Proceedings of the 2023 {ACM} on Internet Measurement Conference, {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023}, pages = {198--212}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3618257.3624805}, doi = {10.1145/3618257.3624805}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/LiuJ0ZLSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AtalayMSSW23, author = {Tolga O. Atalay and Sudip Maitra and Dragoslav Stojadinovic and Angelos Stavrou and Haining Wang}, title = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps}, booktitle = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications, New York City, NY, USA, May 17-20, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/INFOCOM53939.2023.10228961}, doi = {10.1109/INFOCOM53939.2023.10228961}, timestamp = {Tue, 05 Sep 2023 20:33:21 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AtalayMSSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metacom/FamiliASW23, author = {Alireza Famili and Tolga O. Atalay and Angelos Stavrou and Haining Wang}, title = {Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks}, booktitle = {{IEEE} International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023}, pages = {17--24}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MetaCom57706.2023.00019}, doi = {10.1109/METACOM57706.2023.00019}, timestamp = {Thu, 21 Mar 2024 17:12:49 +0100}, biburl = {https://dblp.org/rec/conf/metacom/FamiliASW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/FamiliSLS23, author = {Alireza Famili and Vladyslav Slyusar and Yun Ho Lee and Angelos Stavrou}, title = {Vehicular Teamwork for Better Positioning}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2023, Honolulu, Oahu, HI, USA, October 1-4, 2023}, pages = {3507--3513}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SMC53992.2023.10393920}, doi = {10.1109/SMC53992.2023.10393920}, timestamp = {Tue, 13 Feb 2024 09:22:04 +0100}, biburl = {https://dblp.org/rec/conf/smc/FamiliSLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/svcc/FamiliSWP23, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, title = {{EGO-6:} Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs}, booktitle = {Silicon Valley Cybersecurity Conference, {SVCC} 2023, San Jose, CA, USA, May 17-19, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SVCC56964.2023.10165032}, doi = {10.1109/SVCC56964.2023.10165032}, timestamp = {Mon, 10 Jul 2023 15:09:49 +0200}, biburl = {https://dblp.org/rec/conf/svcc/FamiliSWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/FamiliASW23, author = {Alireza Famili and Tolga O. Atalay and Angelos Stavrou and Haining Wang}, title = {Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation}, booktitle = {97th {IEEE} Vehicular Technology Conference, {VTC} Spring 2023, Florence, Italy, June 20-23, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Spring57618.2023.10201144}, doi = {10.1109/VTC2023-SPRING57618.2023.10201144}, timestamp = {Fri, 25 Aug 2023 08:20:01 +0200}, biburl = {https://dblp.org/rec/conf/vtc/FamiliASW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-04833, author = {Tolga O. Atalay and Dragoslav Stojadinovic and Alireza Famili and Angelos Stavrou and Haining Wang}, title = {A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes}, journal = {CoRR}, volume = {abs/2312.04833}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.04833}, doi = {10.48550/ARXIV.2312.04833}, eprinttype = {arXiv}, eprint = {2312.04833}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-04833.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/GaoXWS22, author = {Xing Gao and Jidong Xiao and Haining Wang and Angelos Stavrou}, title = {Understanding the Security Implication of Aborting Virtual Machine Live Migration}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {2}, pages = {1275--1286}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.2982900}, doi = {10.1109/TCC.2020.2982900}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/GaoXWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangEZ0SL22, author = {Yuqing Yang and Mohamed Elsabagh and Chaoshun Zuo and Ryan Johnson and Angelos Stavrou and Zhiqiang Lin}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Detecting and Measuring Misconfigured Manifests in Android Apps}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3063--3077}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560607}, doi = {10.1145/3548606.3560607}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YangEZ0SL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AtalaySFSW22, author = {Tolga O. Atalay and Dragoslav Stojadinovic and Alireza Famili and Angelos Stavrou and Haining Wang}, title = {Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End 5G Testbed}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {2056--2061}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001579}, doi = {10.1109/GLOBECOM48099.2022.10001579}, timestamp = {Tue, 17 Jan 2023 08:56:31 +0100}, biburl = {https://dblp.org/rec/conf/globecom/AtalaySFSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincom/FamiliFASW22, author = {Alireza Famili and Mahsa Foruhandeh and Tolga O. Atalay and Angelos Stavrou and Haining Wang}, editor = {Igor M. Moraes and Miguel Elias M. Campista and Yacine Ghamri{-}Doudane and Lu{\'{\i}}s Henrique M. K. Costa and Marcelo G. Rubinstein}, title = {{GPS} Spoofing Detection by Leveraging 5G Positioning Capabilities}, booktitle = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022, Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/LATINCOM56090.2022.10000569}, doi = {10.1109/LATINCOM56090.2022.10000569}, timestamp = {Mon, 09 Jan 2023 17:07:16 +0100}, biburl = {https://dblp.org/rec/conf/latincom/FamiliFASW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincom/FamiliSWP22, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, editor = {Igor M. Moraes and Miguel Elias M. Campista and Yacine Ghamri{-}Doudane and Lu{\'{\i}}s Henrique M. K. Costa and Marcelo G. Rubinstein}, title = {{SPIN:} Sensor Placement for Indoor Navigation of Drones}, booktitle = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022, Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/LATINCOM56090.2022.10000583}, doi = {10.1109/LATINCOM56090.2022.10000583}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincom/FamiliSWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DittmerILOEKSS22, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {Streaming and Unbalanced {PSI} from Function Secret Sharing}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {564--587}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_25}, doi = {10.1007/978-3-031-14791-3\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DittmerILOEKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/FamiliSWP22, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, title = {{RAIL:} Robust Acoustic Indoor Localization for Drones}, booktitle = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki, Finland, June 19-22, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860933}, doi = {10.1109/VTC2022-SPRING54318.2022.9860933}, timestamp = {Wed, 25 Jan 2023 10:28:23 +0100}, biburl = {https://dblp.org/rec/conf/vtc/FamiliSWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/RoySMZDK22, author = {Sunanda Roy and Angelos Stavrou and Brian L. Mark and Kai Zeng and Sai Manoj P. D. and Khaled N. Khasawneh}, title = {Characterization of {AES} Implementations on Microprocessor-based IoT Devices}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2022, Austin, TX, USA, April 10-13, 2022}, pages = {55--60}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WCNC51071.2022.9771975}, doi = {10.1109/WCNC51071.2022.9771975}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/RoySMZDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/AtalaySSW22, author = {Tolga O. Atalay and Dragoslav Stojadinovic and Angelos Stavrou and Haining Wang}, title = {Scaling Network Slices with a 5G Testbed: {A} Resource Consumption Study}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2022, Austin, TX, USA, April 10-13, 2022}, pages = {2649--2654}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WCNC51071.2022.9771860}, doi = {10.1109/WCNC51071.2022.9771860}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/AtalaySSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2022, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606}, doi = {10.1145/3548606}, isbn = {978-1-4503-9450-5}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-10488, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, title = {{PILOT:} High-Precision Indoor Localization for Autonomous Drones}, journal = {CoRR}, volume = {abs/2201.10488}, year = {2022}, url = {https://arxiv.org/abs/2201.10488}, eprinttype = {arXiv}, eprint = {2201.10488}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-10488.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-10691, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Park}, title = {{OPTILOD:} Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones}, journal = {CoRR}, volume = {abs/2201.10691}, year = {2022}, url = {https://arxiv.org/abs/2201.10691}, eprinttype = {arXiv}, eprint = {2201.10691}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-10691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-11465, author = {Tolga O. Atalay and Sudip Maitra and Dragoslav Stojadinovic and Angelos Stavrou and Haining Wang}, title = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps}, journal = {CoRR}, volume = {abs/2212.11465}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.11465}, doi = {10.48550/ARXIV.2212.11465}, eprinttype = {arXiv}, eprint = {2212.11465}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-11465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StarkDOBEKS21, author = {Emily Stark and Joe DeBlasio and Devon O'Brien and Davide Balzarotti and William Enck and Samuel King and Angelos Stavrou}, title = {Certificate Transparency in Google Chrome: Past, Present, and Future}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {112--118}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3103461}, doi = {10.1109/MSEC.2021.3103461}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/StarkDOBEKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ConnellyR0XWS21, author = {Joseph Connelly and Taylor Roberts and Xing Gao and Jidong Xiao and Haining Wang and Angelos Stavrou}, title = {CloudSkulk: {A} Nested Virtual Machine Based Rootkit and Its Detection}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {350--362}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00047}, doi = {10.1109/DSN48987.2021.00047}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/ConnellyR0XWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotdi/ChatzigiannisBK21, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi and Constantinos Kolias and Angelos Stavrou}, title = {Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors}, booktitle = {IoTDI '21: International Conference on Internet-of-Things Design and Implementation, Virtual Event / Charlottesville, VA, USA, May 18-21, 2021}, pages = {1--14}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450268.3453536}, doi = {10.1145/3450268.3453536}, timestamp = {Thu, 20 May 2021 08:39:53 +0200}, biburl = {https://dblp.org/rec/conf/iotdi/ChatzigiannisBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiE0S21, author = {Yuede Ji and Mohamed Elsabagh and Ryan Johnson and Angelos Stavrou}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {DEFInit: An Analysis of Exposed Android Init Routines}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3685--3702}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ji}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiE0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-04028, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi and Constantinos Kolias and Angelos Stavrou}, title = {Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors}, journal = {CoRR}, volume = {abs/2103.04028}, year = {2021}, url = {https://arxiv.org/abs/2103.04028}, eprinttype = {arXiv}, eprint = {2103.04028}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-04028.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OsterweilSZ20, author = {Eric Osterweil and Angelos Stavrou and Lixia Zhang}, title = {21 Years of Distributed Denial-of Service: Current State of Affairs}, journal = {Computer}, volume = {53}, number = {7}, pages = {88--92}, year = {2020}, url = {https://doi.org/10.1109/MC.2020.2983711}, doi = {10.1109/MC.2020.2983711}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OsterweilSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OsterweilS020, author = {Eric Osterweil and Angelos Stavrou and Lixia Zhang}, title = {21 Years of Distributed Denial-of-Service: {A} Call to Action}, journal = {Computer}, volume = {53}, number = {8}, pages = {94--99}, year = {2020}, url = {https://doi.org/10.1109/MC.2020.2993330}, doi = {10.1109/MC.2020.2993330}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/OsterweilS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/DouglisS20, author = {Fred Douglis and Angelos Stavrou}, title = {Distributed Ledger Technologies}, journal = {{IEEE} Internet Comput.}, volume = {24}, number = {3}, pages = {5--6}, year = {2020}, url = {https://doi.org/10.1109/MIC.2020.3002415}, doi = {10.1109/MIC.2020.3002415}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/DouglisS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/YuanWOLWRSZTBYW20, author = {Yong Yuan and Shouyang Wang and David L. Olson and James H. Lambert and Fei{-}Yue Wang and Chunming Rong and Angelos Stavrou and Jun Zhang and Qiang Tang and Foteini Baldimtsi and Laurence T. Yang and Desheng Wu}, title = {Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {50}, number = {1}, pages = {2--8}, year = {2020}, url = {https://doi.org/10.1109/TSMC.2019.2959929}, doi = {10.1109/TSMC.2019.2959929}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/YuanWOLWRSZTBYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/BaarziKFS20, author = {Ataollah Fatahi Baarzi and George Kesidis and Dan Fleck and Angelos Stavrou}, editor = {Lorenzo Cavallaro and Andrea Lanzi}, title = {Microservices made attack-resilient using unsupervised service fissioning}, booktitle = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys 2020, Heraklion, Greece, April 27, 2020}, pages = {31--36}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3380786.3391395}, doi = {10.1145/3380786.3391395}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/BaarziKFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Elsabagh0SZZL20, author = {Mohamed Elsabagh and Ryan Johnson and Angelos Stavrou and Chaoshun Zuo and Qingchuan Zhao and Zhiqiang Lin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{FIRMSCOPE:} Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2379--2396}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/elsabagh}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Elsabagh0SZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-13053, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou}, title = {Function Secret Sharing for {PSI-CA:} With Applications to Private Contact Tracing}, journal = {CoRR}, volume = {abs/2012.13053}, year = {2020}, url = {https://arxiv.org/abs/2012.13053}, eprinttype = {arXiv}, eprint = {2012.13053}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-13053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DittmerILOEKSS20, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou}, title = {Function Secret Sharing for {PSI-CA:} With Applications to Private Contact Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1599}, year = {2020}, url = {https://eprint.iacr.org/2020/1599}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DittmerILOEKSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-02739, author = {Eric Osterweil and Angelos Stavrou and Lixia Zhang}, title = {20 Years of DDoS: a Call to Action}, journal = {CoRR}, volume = {abs/1904.02739}, year = {2019}, url = {http://arxiv.org/abs/1904.02739}, eprinttype = {arXiv}, eprint = {1904.02739}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-02739.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VoasKKSK18, author = {Jeffrey M. Voas and Rick Kuhn and Constantinos Kolias and Angelos Stavrou and Georgios Kambourakis}, title = {Cybertrust in the IoT Age}, journal = {Computer}, volume = {51}, number = {7}, pages = {12--15}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011043}, doi = {10.1109/MC.2018.3011043}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VoasKKSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ElsabaghBFS18, author = {Mohamed Elsabagh and Daniel Barbar{\'{a}} and Dan Fleck and Angelos Stavrou}, title = {On early detection of application-level resource exhaustion and starvation}, journal = {J. Syst. Softw.}, volume = {137}, pages = {430--447}, year = {2018}, url = {https://doi.org/10.1016/j.jss.2017.02.043}, doi = {10.1016/J.JSS.2017.02.043}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/ElsabaghBFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLSW18, author = {Fengwei Zhang and Kevin Leach and Angelos Stavrou and Haining Wang}, title = {Towards Transparent Debugging}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {321--335}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2545671}, doi = {10.1109/TDSC.2016.2545671}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0002ESO18, author = {Ryan Johnson and Mohamed Elsabagh and Angelos Stavrou and Jeff Offutt}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Dazed Droids: {A} Longitudinal Study of Android Inter-App Vulnerabilities}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {777--791}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196549}, doi = {10.1145/3196494.3196549}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0002ESO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Elsabagh0S18, author = {Mohamed Elsabagh and Ryan Johnson and Angelos Stavrou}, title = {Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625133}, doi = {10.1109/DESEC.2018.8625133}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/Elsabagh0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FleckSKNSK18, author = {Daniel Fleck and Angelos Stavrou and George Kesidis and Neda Nasiriani and Yuquan Shan and Takis Konstantopoulos}, title = {Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625162}, doi = {10.1109/DESEC.2018.8625162}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FleckSKNSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuLCCYLWS18, author = {Haitao Xu and Zhao Li and Chen Chu and Yuanmi Chen and Yifan Yang and Haifeng Lu and Haining Wang and Angelos Stavrou}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {143--163}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_8}, doi = {10.1007/978-3-319-98989-1\_8}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/XuLCCYLWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KesidisSFSK18, author = {George Kesidis and Yuquan Shan and Daniel Fleck and Angelos Stavrou and Takis Konstantopoulos}, title = {An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance\({}^{\mbox{*}}\)}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {61--67}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659359}, doi = {10.1109/MALWARE.2018.8659359}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/malware/KesidisSFSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HaoZWS18, author = {Shuai Hao and Yubao Zhang and Haining Wang and Angelos Stavrou}, editor = {William Enck and Adrienne Porter Felt}, title = {End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1129--1145}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/hao}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HaoZWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosys/2018eurosec, editor = {Angelos Stavrou and Konrad Rieck}, title = {Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys 2018, Porto, Portugal, April 23, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3193111}, doi = {10.1145/3193111}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/2018eurosec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StavrouV17, author = {Angelos Stavrou and Jeffrey M. Voas}, title = {Verified Time}, journal = {Computer}, volume = {50}, number = {3}, pages = {78--82}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.63}, doi = {10.1109/MC.2017.63}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StavrouV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KoliasKSV17, author = {Constantinos Kolias and Georgios Kambourakis and Angelos Stavrou and Jeffrey M. Voas}, title = {DDoS in the IoT: Mirai and Other Botnets}, journal = {Computer}, volume = {50}, number = {7}, pages = {80--84}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.201}, doi = {10.1109/MC.2017.201}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/KoliasKSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/join/AuffretSSKKRSSA17, author = {Jean{-}Pierre Auffret and Jane L. Snowdon and Angelos Stavrou and Jeffrey S. Katz and Diana Kelley and Rasheq S. Rahman and Frank Stein and Lisa Sokol and Peter Allor and Peng Warweg}, title = {Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems}, journal = {J. Interconnect. Networks}, volume = {17}, number = {1}, pages = {1740001:1--1740001:20}, year = {2017}, url = {https://doi.org/10.1142/S0219265917400011}, doi = {10.1142/S0219265917400011}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/join/AuffretSSKKRSSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/XuLWS17, author = {Haitao Xu and Daiping Liu and Haining Wang and Angelos Stavrou}, title = {An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service}, journal = {{ACM} Trans. Web}, volume = {11}, number = {2}, pages = {13:1--13:35}, year = {2017}, url = {https://doi.org/10.1145/2983646}, doi = {10.1145/2983646}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tweb/XuLWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SrinivasanDS17, author = {Avinash Srinivasan and Hunter Dong and Angelos Stavrou}, title = {{FROST:} Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection {\&} Data Loss with Fault tolerance}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {82:1--82:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3106069}, doi = {10.1145/3098954.3106069}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SrinivasanDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ElsabaghFS17, author = {Mohamed Elsabagh and Dan Fleck and Angelos Stavrou}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Strict Virtual Call Integrity Checking for {C++} Binaries}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {140--154}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052976}, doi = {10.1145/3052973.3052976}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ElsabaghFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarameS17, author = {Ghassan O. Karame and Angelos Stavrou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {CCSW'17: 2017 {ACM} Cloud Computing Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2627--2628}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137050}, doi = {10.1145/3133956.3137050}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KarameS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ElsabaghBFS17, author = {Mohamed Elsabagh and Daniel Barbar{\'{a}} and Dan Fleck and Angelos Stavrou}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Detecting {ROP} with Statistical Learning of Program Characteristics}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {219--226}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029812}, doi = {10.1145/3029806.3029812}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ElsabaghBFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiuGZWS17, author = {Daiping Liu and Xing Gao and Mingwei Zhang and Haining Wang and Angelos Stavrou}, title = {Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {615--626}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.20}, doi = {10.1109/DSN.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiuGZWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/KoliasCZS17, author = {Constantinos Kolias and Lucas Copi and Fengwei Zhang and Angelos Stavrou}, editor = {Cristiano Giuffrida and Angelos Stavrou}, title = {Breaking {BLE} Beacons For Fun But Mostly Profit}, booktitle = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC} 2017, Belgrade, Serbia, April 23, 2017}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3065913.3065923}, doi = {10.1145/3065913.3065923}, timestamp = {Tue, 06 Nov 2018 16:58:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/KoliasCZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GaoLLWS17, author = {Xing Gao and Dachuan Liu and Daiping Liu and Haining Wang and Angelos Stavrou}, editor = {Kisung Lee and Ling Liu}, title = {E-Android: {A} New Energy Profiling Tool for Smartphones}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {492--502}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.218}, doi = {10.1109/ICDCS.2017.218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/GaoLLWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BellLBS17, author = {Jonathan Bell and Thomas D. LaToza and Foteini Baldimtsi and Angelos Stavrou}, title = {Advancing Open Science with Version Control and Blockchains}, booktitle = {12th {IEEE/ACM} International Workshop on Software Engineering for Science, SE4Science@ICSE 2017, Buenos Aires, Argentina, May 22, 2017}, pages = {13--14}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SE4Science.2017.11}, doi = {10.1109/SE4SCIENCE.2017.11}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/BellLBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ShanKFS17, author = {Yuquan Shan and George Kesidis and Daniel Fleck and Angelos Stavrou}, title = {Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {67--74}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323958}, doi = {10.1109/MALWARE.2017.8323958}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ShanKFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/KambourakisKS17, author = {Georgios Kambourakis and Constantinos Kolias and Angelos Stavrou}, title = {The Mirai botnet and the IoT Zombie Armies}, booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore, MD, USA, October 23-25, 2017}, pages = {267--272}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MILCOM.2017.8170867}, doi = {10.1109/MILCOM.2017.8170867}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/KambourakisKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/0002MSS17, author = {Ryan Johnson and Rahul Murmuria and Angelos Stavrou and Vincent Sritapan}, title = {Pairing continuous authentication with proactive platform hardening}, booktitle = {2017 {IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March 13-17, 2017}, pages = {88--90}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PERCOMW.2017.7917532}, doi = {10.1109/PERCOMW.2017.7917532}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/percom/0002MSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/MurmuriaSBS17, author = {Rahul Murmuria and Angelos Stavrou and Daniel Barbar{\'{a}} and Vincent Sritapan}, title = {Your data in your hands: Privacy-preserving user behavior models for context computation}, booktitle = {2017 {IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March 13-17, 2017}, pages = {170--175}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PERCOMW.2017.7917552}, doi = {10.1109/PERCOMW.2017.7917552}, timestamp = {Thu, 11 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/MurmuriaSBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ElsabaghFSKB17, author = {Mohamed Elsabagh and Dan Fleck and Angelos Stavrou and Michael Kaplan and Thomas Bowen}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Practical and Accurate Runtime Application Protection Against DoS Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {450--471}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_20}, doi = {10.1007/978-3-319-66332-6\_20}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/ElsabaghFSKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017ccsw, editor = {Bhavani Thuraisingham and Ghassan Karame and Angelos Stavrou}, title = {Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3140649}, isbn = {978-1-4503-5204-8}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2017ccsw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosec/2017, editor = {Cristiano Giuffrida and Angelos Stavrou}, title = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC} 2017, Belgrade, Serbia, April 23, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3065913}, doi = {10.1145/3065913}, isbn = {978-1-4503-4935-2}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShanKFS17, author = {Yuquan Shan and George Kesidis and Daniel Fleck and Angelos Stavrou}, title = {Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems}, journal = {CoRR}, volume = {abs/1704.06794}, year = {2017}, url = {http://arxiv.org/abs/1704.06794}, eprinttype = {arXiv}, eprint = {1704.06794}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShanKFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-01102, author = {Neda Nasiriani and Yuquan Shan and George Kesidis and Daniel Fleck and Angelos Stavrou}, title = {Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks}, journal = {CoRR}, volume = {abs/1712.01102}, year = {2017}, url = {http://arxiv.org/abs/1712.01102}, eprinttype = {arXiv}, eprint = {1712.01102}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-01102.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StavrouFK16, author = {Angelos Stavrou and Daniel Fleck and Constantinos Kolias}, title = {On the Move: Evading Distributed Denial-of-Service Attacks}, journal = {Computer}, volume = {49}, number = {3}, pages = {104--107}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.85}, doi = {10.1109/MC.2016.85}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StavrouFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KoliasKSG16, author = {Constantinos Kolias and Georgios Kambourakis and Angelos Stavrou and Stefanos Gritzalis}, title = {Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {1}, pages = {184--208}, year = {2016}, url = {https://doi.org/10.1109/COMST.2015.2402161}, doi = {10.1109/COMST.2015.2402161}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KoliasKSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KoliasSVBK16, author = {Constantinos Kolias and Angelos Stavrou and Jeffrey M. Voas and Irena Bojanova and D. Richard Kuhn}, title = {Learning Internet-of-Things Security "Hands-On"}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {1}, pages = {37--46}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.4}, doi = {10.1109/MSP.2016.4}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KoliasSVBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/0002ES16, author = {Ryan Johnson and Mohamed Elsabagh and Angelos Stavrou}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {193--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_11}, doi = {10.1007/978-3-319-39555-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/0002ES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SmutzS16, author = {Charles Smutz and Angelos Stavrou}, title = {When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/when-tree-falls-using-diversity-ensemble-classifiers-identify-evasion-malware-detectors.