default search action
Spiros Antonatos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c27]George Kokolakis, Grigoris Ntousakis, Irodotos Karatsoris, Spiros Antonatos, Manos Athanatos, Sotiris Ioannidis:
HoneyChart: Automated Honeypot Management over Kubernetes. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 321-328 - 2021
- [c26]Manish Kesarwani, Akshar Kaul, Stefano Braghin, Naoise Holohan, Spiros Antonatos:
Secure k-Anonymization over Encrypted Databases. CLOUD 2021: 20-30 - [i4]Manish Kesarwani, Akshar Kaul, Stefano Braghin, Naoise Holohan, Spiros Antonatos:
Secure k-Anonymization over Encrypted Databases. CoRR abs/2108.04780 (2021) - 2020
- [j5]Naoise Holohan, Spiros Antonatos, Stefano Braghin, Pól Mac Aonghusa:
The Bounded Laplace Mechanism in Differential Privacy. J. Priv. Confidentiality 10(1) (2020) - [c25]Michalis Pachilakis, Spiros Antonatos, Killian Levacher, Stefano Braghin:
PrivLeAD: Privacy Leakage Detection on the Web. IntelliSys (1) 2020: 428-439
2010 – 2019
- 2019
- [c24]Stefano Braghin, Joao H. Bettencourt-Silva, Killian Levacher, Spiros Antonatos:
An Extensible De-Identification Framework for Privacy Protection of Unstructured Health Information: Creating Sustainable Privacy Infrastructures. MedInfo 2019: 1140-1144 - [i3]Spiros Antonatos, Stefano Braghin, Naoise Holohan, Pol Mac Aonghusa:
AnonTokens: tracing re-identification attacks through decoy records. CoRR abs/1906.09829 (2019) - 2018
- [c23]Spiros Antonatos, Stefano Braghin, Naoise Holohan, Yiannis Gkoufas, Pol Mac Aonghusa:
PRIMA: An End-to-End Framework for Privacy at Scale. ICDE 2018: 1531-1542 - [i2]Naoise Holohan, Spiros Antonatos, Stefano Braghin, Pol Mac Aonghusa:
The Bounded Laplace Mechanism in Differential Privacy. CoRR abs/1808.10410 (2018) - 2017
- [i1]Naoise Holohan, Spiros Antonatos, Stefano Braghin, Pol Mac Aonghusa:
(k, ε)-Anonymity: k-Anonymity with ε-Differential Privacy. CoRR abs/1710.01615 (2017) - 2016
- [c22]Aris Gkoulalas-Divanis, Stefano Braghin, Spiros Antonatos:
FPVI: A scalable method for discovering privacy vulnerabilities in microdata. ISC2 2016: 1-8 - 2015
- [c21]Thomas Holleczek, Dang The Anh, Shanyang Yin, Yunye Jin, Spiros Antonatos, Han Leong Goh, Samantha Low, Amy Shi Nash:
Traffic Measurement and Route Recommendation System for Mass Rapid Transit (MRT). KDD 2015: 1859-1868 - 2014
- [c20]Manoranjan Dash, Hai-Long Nguyen, Hong Cao, Ghim-Eng Yap, Minh Nhut Nguyen, Xiaoli Li, Shonali Priyadarsini Krishnaswamy, James Decraene, Spiros Antonatos, Yue Wang, Dang The Anh, Amy Shi Nash:
Home and Work Place Prediction for Urban Planning Using Mobile Network Data. MDM (2) 2014: 37-42 - [c19]Wei Wu, Yue Wang, João Bártolo Gomes, Dang The Anh, Spiros Antonatos, Mingqiang Xue, Peng Yang, Ghim-Eng Yap, Xiaoli Li, Shonali Krishnaswamy, James Decraene, Amy Shi Nash:
Oscillation Resolution for Mobile Phone Cellular Tower Data to Enable Mobility Modelling. MDM (1) 2014: 321-328 - 2010
- [j4]A. Makridakis, Elias Athanasopoulos, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Evangelos P. Markatos:
Understanding the behavior of malicious applications in social networks. IEEE Netw. 24(5): 14-19 (2010) - [c18]Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos:
A Systematic Characterization of IM Threats using Honeypots. NDSS 2010 - [c17]Iasonas Polakis, Georgios Kontaxis, Spyros Antonatos, Eleni Gessiou, Thanasis Petsas, Evangelos P. Markatos:
Using social networks to harvest email addresses. WPES 2010: 11-20
2000 – 2009
- 2009
- [b1]Spiros Antonatos:
Defending against known and unknown attacks using a network of affined honeypots. University of Crete, Greece, 2009 - [c16]Spyros Antonatos, Quang Hieu Vu:
Harnessing the Power of P2P Systems for Fast Attack Signature Validation. NSS 2009: 107-114 - [c15]W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis:
HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. NSS 2009: 381-388 - [c14]Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis:
Regular Expression Matching on Graphics Hardware for Intrusion Detection. RAID 2009: 265-283 - 2008
- [j3]Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis:
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. ACM Trans. Inf. Syst. Secur. 12(2): 12:1-12:38 (2008) - [c13]Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Antisocial Networks: Turning a Social Network into a Botnet. ISC 2008: 146-160 - [c12]Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis:
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. RAID 2008: 116-134 - [e1]Spyros Antonatos, Michele Bezzi, Elisa Boschi, Brian Trammell, William Yurcik:
Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-301-3 [contents] - 2007
- [j2]Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis:
Defending against hitlist worms using network address space randomization. Comput. Networks 51(12): 3471-3490 (2007) - [c11]Michalis Foukarakis, Demetres Antoniades, Spyros Antonatos, Evangelos P. Markatos:
Flexible and high-performance anonymization of NetFlow records using anontool. SecureComm 2007: 33-38 - 2006
- [j1]Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos:
An Active Splitter Architecture for Intrusion Detection and Prevention. IEEE Trans. Dependable Secur. Comput. 3(1): 31-44 (2006) - [c10]Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis:
Puppetnets: misusing web browsers as a distributed attack infrastructure. CCS 2006: 221-234 - [c9]Spyros Antonatos, Kostas G. Anagnostakis:
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. Communications and Multimedia Security 2006: 12-21 - [c8]Dimitris Koukis, Spyros Antonatos, Kostas G. Anagnostakis:
On the Privacy Risks of Publishing Anonymized IP Network Traces. Communications and Multimedia Security 2006: 22-32 - [c7]Elias Athanasopoulos, Spyros Antonatos:
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. Communications and Multimedia Security 2006: 97-108 - [c6]Dimitris Koukis, Spyros Antonatos, Demetres Antoniades, Evangelos P. Markatos, Panagiotis Trimintzios:
A Generic Anonymization Framework for Network Traffic. ICC 2006: 2302-2309 - 2005
- [c5]Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC 2005: 393-408 - [c4]Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis:
Defending against hitlist worms using network address space randomization. WORM 2005: 30-40 - 2004
- [c3]Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis:
Performance Analysis of Content Matching Intrusion Detection Systems. SAINT 2004: 208-218 - [c2]Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos:
Generating realistic workloads for network intrusion detection systems. WOSP 2004: 207-215 - 2003
- [c1]Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis:
E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. SEC 2003: 217-228
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint