The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Evangelos P. Markatos: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
    Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:130-145 [Conf]
  2. Manolis Katevenis, Panagiota Vatsolaki, Dimitrios N. Serpanos, Evangelos P. Markatos
    ATLAS: A Single-Chip ATM Switch for NOWs. [Citation Graph (0, 0)][DBLP]
    CANPC, 1997, pp:88-101 [Conf]
  3. Evangelos P. Markatos, Manolis Katevenis, Penny Vatsolaki
    The Remote Enqueue Operation on Networks of Workstations. [Citation Graph (0, 0)][DBLP]
    CANPC, 1998, pp:1-14 [Conf]
  4. Evangelos P. Markatos
    Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2002, pp:65-74 [Conf]
  5. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Network-Level Polymorphic Shellcode Detection Using Emulation. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:54-73 [Conf]
  6. Emilio Luque, José G. Castaños, Evangelos P. Markatos, Raffaele Perego
    Topic 3: Scheduling and Load Balancing. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2004, pp:220-221 [Conf]
  7. Evangelos P. Markatos, Manolis Katevenis
    Telegraphos: High-Performance Networking for Parallel Processing on Workstation Clusters. [Citation Graph (0, 0)][DBLP]
    HPCA, 1996, pp:144-153 [Conf]
  8. Evangelos P. Markatos, Manolis Katevenis
    User-Level DMA without Operating System Kernel Modification. [Citation Graph (0, 0)][DBLP]
    HPCA, 1997, pp:322-331 [Conf]
  9. Athanasios E. Papathanasiou, Evangelos P. Markatos
    Lightweight Transactions on Networks of Workstations. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1998, pp:544-551 [Conf]
  10. Evangelos P. Markatos, Thomas J. LeBlanc
    Load Balancing vs. Locality Management in Shared-Memory Multiprocessors. [Citation Graph (0, 0)][DBLP]
    ICPP (1), 1992, pp:258-267 [Conf]
  11. Ioannis Charitakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    An Active Traffic Splitter Architecture for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2003, pp:238-241 [Conf]
  12. Evangelos P. Markatos
    Using Remote Memory to Avoid Disk Thrashing: A Simulation Study. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1996, pp:69-73 [Conf]
  13. Evangelos P. Markatos
    Issues in Reliable Network Memory Paging. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1996, pp:207-211 [Conf]
  14. Evangelos P. Markatos, Catherine E. Chronaki
    Trace-Driven Simulation of Data-Alignment and Ohter Factors Affecting Update and Invalidate Based Coherent Memory. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1994, pp:44-51 [Conf]
  15. Jan Coppens, Steven Van den Berghe, Herbert Bos, Evangelos P. Markatos, Filip De Turck, Arne Øslebø, Sven Ubik
    SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. [Citation Graph (0, 0)][DBLP]
    MMNS, 2003, pp:475-487 [Conf]
  16. Evangelos P. Markatos
    How Architecture Evolution Influences the Scheduling Discipline used in Shared-Memory Multiprocessors. [Citation Graph (0, 0)][DBLP]
    PARCO, 1993, pp:627-630 [Conf]
  17. Evangelos P. Markatos, Catherine E. Chronaki
    Using Reference Counters in Update-Based Coherent Memory. [Citation Graph (0, 0)][DBLP]
    PARLE, 1994, pp:805-808 [Conf]
  18. Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis
    Performance Analysis of Content Matching Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:208-218 [Conf]
  19. Evangelos P. Markatos, Thomas J. LeBlanc
    Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors. [Citation Graph (0, 0)][DBLP]
    SC, 1992, pp:104-113 [Conf]
  20. Ioannis Charitakis, Dionisios N. Pnevmatikatos, Evangelos P. Markatos, Kostas G. Anagnostakis
    Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. [Citation Graph (0, 0)][DBLP]
    SCOPES, 2003, pp:226-239 [Conf]
  21. P. Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis
    STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:375-392 [Conf]
  22. Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
    E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:217-228 [Conf]
  23. Spyros Antonatos, Michalis Polychronakis, P. Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:393-408 [Conf]
  24. Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Design and Implementation of a High-Performance Network Intrusion Prevention System. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:359-374 [Conf]
  25. Brian D. Marsh, Michael L. Scott, Thomas J. LeBlanc, Evangelos P. Markatos
    First-Class User-Level Theads. [Citation Graph (0, 0)][DBLP]
    SOSP, 1991, pp:110-121 [Conf]
  26. Thomas J. LeBlanc, Evangelos P. Markatos
    Shared Memory vs. Message Passing in Shared-Memory Multiprocessors. [Citation Graph (0, 0)][DBLP]
    SPDP, 1992, pp:254-263 [Conf]
  27. Evangelos P. Markatos, George Dramitinos
    Implementation of a Reliable Remote Memory Pager. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, 1996, pp:177-190 [Conf]
  28. Evangelos P. Markatos, Manolis Katevenis, Dionisios N. Pnevmatikatos, Michail Flouris
    Secondary Storage Management for Web Proxies. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  29. Athanasios E. Papathanasiou, Evangelos P. Markatos, Stavros A. Papadakis
    PaperFinder: A Tool for Scalable Search of Digital Libraries. [Citation Graph (0, 0)][DBLP]
    WebNet, 1998, pp:- [Conf]
  30. Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
    Generating realistic workloads for network intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    WOSP, 2004, pp:207-215 [Conf]
  31. Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
    Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:30-40 [Conf]
  32. Michail Flouris, Evangelos P. Markatos
    The Network RamDisk: Using remote memory on heterogeneous NOWs. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 1999, v:2, n:4, pp:281-293 [Journal]
  33. Dionisios N. Pnevmatikatos, Evangelos P. Markatos, Grigorios Magklis, Sotiris Ioannidis
    On using network RAM as a non-volatile buffer. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 1999, v:2, n:4, pp:295-303 [Journal]
  34. Evangelos P. Markatos
    Main Memory Caching of Web Documents. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1996, v:28, n:7-11, pp:893-905 [Journal]
  35. Evangelos P. Markatos
    On caching search engine query results. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2001, v:24, n:2, pp:137-143 [Journal]
  36. Michael L. Scott, Thomas J. LeBlanc, Brian D. Marsh, Timothy G. Becker, Cezary Dubnicki, Evangelos P. Markatos, Neil G. Smithline
    Implementation Issues for the Psyche Multiprocessor Operating System. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1989, v:3, n:1, pp:101-138 [Journal]
  37. Manolis Katevenis, Evangelos P. Markatos, Penny Vatsolaki, Chara Xanthaki
    The Remote Enqueue Operation on Networks of Workstations. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 1999, v:23, n:1, pp:- [Journal]
  38. Catherine E. Houstis, Sarantos Kapidakis, Evangelos P. Markatos, Erol Gelenbe
    Execution of Compute-Intensive Applications into Parallel Machines. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1997, v:97, n:1&2, pp:83-124 [Journal]
  39. George Dramitinos, Evangelos P. Markatos
    Adaptive and Reliable Paging to Remote Main Memory. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1999, v:58, n:3, pp:357-388 [Journal]
  40. Manolis Katevenis, Evangelos P. Markatos, George Kalokerinos, Apostolos Dollas
    Telegraphos: A Substrate for High-Performance Computing on Workstation Clusters. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1997, v:43, n:2, pp:94-108 [Journal]
  41. Evangelos P. Markatos
    Visualizing Working Sets. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:4, pp:3-11 [Journal]
  42. Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
    An Active Splitter Architecture for Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:31-44 [Journal]
  43. Evangelos P. Markatos, Dionisios N. Pnevmatikatos, Michail Flouris, Manolis Katevenis
    Web-conscious storage management for web proxies. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2002, v:10, n:6, pp:735-748 [Journal]
  44. Evangelos P. Markatos, Thomas J. LeBlanc
    Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1994, v:5, n:4, pp:379-400 [Journal]
  45. Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
    GAS: Overloading a File Sharing Network as an Anonymizing System. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:365-379 [Conf]
  46. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:87-106 [Conf]
  47. Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
    Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3471-3490 [Journal]
  48. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Network-level polymorphic shellcode detection using emulation. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:2, n:4, pp:257-274 [Journal]

