The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michalis Polychronakis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Network-Level Polymorphic Shellcode Detection Using Emulation. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:54-73 [Conf]
  2. Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis
    Performance Analysis of Content Matching Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:208-218 [Conf]
  3. P. Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis
    STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:375-392 [Conf]
  4. Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
    E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:217-228 [Conf]
  5. Spyros Antonatos, Michalis Polychronakis, P. Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:393-408 [Conf]
  6. Augusto Ciuffoletti, Michalis Polychronakis
    Architecture of a Network Monitoring Element. [Citation Graph (0, 0)][DBLP]
    WETICE, 2006, pp:220-221 [Conf]
  7. Augusto Ciuffoletti, Michalis Polychronakis
    Architecture of a Network Monitoring Element. [Citation Graph (0, 0)][DBLP]
    Euro-Par Workshops, 2006, pp:5-14 [Conf]
  8. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:87-106 [Conf]
  9. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Network-level polymorphic shellcode detection using emulation. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:2, n:4, pp:257-274 [Journal]

  10. Topnet: A Network-aware top(1). [Citation Graph (, )][DBLP]


  11. Improving the Performance of Passive Network Monitoring Applications using Locality Buffering. [Citation Graph (, )][DBLP]


  12. RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage. [Citation Graph (, )][DBLP]


  13. Realistic Passive Packet Loss Measurement for High-Speed Networks. [Citation Graph (, )][DBLP]


  14. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. [Citation Graph (, )][DBLP]


  15. Gnort: High Performance Network Intrusion Detection Using Graphics Processors. [Citation Graph (, )][DBLP]


  16. Regular Expression Matching on Graphics Hardware for Intrusion Detection. [Citation Graph (, )][DBLP]


  17. LOBSTER: a European platform for passive network traffic monitoring. [Citation Graph (, )][DBLP]


  18. DiMAPI: An Application Programming Interface for Distributed Network Monitoring. [Citation Graph (, )][DBLP]


  19. Design of an application programming interface for IP network monitoring. [Citation Graph (, )][DBLP]


  20. Improving the accuracy of network intrusion detection systems under load using selective packet discarding. [Citation Graph (, )][DBLP]


  21. Deep packet anonymization. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002