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SmutzS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/MurmuriaS16, author = {Rahul Murmuria and Angelos Stavrou}, title = {Authentication Feature and Model Selection using Penalty Algorithms}, booktitle = {Who Are You?! Adventures in Authentication, WAY@SOUPS 2016, Denver, CO, USA, June 22, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/workshop-program/way2016/presentation/murmuria}, timestamp = {Thu, 04 Aug 2016 15:59:21 +0200}, biburl = {https://dblp.org/rec/conf/soups/MurmuriaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KoliasSV15, author = {Constantinos Kolias and Angelos Stavrou and Jeffrey M. Voas}, title = {Securely Making "Things" Right}, journal = {Computer}, volume = {48}, number = {9}, pages = {84--88}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.258}, doi = {10.1109/MC.2015.258}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KoliasSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangLWS15, author = {Fengwei Zhang and Kevin Leach and Haining Wang and Angelos Stavrou}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {TrustLogin: Securing Password-Login on Commodity Operating Systems}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {333--344}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714614}, doi = {10.1145/2714576.2714614}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangLWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/0002KSS15, author = {Ryan Johnson and Nikolaos Kiourtis and Angelos Stavrou and Vincent Sritapan}, title = {Analysis of content copyright infringement in mobile application markets}, booktitle = {2015 {APWG} Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015}, pages = {43--52}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECRIME.2015.7120798}, doi = {10.1109/ECRIME.2015.7120798}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/0002KSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/HaoWSS15, author = {Shuai Hao and Haining Wang and Angelos Stavrou and Evgenia Smirni}, title = {On the {DNS} Deployment of Modern Web Services}, booktitle = {23rd {IEEE} International Conference on Network Protocols, {ICNP} 2015, San Francisco, CA, USA, November 10-13, 2015}, pages = {100--110}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICNP.2015.37}, doi = {10.1109/ICNP.2015.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/HaoWSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/0002ESS15, author = {Ryan Johnson and Mohamed Elsabagh and Angelos Stavrou and Vincent Sritapan}, title = {Targeted DoS on android: how to disable android in 10 seconds or less}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {136--143}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413694}, doi = {10.1109/MALWARE.2015.7413694}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/0002ESS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SmutzS15, author = {Charles Smutz and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Preventing Exploits in Microsoft Office Documents Through Content Randomization}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {225--246}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_11}, doi = {10.1007/978-3-319-26362-5\_11}, timestamp = {Sun, 25 Oct 2020 22:56:09 +0100}, biburl = {https://dblp.org/rec/conf/raid/SmutzS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MurmuriaSBF15, author = {Rahul Murmuria and Angelos Stavrou and Daniel Barbar{\'{a}} and Dan Fleck}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {405--424}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_19}, doi = {10.1007/978-3-319-26362-5\_19}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MurmuriaSBF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuWS15, author = {Haitao Xu and Haining Wang and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Privacy Risk Assessment on Online Photos}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {427--447}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_20}, doi = {10.1007/978-3-319-26362-5\_20}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/XuWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ElsabaghBFS15, author = {Mohamed Elsabagh and Daniel Barbar{\'{a}} and Dan Fleck and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {515--537}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_24}, doi = {10.1007/978-3-319-26362-5\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ElsabaghBFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangLSWS15, author = {Fengwei Zhang and Kevin Leach and Angelos Stavrou and Haining Wang and Kun Sun}, title = {Using Hardware Features for Increased Debugging Transparency}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {55--69}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.11}, doi = {10.1109/SP.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangLSWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/XuLWS15, author = {Haitao Xu and Daiping Liu and Haining Wang and Angelos Stavrou}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service}, booktitle = {Proceedings of the 24th International Conference on World Wide Web, {WWW} 2015, Florence, Italy, May 18-22, 2015}, pages = {1296--1306}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2736277.2741650}, doi = {10.1145/2736277.2741650}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/XuLWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangJFPLS14, author = {Huangxin Wang and Quan Jia and Dan Fleck and Walter Powell and Fei Li and Angelos Stavrou}, title = {A moving target DDoS defense mechanism}, journal = {Comput. Commun.}, volume = {46}, pages = {10--21}, year = {2014}, url = {https://doi.org/10.1016/j.comcom.2014.03.009}, doi = {10.1016/J.COMCOM.2014.03.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/WangJFPLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangWSS14, author = {Fengwei Zhang and Jiang Wang and Kun Sun and Angelos Stavrou}, title = {HyperCheck: {A} Hardware-AssistedIntegrity Monitor}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {332--344}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.53}, doi = {10.1109/TDSC.2013.53}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangWSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CooleyWS14, author = {Brett Cooley and Haining Wang and Angelos Stavrou}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Activity Spoofing and Its Defense in Android Smartphones}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {494--512}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_29}, doi = {10.1007/978-3-319-07536-5\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CooleyWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiuWS14, author = {Daiping Liu and Haining Wang and Angelos Stavrou}, title = {Detecting Malicious Javascript in {PDF} through Document Instrumentation}, booktitle = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014}, pages = {100--111}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DSN.2014.92}, doi = {10.1109/DSN.2014.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiuWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/JiaWFLSP14, author = {Quan Jia and Huangxin Wang and Dan Fleck and Fei Li and Angelos Stavrou and Walter Powell}, title = {Catch Me If You Can: {A} Cloud-Enabled DDoS Defense}, booktitle = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014}, pages = {264--275}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DSN.2014.35}, doi = {10.1109/DSN.2014.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/JiaWFLSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangWLS14, author = {Fengwei Zhang and Haining Wang and Kevin Leach and Angelos Stavrou}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {A Framework to Secure Peripherals at Runtime}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {219--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_13}, doi = {10.1007/978-3-319-11203-9\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhangWLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuLKWS14, author = {Haitao Xu and Daiping Liu and Aaron Koehl and Haining Wang and Angelos Stavrou}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Click Fraud Detection on the Advertiser Side}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {419--438}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_24}, doi = {10.1007/978-3-319-11212-1\_24}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/XuLKWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HiremagaloreBFPS14, author = {Sharath Hiremagalore and Daniel Barbar{\'{a}} and Dan Fleck and Walter Powell and Angelos Stavrou}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {transAD: An Anomaly Detection Network Intrusion Sensor for the Web}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {477--489}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_30}, doi = {10.1007/978-3-319-13257-0\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/HiremagaloreBFPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2014, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1}, doi = {10.1007/978-3-319-11379-1}, isbn = {978-3-319-11378-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/HiremagaloreLSR13, author = {Sharath Hiremagalore and Chen Liang and Angelos Stavrou and Huzefa Rangwala}, title = {Improving network response times using social information}, journal = {Soc. Netw. Anal. Min.}, volume = {3}, number = {2}, pages = {209--220}, year = {2013}, url = {https://doi.org/10.1007/s13278-012-0065-9}, doi = {10.1007/S13278-012-0065-9}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/HiremagaloreLSR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ArdagnaJSS13, author = {Claudio A. Ardagna and Sushil Jajodia and Pierangela Samarati and Angelos Stavrou}, title = {Providing Users' Anonymity in Mobile Hybrid Networks}, journal = {{ACM} Trans. Internet Techn.}, volume = {12}, number = {3}, pages = {7:1--7:33}, year = {2013}, url = {https://doi.org/10.1145/2461321.2461322}, doi = {10.1145/2461321.2461322}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/ArdagnaJSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/JiaSS13, author = {Quan Jia and Kun Sun and Angelos Stavrou}, title = {Capability-Based Defenses Against DoS Attacks in Multi-path {MANET} Communications}, journal = {Wirel. Pers. Commun.}, volume = {73}, number = {1}, pages = {127--148}, year = {2013}, url = {https://doi.org/10.1007/s11277-013-1297-3}, doi = {10.1007/S11277-013-1297-3}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/JiaSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FleckTASN13, author = {Dan Fleck and Arnur G. Tokhtabayev and Alex Alarif and Angelos Stavrou and Tomas Nykodym}, title = {PyTrigger: {A} System to Trigger {\&} Extract User-Activated Malware Behavior}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {92--101}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.16}, doi = {10.1109/ARES.2013.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FleckTASN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ApplegateS13, author = {Scott D. Applegate and Angelos Stavrou}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Towards a Cyber Conflict Taxonomy}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--18}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568391/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/ApplegateS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ZhangLSS13, author = {Fengwei Zhang and Kevin Leach and Kun Sun and Angelos Stavrou}, title = {{SPECTRE:} {A} dependable introspection framework via System Management Mode}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575343}, doi = {10.1109/DSN.2013.6575343}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ZhangLSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/JiaSS13, author = {Quan Jia and Kun Sun and Angelos Stavrou}, title = {{MOTAG:} Moving Target Defense against Internet Denial of Service Attacks}, booktitle = {22nd International Conference on Computer Communication and Networks, {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCCN.2013.6614155}, doi = {10.1109/ICCCN.2013.6614155}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/JiaSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/SrinivasanNS13, author = {Avinash Srinivasan and Srinath Thirthahalli Nazaraj and Angelos Stavrou}, title = {{HIDEINSIDE} - {A} novel randomized {\&} encrypted antiforensic information hiding}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2013, San Diego, CA, USA, January 28-31, 2013}, pages = {626--631}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICCNC.2013.6504159}, doi = {10.1109/ICCNC.2013.6504159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/SrinivasanNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/Stavrou13, author = {Angelos Stavrou}, title = {Programming on Android: Best Practices for Security and Reliability}, booktitle = {{IEEE} 7th International Conference on Software Security and Reliability, {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013}, pages = {1--2}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE.2013.37}, doi = {10.1109/SERE.2013.37}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/Stavrou13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/KaramiENS13, author = {Mohammad Karami and Mohamed Elsabagh and Parnian Najafiborazjani and Angelos Stavrou}, title = {Behavioral Analysis of Android Applications Using Automated Instrumentation}, booktitle = {Seventh International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion Volume}, pages = {182--187}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE-C.2013.35}, doi = {10.1109/SERE-C.2013.35}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/KaramiENS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/0002S13, author = {Ryan Johnson and Angelos Stavrou}, title = {Forced-Path Execution for Android Applications on x86 Platforms}, booktitle = {Seventh International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion Volume}, pages = {188--197}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE-C.2013.36}, doi = {10.1109/SERE-C.2013.36}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/0002S13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2013, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4}, doi = {10.1007/978-3-642-41284-4}, isbn = {978-3-642-41283-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StavrouVKQ12, author = {Angelos Stavrou and Jeffrey M. Voas and Tom Karygiannis and Steve Quirolgico}, title = {Building Security into Off-the-Shelf Smartphones}, journal = {Computer}, volume = {45}, number = {2}, pages = {82--84}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.44}, doi = {10.1109/MC.2012.44}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StavrouVKQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeSK12, author = {Meixing Le and Angelos Stavrou and Brent ByungHoon Kang}, title = {DoubleGuard: Detecting Intrusions in Multitier Web Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {512--525}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.59}, doi = {10.1109/TDSC.2011.59}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SmutzS12, author = {Charles Smutz and Angelos Stavrou}, editor = {Robert H'obbes' Zakon}, title = {Malicious {PDF} detection using metadata and structural features}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {239--248}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420987}, doi = {10.1145/2420950.2420987}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SmutzS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SchulteASS12, author = {Brian Schulte and Haris Andrianakis and Kun Sun and Angelos Stavrou}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {NetGator: Malware Detection Using Program Interactive Challenges}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {164--183}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_10}, doi = {10.1007/978-3-642-37300-8\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SchulteASS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WangSS12, author = {Jiang Wang and Kun Sun and Angelos Stavrou}, editor = {Robert S. Swarz and Philip Koopman and Michel Cukier}, title = {A dependability analysis of hardware-assisted polling integrity checking systems}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSN.2012.6263962}, doi = {10.1109/DSN.2012.6263962}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WangSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WangSS12, author = {Jiang Wang and Kun Sun and Angelos Stavrou}, title = {Hardware-Assisted Application Integrity Monitor}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {5375--5383}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.299}, doi = {10.1109/HICSS.2012.299}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WangSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/KeromytisGSSYBDEKS12, author = {Angelos D. Keromytis and Roxana Geambasu and Simha Sethumadhavan and Salvatore J. Stolfo and Junfeng Yang and Azzedine Benameur and Marc Dacier and Matthew C. Elder and Darrell M. Kienzle and Angelos Stavrou}, title = {The {MEERKATS} Cloud Security Architecture}, booktitle = {32nd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012}, pages = {446--450}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCSW.2012.42}, doi = {10.1109/ICDCSW.2012.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/KeromytisGSSYBDEKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/MahmoodEKMMS12, author = {Riyadh Mahmood and Naeem Esfahani and Thabet Kacem and Nariman Mirzaei and Sam Malek and Angelos Stavrou}, editor = {Daniel Hoffman and John Hughes and Dianxiang Xu}, title = {A whitebox approach for automated security testing of Android applications on the cloud}, booktitle = {7th International Workshop on Automation of Software Test, {AST} 2012, Zurich, Switzerland, June 2-3, 2012}, pages = {22--28}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IWAST.2012.6228986}, doi = {10.1109/IWAST.2012.6228986}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/MahmoodEKMMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/WangMS12, author = {Zhaohui Wang and Rahul Murmuria and Angelos Stavrou}, editor = {Karl Aberer and Anupam Joshi and Sougata Mukherjea and Dipanjan Chakraborty and Hua Lu and Nalini Venkatasubramanian and Salil S. Kanhere}, title = {Implementing and Optimizing an Encryption Filesystem on Android}, booktitle = {13th {IEEE} International Conference on Mobile Data Management, {MDM} 2012, Bengaluru, India, July 23-26, 2012}, pages = {52--62}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MDM.2012.31}, doi = {10.1109/MDM.2012.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/WangMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/WangJMS12, author = {Zhaohui Wang and Ryan Johnson and Rahul Murmuria and Angelos Stavrou}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Exposing Security Risks for Commercial Mobile Devices}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {3--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_2}, doi = {10.1007/978-3-642-33704-8\_2}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/WangJMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YavvariTRS12, author = {Chaitanya Yavvari and Arnur G. Tokhtabayev and Huzefa Rangwala and Angelos Stavrou}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Malware Characterization Using Behavioral Components}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {226--239}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_20}, doi = {10.1007/978-3-642-33704-8\_20}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YavvariTRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SunWZS12, author = {Kun Sun and Jiang Wang and Fengwei Zhang and Angelos Stavrou}, title = {SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/secureswitch-bios-assisted-isolation-and-switch-between-trusted-and-untrusted-commodity-oses}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SunWZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/MalekEKMMS12, author = {Sam Malek and Naeem Esfahani and Thabet Kacem and Riyadh Mahmood and Nariman Mirzaei and Angelos Stavrou}, title = {A Framework for Automated Security Testing of Android Applications on the Cloud}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion Volume}, pages = {35--36}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE-C.2012.39}, doi = {10.1109/SERE-C.2012.39}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/MalekEKMMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/WangS12, author = {Zhaohui Wang and Angelos Stavrou}, title = {Attestation {\&} Authentication for {USB} Communications}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion Volume}, pages = {43--44}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE-C.2012.43}, doi = {10.1109/SERE-C.2012.43}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/WangS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/JohnsonWGS12, author = {Ryan Johnson and Zhaohui Wang and Corey Gagnon and Angelos Stavrou}, title = {Analysis of Android Applications' Permissions}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion Volume}, pages = {45--46}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE-C.2012.44}, doi = {10.1109/SERE-C.2012.44}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/JohnsonWGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/MurmuriaMSV12, author = {Rahul Murmuria and Jeffrey Medsger and Angelos Stavrou and Jeffrey M. Voas}, title = {Mobile Application and Device Power Usage Measurements}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {147--156}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.19}, doi = {10.1109/SERE.2012.19}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/MurmuriaMSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/NazzicariASJ12, author = {Nelson Nazzicari and Javier Almillategui and Angelos Stavrou and Sushil Jajodia}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {161--176}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_11}, doi = {10.1007/978-3-642-38004-4\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/NazzicariASJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LocastoGJS11, author = {Michael E. Locasto and Anup K. Ghosh and Sushil Jajodia and Angelos Stavrou}, title = {The ephemeral legion: producing an expert cyber-security work force from thin air}, journal = {Commun. {ACM}}, volume = {54}, number = {1}, pages = {129--131}, year = {2011}, url = {https://doi.org/10.1145/1866739.1866764}, doi = {10.1145/1866739.1866764}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/LocastoGJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/LiangHSR11, author = {Chen Liang and Sharath Hiremagalore and Angelos Stavrou and Huzefa Rangwala}, title = {Predicting Network Response Times Using Social Information}, booktitle = {International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2011, Kaohsiung, Taiwan, 25-27 July 2011}, pages = {527--531}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ASONAM.2011.22}, doi = {10.1109/ASONAM.2011.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/LiangHSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/centeris/YuVWSS11, author = {Bo Yu and J. Varga and Duminda Wijesekera and Angelos Stavrou and Anoop Singhal}, editor = {Maria Manuela Cruz{-}Cunha and Jo{\~{a}}o Varaj{\~{a}}o and Philip Powell and Ricardo Martinho}, title = {Specifying Time-Out Points in Surgical EMRs-Work in Progress}, booktitle = {ENTERprise Information Systems - International Conference, {CENTERIS} 2011, Vilamoura, Portugal, October 5-7, 2011, Proceedings, Part {III}}, series = {Communications in Computer and Information Science}, volume = {221}, pages = {165--174}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24352-3\_18}, doi = {10.1007/978-3-642-24352-3\_18}, timestamp = {Tue, 23 Apr 2024 23:18:35 +0200}, biburl = {https://dblp.org/rec/conf/centeris/YuVWSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KeromytisSYSGED11, author = {Angelos D. Keromytis and Salvatore J. Stolfo and Junfeng Yang and Angelos Stavrou and Anup K. Ghosh and Dawson R. Engler and Marc Dacier and Matthew C. Elder and Darrell M. Kienzle}, title = {The {MINESTRONE} Architecture Combining Static and Dynamic Analysis Techniques for Software Security}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {53--56}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.33}, doi = {10.1109/SYSSEC.2011.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/KeromytisSYSGED11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KenneallySMC11, author = {Erin Kenneally and Angelos Stavrou and John McHugh and Nicolas Christin}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Moving Forward, Building an Ethics Community (Panel Statements)}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {178--183}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_16}, doi = {10.1007/978-3-642-29889-9\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KenneallySMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/JiaSS11, author = {Quan Jia and Kun Sun and Angelos Stavrou}, editor = {Haohong Wang and Jin Li and George N. Rouskas and Xiaobo Zhou}, title = {CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in {MANET}}, booktitle = {Proceedings of 20th International Conference on Computer Communications and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICCCN.2011.6005808}, doi = {10.1109/ICCCN.2011.6005808}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/JiaSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BoggsHSS11, author = {Nathaniel Boggs and Sharath Hiremagalore and Angelos Stavrou and Salvatore J. Stolfo}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {142--160}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_8}, doi = {10.1007/978-3-642-23644-0\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BoggsHSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/WangZSS11, author = {Jiang Wang and Fengwei Zhang and Kun Sun and Angelos Stavrou}, editor = {Robert F. Erbacher and Roy H. Campbell and Yong Guan}, title = {Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics}, booktitle = {2011 {IEEE} Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May 26, 2011}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SADFE.2011.7}, doi = {10.1109/SADFE.2011.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/WangZSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LeWJSGJ11, author = {Meixing Le and Zhaohui Wang and Quan Jia and Angelos Stavrou and Anup K. Ghosh and Sushil Jajodia}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Trading Elephants for Ants: Efficient Post-attack Reconstitution}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {460--469}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_27}, doi = {10.1007/978-3-642-31909-9\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LeWJSGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Stavrou11, author = {Angelos Stavrou}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Overlay-Based DoS Defenses}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {891--897}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_273}, doi = {10.1007/978-1-4419-5906-5\_273}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Stavrou11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Stavrou11a, author = {Angelos Stavrou}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{TCP} Modulation Attacks}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1279--1281}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_277}, doi = {10.1007/978-1-4419-5906-5\_277}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Stavrou11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-2245, author = {DaeHun Nyang and Abedelaziz Mohaisen and Taekyoung Kwon and Brent ByungHoon Kang and Angelos Stavrou}, title = {Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface}, journal = {CoRR}, volume = {abs/1112.2245}, year = {2011}, url = {http://arxiv.org/abs/1112.2245}, eprinttype = {arXiv}, eprint = {1112.2245}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-2245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ml/SongLSKS10, author = {Yingbo Song and Michael E. Locasto and Angelos Stavrou and Angelos D. Keromytis and Salvatore J. Stolfo}, title = {On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems}, journal = {Mach. Learn.}, volume = {81}, number = {2}, pages = {179--205}, year = {2010}, url = {https://doi.org/10.1007/s10994-009-5143-5}, doi = {10.1007/S10994-009-5143-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ml/SongLSKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangS10, author = {Zhaohui Wang and Angelos Stavrou}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Exploiting smart-phone {USB} connectivity for fun and profit}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {357--366}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920314}, doi = {10.1145/1920261.1920314}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChakravartySK10, author = {Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {249--267}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_16}, doi = {10.1007/978-3-642-15497-3\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChakravartySK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArdagnaJSS10, author = {Claudio A. Ardagna and Sushil Jajodia and Pierangela Samarati and Angelos Stavrou}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Providing Mobile Users' Anonymity in Hybrid Networks}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {540--557}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_33}, doi = {10.1007/978-3-642-15497-3\_33}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArdagnaJSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WangNSG10, author = {Jiang Wang and Sameer Niphadkar and Angelos Stavrou and Anup K. Ghosh}, title = {A Virtualization Architecture for In-Depth Kernel Isolation}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.41}, doi = {10.1109/HICSS.2010.