The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kostas G. Anagnostakis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
    Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:130-145 [Conf]
  2. V. T. Lam, Spyros Antonatos, P. Akritidis, Kostas G. Anagnostakis
    Puppetnets: misusing web browsers as a distributed attack infrastructure. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:221-234 [Conf]
  3. Spyros Antonatos, Kostas G. Anagnostakis
    TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:12-21 [Conf]
  4. D. Koukis, Spyros Antonatos, Kostas G. Anagnostakis
    On the Privacy Risks of Publishing Anonymized IP Network Traces. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:22-32 [Conf]
  5. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Network-Level Polymorphic Shellcode Detection Using Emulation. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:54-73 [Conf]
  6. Kostas G. Anagnostakis, Michael Greenwald
    Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:524-533 [Conf]
  7. Kostas G. Anagnostakis, Michael Greenwald, Raphael S. Ryger
    cing: Measuring Network-Internal Delays using only Existing Infrastructure. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  8. Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
    Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:427-442 [Conf]
  9. Kostas G. Anagnostakis, Michael Greenwald, Sotiris Ioannidis, Stefan Miltchev
    Open Packet Monitoring on FLAME: Safety, Performance, and Applications. [Citation Graph (0, 0)][DBLP]
    IWAN, 2002, pp:120-131 [Conf]
  10. Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Scalable Resource Control in Active Networks. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:343-357 [Conf]
  11. Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Jonathan M. Smith
    Practical Network Applications on a Lightweight Active Management Environment. [Citation Graph (0, 0)][DBLP]
    IWAN, 2001, pp:101-115 [Conf]
  12. Kostas G. Anagnostakis, Michael Greenwald, Raphael S. Ryger
    On the Sensitivity of Network Simulation to Topology. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2002, pp:117-0 [Conf]
  13. Ioannis Charitakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    An Active Traffic Splitter Architecture for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2003, pp:238-241 [Conf]
  14. Athanasios V. Vasilakos, Kostas G. Anagnostakis, Witold Pedrycz
    Application of computational intelligence techniques in active networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2001, pp:448-455 [Conf]
  15. Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis
    Performance Analysis of Content Matching Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:208-218 [Conf]
  16. Ioannis Charitakis, Dionisios N. Pnevmatikatos, Evangelos P. Markatos, Kostas G. Anagnostakis
    Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. [Citation Graph (0, 0)][DBLP]
    SCOPES, 2003, pp:226-239 [Conf]
  17. P. Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis
    STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:375-392 [Conf]
  18. Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
    E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:217-228 [Conf]
  19. Spyros Antonatos, Michalis Polychronakis, P. Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:393-408 [Conf]
  20. Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Design and Implementation of a High-Performance Network Intrusion Prevention System. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:359-374 [Conf]
  21. Kostas G. Anagnostakis, Michael Greenwald
    A hybrid direct-indirect estimator of network internal delays. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2004, pp:426-427 [Conf]
  22. Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
    Generating realistic workloads for network intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    WOSP, 2004, pp:207-215 [Conf]
  23. Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
    Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:30-40 [Conf]
  24. Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, D. Li, Jonathan M. Smith
    Flexible network monitoring with FLAME. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:14, pp:2548-2563 [Journal]
  25. Kostas G. Anagnostakis, Michael Greenwald
    Direct measurement vs. indirect inference for determining network-internal delays. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2002, v:49, n:1/4, pp:165-177 [Journal]
  26. Athanasios V. Vasilakos, Kostas G. Anagnostakis, Witold Pedrycz
    Application of computational intelligence techniques in active networks. [Citation Graph (0, 0)][DBLP]
    Soft Comput., 2001, v:5, n:4, pp:264-271 [Journal]
  27. Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
    An Active Splitter Architecture for Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:31-44 [Journal]
  28. Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
    GAS: Overloading a File Sharing Network as an Anonymizing System. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:365-379 [Conf]
  29. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:87-106 [Conf]
  30. Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
    Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3471-3490 [Journal]
  31. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Network-level polymorphic shellcode detection using emulation. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:2, n:4, pp:257-274 [Journal]

  32. Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]


  33. Efficient packet monitoring for network management. [Citation Graph (, )][DBLP]


  34. Design of an application programming interface for IP network monitoring. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.458secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002