|
Search the dblp DataBase
Sotiris Ioannidis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith
Implementing a distributed firewall. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:190-199 [Conf]
- Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith
The STRONGMAN Architecture. [Citation Graph (0, 0)][DBLP] DISCEX (1), 2003, pp:178-188 [Conf]
- John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis
Fileteller: Paying and Getting Paid for File Storage. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:282-299 [Conf]
- Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis
TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP] PWC, 2003, pp:90-100 [Conf]
- Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:427-442 [Conf]
- Vassilis Prevelakis, Sotiris Ioannidis
Preserving TCP Connections Across Host Address Changes. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:299-310 [Conf]
- Kostas G. Anagnostakis, Michael Greenwald, Sotiris Ioannidis, Stefan Miltchev
Open Packet Monitoring on FLAME: Safety, Performance, and Applications. [Citation Graph (0, 0)][DBLP] IWAN, 2002, pp:120-131 [Conf]
- Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
Scalable Resource Control in Active Networks. [Citation Graph (0, 0)][DBLP] IWAN, 2000, pp:343-357 [Conf]
- Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Jonathan M. Smith
Practical Network Applications on a Lightweight Active Management Environment. [Citation Graph (0, 0)][DBLP] IWAN, 2001, pp:101-115 [Conf]
- Sotiris Ioannidis, Sandhya Dwarkadas
Compiler and Run-Time Support for Adaptive Load Balancing in Software Distributed Shared Memory Systems. [Citation Graph (0, 0)][DBLP] LCR, 1998, pp:107-122 [Conf]
- Sotiris Ioannidis, Steven M. Bellovin
Building a Secure Web Browser. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2001, pp:127-134 [Conf]
- Stefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis
A Study of the Relative Costs of Network Security Protocols. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2002, pp:41-48 [Conf]
- Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
Secure and Flexible Global File Sharing. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2003, pp:165-178 [Conf]
- Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP] WETICE, 2003, pp:269-274 [Conf]
- Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis
WebDAVA: An Administrator-Free Approach To Web File-Sharing. [Citation Graph (0, 0)][DBLP] WETICE, 2003, pp:59-64 [Conf]
- Dionisios N. Pnevmatikatos, Evangelos P. Markatos, Grigorios Magklis, Sotiris Ioannidis
On using network RAM as a non-volatile buffer. [Citation Graph (0, 0)][DBLP] Cluster Computing, 1999, v:2, n:4, pp:295-303 [Journal]
- Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, D. Li, Jonathan M. Smith
Flexible network monitoring with FLAME. [Citation Graph (0, 0)][DBLP] Computer Networks, 2006, v:50, n:14, pp:2548-2563 [Journal]
- Sotiris Ioannidis, Umit Rencuzogullari, Robert Stets, Sandhya Dwarkadas
CRAUL: Compiler and run-time integration for adaptation under load. [Citation Graph (0, 0)][DBLP] Scientific Programming, 1999, v:7, n:3-4, pp:261-273 [Journal]
- Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:221-228 [Conf]
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. [Citation Graph (, )][DBLP]
Distributed Privacy-Preserving Policy Reconciliation. [Citation Graph (, )][DBLP]
Compromising Anonymity Using Packet Spinning. [Citation Graph (, )][DBLP]
Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]
GrAVity: A Massively Parallel Antivirus Engine. [Citation Graph (, )][DBLP]
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. [Citation Graph (, )][DBLP]
Regular Expression Matching on Graphics Hardware for Intrusion Detection. [Citation Graph (, )][DBLP]
Controlling Access to XML Documents over XML Native and Relational Databases. [Citation Graph (, )][DBLP]
Sub-operating systems: a new approach to application security. [Citation Graph (, )][DBLP]
Efficient packet monitoring for network management. [Citation Graph (, )][DBLP]
HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. [Citation Graph (, )][DBLP]
Decentralized access control in distributed file systems. [Citation Graph (, )][DBLP]
Search in 0.007secs, Finished in 0.009secs
|