|
Search the dblp DataBase
Kostas G. Anagnostakis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:130-145 [Conf]
- V. T. Lam, Spyros Antonatos, P. Akritidis, Kostas G. Anagnostakis
Puppetnets: misusing web browsers as a distributed attack infrastructure. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:221-234 [Conf]
- Spyros Antonatos, Kostas G. Anagnostakis
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:12-21 [Conf]
- D. Koukis, Spyros Antonatos, Kostas G. Anagnostakis
On the Privacy Risks of Publishing Anonymized IP Network Traces. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:22-32 [Conf]
- Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
Network-Level Polymorphic Shellcode Detection Using Emulation. [Citation Graph (0, 0)][DBLP] DIMVA, 2006, pp:54-73 [Conf]
- Kostas G. Anagnostakis, Michael Greenwald
Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing. [Citation Graph (0, 0)][DBLP] ICDCS, 2004, pp:524-533 [Conf]
- Kostas G. Anagnostakis, Michael Greenwald, Raphael S. Ryger
cing: Measuring Network-Internal Delays using only Existing Infrastructure. [Citation Graph (0, 0)][DBLP] INFOCOM, 2003, pp:- [Conf]
- Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:427-442 [Conf]
- Kostas G. Anagnostakis, Michael Greenwald, Sotiris Ioannidis, Stefan Miltchev
Open Packet Monitoring on FLAME: Safety, Performance, and Applications. [Citation Graph (0, 0)][DBLP] IWAN, 2002, pp:120-131 [Conf]
- Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
Scalable Resource Control in Active Networks. [Citation Graph (0, 0)][DBLP] IWAN, 2000, pp:343-357 [Conf]
- Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Jonathan M. Smith
Practical Network Applications on a Lightweight Active Management Environment. [Citation Graph (0, 0)][DBLP] IWAN, 2001, pp:101-115 [Conf]
- Kostas G. Anagnostakis, Michael Greenwald, Raphael S. Ryger
On the Sensitivity of Network Simulation to Topology. [Citation Graph (0, 0)][DBLP] MASCOTS, 2002, pp:117-0 [Conf]
- Ioannis Charitakis, Kostas G. Anagnostakis, Evangelos P. Markatos
An Active Traffic Splitter Architecture for Intrusion Detection. [Citation Graph (0, 0)][DBLP] MASCOTS, 2003, pp:238-241 [Conf]
- Athanasios V. Vasilakos, Kostas G. Anagnostakis, Witold Pedrycz
Application of computational intelligence techniques in active networks. [Citation Graph (0, 0)][DBLP] SAC, 2001, pp:448-455 [Conf]
- Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis
Performance Analysis of Content Matching Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] SAINT, 2004, pp:208-218 [Conf]
- Ioannis Charitakis, Dionisios N. Pnevmatikatos, Evangelos P. Markatos, Kostas G. Anagnostakis
Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. [Citation Graph (0, 0)][DBLP] SCOPES, 2003, pp:226-239 [Conf]
- P. Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis
STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:375-392 [Conf]
- Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:217-228 [Conf]
- Spyros Antonatos, Michalis Polychronakis, P. Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:393-408 [Conf]
- Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos
Design and Implementation of a High-Performance Network Intrusion Prevention System. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:359-374 [Conf]
- Kostas G. Anagnostakis, Michael Greenwald
A hybrid direct-indirect estimator of network internal delays. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2004, pp:426-427 [Conf]
- Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
Generating realistic workloads for network intrusion detection systems. [Citation Graph (0, 0)][DBLP] WOSP, 2004, pp:207-215 [Conf]
- Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP] WORM, 2005, pp:30-40 [Conf]
- Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, D. Li, Jonathan M. Smith
Flexible network monitoring with FLAME. [Citation Graph (0, 0)][DBLP] Computer Networks, 2006, v:50, n:14, pp:2548-2563 [Journal]
- Kostas G. Anagnostakis, Michael Greenwald
Direct measurement vs. indirect inference for determining network-internal delays. [Citation Graph (0, 0)][DBLP] Perform. Eval., 2002, v:49, n:1/4, pp:165-177 [Journal]
- Athanasios V. Vasilakos, Kostas G. Anagnostakis, Witold Pedrycz
Application of computational intelligence techniques in active networks. [Citation Graph (0, 0)][DBLP] Soft Comput., 2001, v:5, n:4, pp:264-271 [Journal]
- Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
An Active Splitter Architecture for Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:31-44 [Journal]
- Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
GAS: Overloading a File Sharing Network as an Anonymizing System. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:365-379 [Conf]
- Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. [Citation Graph (0, 0)][DBLP] RAID, 2007, pp:87-106 [Conf]
- Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:12, pp:3471-3490 [Journal]
- Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
Network-level polymorphic shellcode detection using emulation. [Citation Graph (0, 0)][DBLP] Journal in Computer Virology, 2007, v:2, n:4, pp:257-274 [Journal]
Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]
Efficient packet monitoring for network management. [Citation Graph (, )][DBLP]
Design of an application programming interface for IP network monitoring. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.008secs
|