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WangNSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JeeSSK10, author = {Kangkook Jee and Stelios Sidiroglou{-}Douskos and Angelos Stavrou and Angelos D. Keromytis}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {An Adversarial Evaluation of Network Signaling and Control Mechanisms}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {252--265}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_17}, doi = {10.1007/978-3-642-24209-0\_17}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/JeeSSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicase/YangSDW10, author = {Xiaohui Yang and Angelos Stavrou and Ram Dantu and Duminda Wijesekera}, editor = {Martin L. Griss and Guang Yang}, title = {Small World VoIP}, booktitle = {Mobile Computing, Applications, and Services - Second International {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {76}, pages = {137--155}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-29336-8\_8}, doi = {10.1007/978-3-642-29336-8\_8}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicase/YangSDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/SeymerSWJ10, author = {Paul Seymer and Angelos Stavrou and Duminda Wijesekera and Sushil Jajodia}, title = {QoP and QoS Policy Cognizant Module Composition}, booktitle = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010}, pages = {77--86}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/POLICY.2010.16}, doi = {10.1109/POLICY.2010.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/SeymerSWJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangSG10, author = {Jiang Wang and Angelos Stavrou and Anup K. Ghosh}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {HyperCheck: {A} Hardware-Assisted Integrity Monitor}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {158--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_9}, doi = {10.1007/978-3-642-15512-3\_9}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AndrianakisSS10, author = {Charalampos Andrianakis and Paul Seymer and Angelos Stavrou}, editor = {Wietse Z. Venema}, title = {Scalable Web Object Inspection and Malfease Collection}, booktitle = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/hotsec10/scalable-web-object-inspection-and-malfease-collection}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/AndrianakisSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FaresiYMSWS10, author = {Ahmed A. L. Faresi and Bo Yu and Khalid Moidu and Angelos Stavrou and Duminda Wijesekera and Anoop Singhal}, editor = {Kevin Fu and Tadayoshi Kohno and Aviel D. Rubin}, title = {Fine-grained Sharing of Health Records using {XSPA} Profile for {XACML} - An Extended Abstract}, booktitle = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/healthsec10/fine-grained-sharing-health-records-using-xspa-profile-xacml\%E2\%80\%94-extended}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FaresiYMSWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2010cset, editor = {Terry V. Benzel and Jelena Mirkovic and Angelos Stavrou}, title = {3rd Workshop on Cyber Security Experimentation and Test, {CSET} '10, Washington, D.C., USA, August 9, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/cset10}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2010cset.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderCCGKSB09, author = {D. Scott Alexander and Yuu{-}Heng Cheng and Brian A. Coan and Andrei Ghetie and Vikram Kaul and Bruce Siegell and Steven M. Bellovin and Nicholas F. Maxemchuk and Henning Schulzrinne and Stephen Schwab and Angelos Stavrou and Jonathan M. Smith}, title = {The dynamic community of interest and its realization in {ZODIAC}}, journal = {{IEEE} Commun. Mag.}, volume = {47}, number = {10}, pages = {40--47}, year = {2009}, url = {https://doi.org/10.1109/MCOM.2009.5273807}, doi = {10.1109/MCOM.2009.5273807}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderCCGKSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StavrouCLS09, author = {Angelos Stavrou and Gabriela F. Cretu{-}Ciocarlie and Michael E. Locasto and Salvatore J. Stolfo}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {39--46}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1655000}, doi = {10.1145/1654988.1655000}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StavrouCLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArdagnaJSS09, author = {Claudio A. Ardagna and Sushil Jajodia and Pierangela Samarati and Angelos Stavrou}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {Privacy Preservation over Untrusted Mobile Networks}, booktitle = {Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]}, series = {Lecture Notes in Computer Science}, volume = {5599}, pages = {84--105}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03511-1\_4}, doi = {10.1007/978-3-642-03511-1\_4}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArdagnaJSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/StavrouBKN09, author = {Angelos Stavrou and Ricardo A. Barrato and Angelos D. Keromytis and Jason Nieh}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {A\({}^{\mbox{2}}\)M: Access-Assured Mobile Desktop Computing}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {186--201}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_16}, doi = {10.1007/978-3-642-04474-8\_16}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/StavrouBKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ShermanSNKS09, author = {Alex Sherman and Angelos Stavrou and Jason Nieh and Angelos D. Keromytis and Clifford Stein}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Adding Trust to {P2P} Distribution of Paid Content}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {459--474}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_36}, doi = {10.1007/978-3-642-04474-8\_36}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ShermanSNKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Cretu-CiocarlieSLS09, author = {Gabriela F. Cretu{-}Ciocarlie and Angelos Stavrou and Michael E. Locasto and Salvatore J. Stolfo}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Adaptive Anomaly Detection via Self-calibration and Dynamic Updating}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {41--60}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_3}, doi = {10.1007/978-3-642-04342-0\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/Cretu-CiocarlieSLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/LiuYWS09, author = {Anyi Liu and Yi Yuan and Duminda Wijesekera and Angelos Stavrou}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {SQLProb: a proxy-based architecture towards preventing {SQL} injection attacks}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {2054--2061}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529737}, doi = {10.1145/1529282.1529737}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/LiuYWS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AlicherryKS09, author = {Mansoor Alicherry and Angelos D. Keromytis and Angelos Stavrou}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {41--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_3}, doi = {10.1007/978-3-642-05284-2\_3}, timestamp = {Sun, 07 Jan 2018 16:56:18 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AlicherryKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiaWS09, author = {Quan Jia and Zhaohui Wang and Angelos Stavrou}, editor = {Terry V. Benzel and Jelena Mirkovic and Angelos Stavrou}, title = {The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds}, booktitle = {2nd Workshop on Cyber Security Experimentation and Test, {CSET} '09, Montreal, Canada, August 10, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/cset-09/heisenberg-measuring-uncertainty-lightweight-virtualization-testbeds}, timestamp = {Mon, 01 Feb 2021 08:43:01 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiaWS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2009vmsec, editor = {Angelos Stavrou}, title = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security, VMSec '09, Chicago, Illinois, USA, November 9, 2009}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655148}, doi = {10.1145/1655148}, isbn = {978-1-60558-780-6}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2009vmsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2009cset, editor = {Terry V. Benzel and Jelena Mirkovic and Angelos Stavrou}, title = {2nd Workshop on Cyber Security Experimentation and Test, {CSET} '09, Montreal, Canada, August 10, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/cset09}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2009cset.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LocastoS08, author = {Michael E. Locasto and Angelos Stavrou}, title = {The Hidden Difficulties of Watching and Rebuilding Networks}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {2}, pages = {79--82}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.48}, doi = {10.1109/MSP.2008.48}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LocastoS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/StavrouLK08, author = {Angelos Stavrou and Michael E. Locasto and Angelos D. Keromytis}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Pushback for Overlay Networks: Protecting Against Malicious Insiders}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {39--54}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_3}, doi = {10.1007/978-3-540-68914-0\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/StavrouLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangSGJ08, author = {Yih Huang and Angelos Stavrou and Anup K. Ghosh and Sushil Jajodia}, editor = {Jason Nieh and Angelos Stavrou}, title = {Efficiently tracking application interactions using lightweight virtualization}, booktitle = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {19--28}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456482.1456486}, doi = {10.1145/1456482.1456486}, timestamp = {Wed, 04 May 2022 13:02:17 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuangSGJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArdagnaSJSM08, author = {Claudio A. Ardagna and Angelos Stavrou and Sushil Jajodia and Pierangela Samarati and Rhandi Martin}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks}, booktitle = {Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {397}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-397/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:59 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArdagnaSJSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LocastoSCKS08, author = {Michael E. Locasto and Angelos Stavrou and Gabriela F. Cretu and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Return Value Predictability Profiles for Self-healing}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {152--166}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_10}, doi = {10.1007/978-3-540-89598-5\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LocastoSCKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AndroulakiRSSB08, author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin}, editor = {Nikita