  49. D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. [Citation Graph (, )][DBLP]


  50. One-click hosting services: a file-sharing hideout. [Citation Graph (, )][DBLP]


  51. Compromising Anonymity Using Packet Spinning. [Citation Graph (, )][DBLP]


  52. Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]


  53. Topnet: A Network-aware top(1). [Citation Graph (, )][DBLP]


  54. Improving the Performance of Passive Network Monitoring Applications using Locality Buffering. [Citation Graph (, )][DBLP]


  55. RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage. [Citation Graph (, )][DBLP]


  56. Realistic Passive Packet Loss Measurement for High-Speed Networks. [Citation Graph (, )][DBLP]


  57. Imbuing Unstructured P2P Systems with Non-Intrusive Topology Awareness. [Citation Graph (, )][DBLP]


  58. MOR: Monitoring and Measurements through the Onion Router. [Citation Graph (, )][DBLP]


  59. Gnort: High Performance Network Intrusion Detection Using Graphics Processors. [Citation Graph (, )][DBLP]


  60. Regular Expression Matching on Graphics Hardware for Intrusion Detection. [Citation Graph (, )][DBLP]


  61. The effects of multiprogramming on barrier synchronization. [Citation Graph (, )][DBLP]


  62. Multiprogramming on multiprocessors. [Citation Graph (, )][DBLP]


  63. DiMAPI: An Application Programming Interface for Distributed Network Monitoring. [Citation Graph (, )][DBLP]


  64. Design of an application programming interface for IP network monitoring. [Citation Graph (, )][DBLP]


  65. Improving the accuracy of network intrusion detection systems under load using selective packet discarding. [Citation Graph (, )][DBLP]


  66. HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. [Citation Graph (, )][DBLP]


Search in 0.057secs, Finished in 0.060secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002