default search action
Petros Efstathopoulos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos:
Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages. USENIX Security Symposium 2023: 4157-4173
2010 – 2019
- 2019
- [c16]Evgenios M. Kornaropoulos, Petros Efstathopoulos:
The Case of Adversarial Inputs for Secure Similarity Approximation Protocols. EuroS&P 2019: 247-262 - 2018
- [j2]K. Ashwin Kumar, Petros Efstathopoulos:
Utility-Driven Graph Summarization. Proc. VLDB Endow. 12(4): 335-347 (2018) - 2017
- [c15]Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier:
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. ACSAC 2017: 449-460 - [i2]Evgenios M. Kornaropoulos, Petros Efstathopoulos:
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs. IACR Cryptol. ePrint Arch. 2017: 850 (2017) - 2016
- [c14]Ashwin Narayan, Vuk Markovic, Natalia Postawa, Anna King, Alejandro Morales, K. Ashwin Kumar, Petros Efstathopoulos:
Efficient Routing for Cost Effective Scale-Out Data Architectures. MASCOTS 2016: 424-429 - [i1]Ashwin Narayan, Vuk Markovic, Natalia Postawa, Anna King, Alejandro Morales, K. Ashwin Kumar, Petros Efstathopoulos:
Efficient Routing for Cost Effective Scale-out Data Architectures. CoRR abs/1606.08884 (2016) - 2015
- [c13]Mingwei Zhang, Daniel Marino, Petros Efstathopoulos:
Harbormaster: Policy Enforcement for Containers. CloudCom 2015: 355-362 - [c12]Christy Vaughn, Caleb Miller, Onyebuchi Ekenta, Hongtao Sun, Medha Bhadkamkar, Petros Efstathopoulos, Erim Kardes:
Soothsayer: Predicting Capacity Usage in Backup Storage Systems. MASCOTS 2015: 208-217 - [c11]Tai-Ching Li, Huy Hang, Michalis Faloutsos, Petros Efstathopoulos:
TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers. PAM 2015: 277-289 - 2014
- [c10]Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras:
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. RAID 2014: 426-446 - 2012
- [c9]Tudor Dumitras, Petros Efstathopoulos:
The Provenance of WINE. EDCC 2012: 126-131 - [c8]Petros Efstathopoulos:
File routing middleware for cloud deduplication. CloudCP@EuroSys 2012: 10:1-10:6 - [c7]Tudor Dumitras, Petros Efstathopoulos:
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis. LEET 2012 - 2011
- [c6]Fanglu Guo, Petros Efstathopoulos:
Building a High-performance Deduplication System. USENIX ATC 2011 - 2010
- [c5]Petros Efstathopoulos, Fanglu Guo:
Rethinking Deduplication Scalability. HotStorage 2010
2000 – 2009
- 2009
- [c4]Petros Efstathopoulos:
Practical study of a defense against low-rate TCP-targeted DoS attack. ICITST 2009: 1-6 - 2008
- [c3]Petros Efstathopoulos, Eddie Kohler:
Manageable fine-grained information flow. EuroSys 2008: 301-313 - 2007
- [j1]Steve Vandebogart, Petros Efstathopoulos, Eddie Kohler, Maxwell N. Krohn, Cliff Frey, David Ziegler, M. Frans Kaashoek, Robert Tappan Morris, David Mazières:
Labels and event processes in the Asbestos operating system. ACM Trans. Comput. Syst. 25(4): 11 (2007) - 2005
- [c2]Maxwell N. Krohn, Petros Efstathopoulos, Cliff Frey, M. Frans Kaashoek, Eddie Kohler, David Mazières, Robert Tappan Morris, Michelle Osborne, Steve Vandebogart, David Ziegler:
Make Least Privilege a Right (Not a Privilege). HotOS 2005 - [c1]Petros Efstathopoulos, Maxwell N. Krohn, Steve Vandebogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, M. Frans Kaashoek, Robert Tappan Morris:
Labels and event processes in the Asbestos operating system. SOSP 2005: 17-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint