|
Search the dblp DataBase
Angelos Stavrou:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
A Pay-per-Use DoS Protection Mechanism for the Web. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:120-134 [Conf]
- Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
W3Bcrypt: Encryption as a Stylesheet. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:349-364 [Conf]
- William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
Using graphic turing tests to counter automated DDoS attacks against web servers. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:8-19 [Conf]
- Angelos Stavrou, Angelos D. Keromytis
Countering DoS attacks with stateless multipath overlays. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:249-259 [Conf]
- Angelos Stavrou, Dan Rubenstein, Sambit Sahu
A Lightweight, Robust P2P System to Handle Flash Crowds. [Citation Graph (0, 0)][DBLP] ICNP, 2002, pp:226-235 [Conf]
- Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
gore: Routing-Assisted Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:179-193 [Conf]
- Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein
MOVE: An End-to-End Solution to Network Denial of Service. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Angelos Stavrou, Dan Rubenstein, Sambit Sahu
A lightweight, robust P2P system to handle flash crowds. [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2002, v:32, n:3, pp:17- [Journal]
- Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
WebSOS: an overlay-based system for protecting web servers from denial of service attacks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:5, pp:781-807 [Journal]
- Edward G. Coffman Jr., Andreas Constantinides, Dan Rubenstein, Bruce Shepherd, Angelos Stavrou
Content distribution for seamless transmission. [Citation Graph (0, 0)][DBLP] SIGMETRICS Performance Evaluation Review, 2004, v:32, n:2, pp:31-32 [Journal]
- Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
A Study of Malcode-Bearing Documents. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:231-250 [Conf]
- Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis
Dark application communities. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:11-18 [Conf]
Pushback for Overlay Networks: Protecting Against Malicious Insiders. [Citation Graph (, )][DBLP]
On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]
Efficiently tracking application interactions using lightweight virtualization. [Citation Graph (, )][DBLP]
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. [Citation Graph (, )][DBLP]
Bridging the Network Reservation Gap Using Overlays. [Citation Graph (, )][DBLP]
Providing Mobile Users' Anonymity in Hybrid Networks. [Citation Graph (, )][DBLP]
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. [Citation Graph (, )][DBLP]
Privacy Preservation over Untrusted Mobile Networks. [Citation Graph (, )][DBLP]
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. [Citation Graph (, )][DBLP]
A Virtualization Architecture for In-Depth Kernel Isolation. [Citation Graph (, )][DBLP]
Adding Trust to P2P Distribution of Paid Content. [Citation Graph (, )][DBLP]
A2M: Access-Assured Mobile Desktop Computing. [Citation Graph (, )][DBLP]
Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]
PAR: Payment for Anonymous Routing. [Citation Graph (, )][DBLP]
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. [Citation Graph (, )][DBLP]
HyperCheck: A Hardware-Assisted Integrity Monitor. [Citation Graph (, )][DBLP]
SQLProb: a proxy-based architecture towards preventing SQL injection attacks. [Citation Graph (, )][DBLP]
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. [Citation Graph (, )][DBLP]
From STEM to SEAD: Speculative Execution for Automated Defense. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.329secs
|