Borisov and Ian Goldberg}, title = {{PAR:} Payment for Anonymous Routing}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {219--236}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_14}, doi = {10.1007/978-3-540-70630-4\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/AndroulakiRSSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/SabzevarS08, author = {Alireza Pirayesh Sabzevar and Angelos Stavrou}, editor = {Richard Chbeir and Albert Dipanda and Kokou Y{\'{e}}tongnon}, title = {Universal Multi-Factor Authentication Using Graphical Passwords}, booktitle = {4th {IEEE} International Conference on Signal Image Technology and Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30 - December 3, 2008}, pages = {625--632}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SITIS.2008.92}, doi = {10.1109/SITIS.2008.92}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/SabzevarS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/ChakravartySK08, author = {Sambuddho Chakravarty and Angelos Stavrou and Angelos D. Keromytis}, editor = {Richard Chbeir and Albert Dipanda and Kokou Y{\'{e}}tongnon}, title = {Identifying Proxy Nodes in a Tor Anonymization Circuit}, booktitle = {4th {IEEE} International Conference on Signal Image Technology and Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30 - December 3, 2008}, pages = {633--639}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SITIS.2008.93}, doi = {10.1109/SITIS.2008.93}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/ChakravartySK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CretuSLSK08, author = {Gabriela F. Cretu and Angelos Stavrou and Michael E. Locasto and Salvatore J. Stolfo and Angelos D. Keromytis}, title = {Casting out Demons: Sanitizing Training Data for Anomaly Sensors}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {81--95}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.11}, doi = {10.1109/SP.2008.11}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/CretuSLSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008vmsec, editor = {Jason Nieh and Angelos Stavrou}, title = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, url = {https://dl.acm.org/doi/10.1145/1456482}, doi = {10.1145/1456482}, isbn = {978-1-60558-298-6}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2008vmsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongLSKS07, author = {Yingbo Song and Michael E. Locasto and Angelos Stavrou and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {On the infeasibility of modeling polymorphic shellcode}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {541--551}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315312}, doi = {10.1145/1315245.1315312}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SongLSKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsware/StavrouTKP07, author = {Angelos Stavrou and David Turner and Angelos D. Keromytis and Vassilis Prevelakis}, editor = {Sanjoy Paul and Henning Schulzrinne and G. Venkatesh}, title = {Bridging the Network Reservation Gap Using Overlays}, booktitle = {Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE {(COMSWARE} 2007), January 7-12, 2007, Bangalore, India}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/COMSWA.2007.382490}, doi = {10.1109/COMSWA.2007.382490}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsware/StavrouTKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LiSSAK07, author = {Wei{-}Jen Li and Salvatore J. Stolfo and Angelos Stavrou and Elli Androulaki and Angelos D. Keromytis}, editor = {Bernhard M. H{\"{a}}mmerli and Robin Sommer}, title = {A Study of Malcode-Bearing Documents}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, {DIMVA} 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4579}, pages = {231--250}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73614-1\_14}, doi = {10.1007/978-3-540-73614-1\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LiSSAK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/LocastoSCS07, author = {Michael E. Locasto and Angelos Stavrou and Gabriela F. Cretu and Angelos D. Keromytis}, editor = {Jeff Chase and Srinivasan Seshan}, title = {From {STEM} to {SEAD:} Speculative Execution for Automated Defense}, booktitle = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa Clara, CA, USA, June 17-22, 2007}, pages = {219--232}, publisher = {{USENIX}}, year = {2007}, url = {http://www.usenix.org/events/usenix07/tech/locasto.html}, timestamp = {Mon, 01 Feb 2021 08:43:36 +0100}, biburl = {https://dblp.org/rec/conf/usenix/LocastoSCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/StavrouLK06, author = {Angelos Stavrou and Michael E. Locasto and Angelos D. Keromytis}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {W3Bcrypt: Encryption as a Stylesheet}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {349--364}, year = {2006}, url = {https://doi.org/10.1007/11767480\_24}, doi = {10.1007/11767480\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/StavrouLK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LocastoSK06, author = {Michael E. Locasto and Angelos Stavrou and Angelos D. Keromytis}, editor = {Christian Hempelmann and Victor Raskin}, title = {Dark application communities}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {11--18}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278943}, timestamp = {Thu, 29 Nov 2018 11:17:10 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LocastoSK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/StavrouCMKMR05, author = {Angelos Stavrou and Debra L. Cook and William G. Morein and Angelos D. Keromytis and Vishal Misra and Dan Rubenstein}, title = {WebSOS: an overlay-based system for protecting web servers from denial of service attacks}, journal = {Comput. Networks}, volume = {48}, number = {5}, pages = {781--807}, year = {2005}, url = {https://doi.org/10.1016/j.comnet.2005.01.005}, doi = {10.1016/J.COMNET.2005.01.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/StavrouCMKMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StavrouK05, author = {Angelos Stavrou and Angelos D. Keromytis}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Countering DoS attacks with stateless multipath overlays}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {249--259}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102153}, doi = {10.1145/1102120.1102153}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/StavrouK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChouSIK05, author = {Stephen T. Chou and Angelos Stavrou and John Ioannidis and Angelos D. Keromytis}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {\emph{gore}: Routing-Assisted Defense Against DDoS Attacks}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {179--193}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_13}, doi = {10.1007/11556992\_13}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ChouSIK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/StavrouKNMR05, author = {Angelos Stavrou and Angelos D. Keromytis and Jason Nieh and Vishal Misra and Dan Rubenstein}, title = {{MOVE:} An End-to-End Solution to Network Denial of Service}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2005, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2005}, url = {https://www.ndss-symposium.org/ndss2005/move-end-end-solution-network-denial-service/}, timestamp = {Mon, 01 Feb 2021 08:42:12 +0100}, biburl = {https://dblp.org/rec/conf/ndss/StavrouKNMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/StavrouRS04, author = {Angelos Stavrou and Dan Rubenstein and Sambit Sahu}, title = {A lightweight, robust {P2P} system to handle flash crowds}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {22}, number = {1}, pages = {6--17}, year = {2004}, url = {https://doi.org/10.1109/JSAC.2003.818778}, doi = {10.1109/JSAC.2003.818778}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/StavrouRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/CoffmanCRSS04, author = {Edward G. Coffman Jr. and Andreas Constantinides and Dan Rubenstein and F. Bruce Shepherd and Angelos Stavrou}, title = {Content distribution for seamless transmission}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {32}, number = {2}, pages = {31--32}, year = {2004}, url = {https://doi.org/10.1145/1035334.1035347}, doi = {10.1145/1035334.1035347}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/CoffmanCRSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/StavrouIKMR04, author = {Angelos Stavrou and John Ioannidis and Angelos D. Keromytis and Vishal Misra and Dan Rubenstein}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {A Pay-per-Use DoS Protection Mechanism for the Web}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {120--134}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_9}, doi = {10.1007/978-3-540-24852-1\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/StavrouIKMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoreinSCKMR03, author = {William G. Morein and Angelos Stavrou and Debra L. Cook and Angelos D. Keromytis and Vishal Misra and Dan Rubenstein}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Using graphic turing tests to counter automated DDoS attacks against web servers}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {8--19}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948114}, doi = {10.1145/948109.948114}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoreinSCKMR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/StavrouRS02, author = {Angelos Stavrou and Dan Rubenstein and Sambit Sahu}, title = {A lightweight, robust {P2P} system to handle flash crowds}, journal = {Comput. Commun. Rev.}, volume = {32}, number = {3}, pages = {17}, year = {2002}, url = {https://doi.org/10.1145/571697.571706}, doi = {10.1145/571697.571706}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/StavrouRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/StavrouRS02, author = {Angelos Stavrou and Dan Rubenstein and Sambit Sahu}, title = {A Lightweight, Robust {P2P} System to Handle Flash Crowds}, booktitle = {10th {IEEE} International Conference on Network Protocols {(ICNP} 2002), 12-15 November 2002, Paris, France, Proceedings}, pages = {226--235}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICNP.2002.1181410}, doi = {10.1109/ICNP.2002.1181410}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/StavrouRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.