The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Angelos Stavrou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    A Pay-per-Use DoS Protection Mechanism for the Web. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:120-134 [Conf]
  2. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
    W3Bcrypt: Encryption as a Stylesheet. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:349-364 [Conf]
  3. William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    Using graphic turing tests to counter automated DDoS attacks against web servers. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:8-19 [Conf]
  4. Angelos Stavrou, Angelos D. Keromytis
    Countering DoS attacks with stateless multipath overlays. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:249-259 [Conf]
  5. Angelos Stavrou, Dan Rubenstein, Sambit Sahu
    A Lightweight, Robust P2P System to Handle Flash Crowds. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:226-235 [Conf]
  6. Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
    gore: Routing-Assisted Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:179-193 [Conf]
  7. Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein
    MOVE: An End-to-End Solution to Network Denial of Service. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  8. Angelos Stavrou, Dan Rubenstein, Sambit Sahu
    A lightweight, robust P2P system to handle flash crowds. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:3, pp:17- [Journal]
  9. Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    WebSOS: an overlay-based system for protecting web servers from denial of service attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:781-807 [Journal]
  10. Edward G. Coffman Jr., Andreas Constantinides, Dan Rubenstein, Bruce Shepherd, Angelos Stavrou
    Content distribution for seamless transmission. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 2004, v:32, n:2, pp:31-32 [Journal]
  11. Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
    A Study of Malcode-Bearing Documents. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:231-250 [Conf]
  12. Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis
    Dark application communities. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:11-18 [Conf]

  13. Pushback for Overlay Networks: Protecting Against Malicious Insiders. [Citation Graph (, )][DBLP]


  14. On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]


  15. Efficiently tracking application interactions using lightweight virtualization. [Citation Graph (, )][DBLP]


  16. Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. [Citation Graph (, )][DBLP]


  17. Bridging the Network Reservation Gap Using Overlays. [Citation Graph (, )][DBLP]


  18. Providing Mobile Users' Anonymity in Hybrid Networks. [Citation Graph (, )][DBLP]


  19. A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. [Citation Graph (, )][DBLP]


  20. Privacy Preservation over Untrusted Mobile Networks. [Citation Graph (, )][DBLP]


  21. Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. [Citation Graph (, )][DBLP]


  22. A Virtualization Architecture for In-Depth Kernel Isolation. [Citation Graph (, )][DBLP]


  23. Adding Trust to P2P Distribution of Paid Content. [Citation Graph (, )][DBLP]


  24. A2M: Access-Assured Mobile Desktop Computing. [Citation Graph (, )][DBLP]


  25. Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]


  26. PAR: Payment for Anonymous Routing. [Citation Graph (, )][DBLP]


  27. Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. [Citation Graph (, )][DBLP]


  28. HyperCheck: A Hardware-Assisted Integrity Monitor. [Citation Graph (, )][DBLP]


  29. SQLProb: a proxy-based architecture towards preventing SQL injection attacks. [Citation Graph (, )][DBLP]


  30. Casting out Demons: Sanitizing Training Data for Anomaly Sensors. [Citation Graph (, )][DBLP]


  31. From STEM to SEAD: Speculative Execution for Automated Defense. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.329secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002