default search action
Xenia Mountrouidou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c24]Thomas Setzler, Xenia Mountrouidou:
IoT Metrics and Automation for Security Evaluation. CCNC 2021: 1-4 - 2020
- [c23]Richard Weiss, Xenia Mountrouidou, Stacey Watson, Jens Mache, Elizabeth K. Hawthorne, Ankur Chattopadhyay:
Cybersecurity Across All Disciplines in 2020. SIGCSE 2020: 1404
2010 – 2019
- 2019
- [j9]Xenia Mountrouidou, Blaine Billings, Luis F. Mejia-Ricart:
Not just another Internet of Things taxonomy: A method for validation of taxonomies. Internet Things 6 (2019) - [c22]Casey Wilson, Xenia Mountrouidou, Anna Little:
Worth the Wait? Time Window Feature Optimization for Attack Classification. IEEE BigData 2019: 3232-3241 - [c21]Xenia Mountrouidou, David Vosen, Chadi Kari, Mohammad Q. Azhar, Sajal Bhatia, Greg Gagne, Joseph Maguire, Liviana Tudor, Timothy T. Yuen:
Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education. ITiCSE-WGR 2019: 157-176 - [c20]Mohammad Q. Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Mountrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen:
Securing the Human: Broadening Diversity in Cybersecurity. ITiCSE 2019: 251-252 - [c19]Xenia Mountrouidou, Vic Thomas:
CyberPaths: Cyber Security Labs for Liberal Arts Institutions Using the NSF Global Environment for Network Innovations (GENI). SIGCSE 2019: 1241 - 2018
- [c18]Xenia Mountrouidou, Xiangyang Li, Quinn Burke:
Cybersecurity in liberal arts general education curriculum. ITiCSE 2018: 182-187 - [c17]Blaine Billings, Xenia Mountrouidou:
Modelling Correct Operation of Webcams for Security Purposes: (Abstract Only). SIGCSE 2018: 273 - 2017
- [c16]Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou:
Raising flags: Detecting covert storage channels using relative entropy. ISI 2017: 25-30 - [c15]Richard S. Weiss, Casey W. O'Brien, Xenia Mountrouidou, Jens Mache:
The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity. SIGCSE 2017: 673-674 - [c14]Eduardo J. Castillo, Xenia Mountrouidou, Xiangyang Li:
Time Lord: Covert Timing Channel Implementation and Realistic Experimentation. SIGCSE 2017: 755-756 - [c13]Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou:
Raising Flags: Detecting Covert Storage Channels Using Relative Entropy. SIGCSE 2017: 759-760 - 2016
- [j8]Feng Yan, Xenia Mountrouidou, Alma Riska, Evgenia Smirni:
PREFiguRE: An Analytic Framework for HDD Management. ACM Trans. Model. Perform. Evaluation Comput. Syst. 1(3): 10:1-10:27 (2016) - [c12]Anna Little, Xenia Mountrouidou, Daniel Moseley:
Spectral Clustering Technique for Classifying Network Attacks. BigDataSecurity/HPSC/IDS 2016: 406-411 - [c11]Xenia Mountrouidou, Xiangyang Li:
Broadening the Path to Cybersecurity Profession in Predominantly Undergraduate and Liberal Arts Institutions (Abstract Only). SIGCSE 2016: 688 - 2015
- [c10]Tommy Chin, Xenia Mountrouidou, Xiangyang Li, Kaiqi Xiong:
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN). ICDCS Workshops 2015: 95-99 - [c9]Tommy Chin, Xenia Mountrouidou, Xiangyang Li, Kaiqi Xiong:
An SDN-supported collaborative approach for DDoS flooding detection and containment. MILCOM 2015: 659-664 - 2012
- [c8]Feng Yan, Xenia Mountrouidou, Evgenia Smirni:
Quantitative Estimation of the Performance Delay with Propagation Effects in Disk Power Savings. HotPower 2012 - 2011
- [j7]Bushra Anjum, Harry G. Perros, Xenia Mountrouidou, Kimon P. Kontovasilis:
Bandwidth allocation under end-to-end percentile delay bounds. Int. J. Netw. Manag. 21(6): 536-547 (2011) - [j6]Xenia Mountrouidou, Alma Riska, Evgenia Smirni:
Adaptive workload shaping for power savings on disk drives (abstracts only). SIGMETRICS Perform. Evaluation Rev. 39(3): 13 (2011) - [j5]Feng Yan, Xenia Mountrouidou, Alma Riska, Evgenia Smirni:
Copy rate synchronization with performance guarantees for work consolidation in storage clusters. SIGMETRICS Perform. Evaluation Rev. 39(3): 82-86 (2011) - [c7]Xenia Mountrouidou, Alma Riska, Evgenia Smirni:
Saving power without compromising disk drive reliability. IGCC 2011: 1-6 - [c6]Feng Yan, Xenia Mountrouidou, Alma Riska, Evgenia Smirni:
Toward Automating Work Consolidation with Performance Guarantees in Storage Clusters. MASCOTS 2011: 326-335 - [c5]Xenia Mountrouidou, Alma Riska, Evgenia Smirni:
Adaptive workload shaping for power savings on disk drives. ICPE 2011: 109-120
2000 – 2009
- 2009
- [j4]Xenia Mountrouidou, Harry G. Perros:
On the departure process of burst aggregation algorithms in optical burst switching. Comput. Networks 53(3): 247-264 (2009) - [j3]Xenia Mountrouidou, Harry G. Perros:
A discrete-time queueing network model of a hub-based OBS architecture. Telecommun. Syst. 41(3): 173-184 (2009) - 2008
- [j2]Xenia Mountrouidou:
On the traffic modeling of burst aggregation algorithms using video and data traces. Telecommun. Syst. 39(3-4): 223-234 (2008) - 2007
- [c4]Xenia Mountrouidou, Harry G. Perros:
On the traffic modeling of burst aggregation algorithms using video and data traces. GridNets 2007: 28 - 2006
- [c3]Xenia Mountrouidou, Vishwas S. Puttasubbappa, Harry G. Perros:
A Zero Burst Loss Architecture for star OBS Networks. Net-Con 2006: 1-18 - [c2]Xenia Mountrouidou, Harry G. Perros:
Characterization of the Burst Aggregation Process in Optical Burst Switching. Networking 2006: 752-764 - 2004
- [j1]Dimitrios N. Serpanos, Poluxeni Mountrouidou, Maria Gamvrili:
Evaluation of hardware and software schedulers for embedded switches. ACM Trans. Embed. Comput. Syst. 3(4): 736-759 (2004) - 2003
- [c1]Dimitrios N. Serpanos, Xenia Mountrouidou, Maria Gamvrili:
Evaluation of Switch Schedulers for Embedded Systems. ISCC 2003: 541-546
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint