The SCEAS System
Navigation Menu

Search the dblp DataBase


Sotiris Ioannidis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith
    Implementing a distributed firewall. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:190-199 [Conf]
  2. Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith
    The STRONGMAN Architecture. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:178-188 [Conf]
  3. John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis
    Fileteller: Paying and Getting Paid for File Storage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:282-299 [Conf]
  4. Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis
    TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:90-100 [Conf]
  5. Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
    Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:427-442 [Conf]
  6. Vassilis Prevelakis, Sotiris Ioannidis
    Preserving TCP Connections Across Host Address Changes. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:299-310 [Conf]
  7. Kostas G. Anagnostakis, Michael Greenwald, Sotiris Ioannidis, Stefan Miltchev
    Open Packet Monitoring on FLAME: Safety, Performance, and Applications. [Citation Graph (0, 0)][DBLP]
    IWAN, 2002, pp:120-131 [Conf]
  8. Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Scalable Resource Control in Active Networks. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:343-357 [Conf]
  9. Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Jonathan M. Smith
    Practical Network Applications on a Lightweight Active Management Environment. [Citation Graph (0, 0)][DBLP]
    IWAN, 2001, pp:101-115 [Conf]
  10. Sotiris Ioannidis, Sandhya Dwarkadas
    Compiler and Run-Time Support for Adaptive Load Balancing in Software Distributed Shared Memory Systems. [Citation Graph (0, 0)][DBLP]
    LCR, 1998, pp:107-122 [Conf]
  11. Sotiris Ioannidis, Steven M. Bellovin
    Building a Secure Web Browser. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2001, pp:127-134 [Conf]
  12. Stefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis
    A Study of the Relative Costs of Network Security Protocols. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2002, pp:41-48 [Conf]
  13. Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Secure and Flexible Global File Sharing. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2003, pp:165-178 [Conf]
  14. Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:269-274 [Conf]
  15. Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis
    WebDAVA: An Administrator-Free Approach To Web File-Sharing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:59-64 [Conf]
  16. Dionisios N. Pnevmatikatos, Evangelos P. Markatos, Grigorios Magklis, Sotiris Ioannidis
    On using network RAM as a non-volatile buffer. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 1999, v:2, n:4, pp:295-303 [Journal]
  17. Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, D. Li, Jonathan M. Smith
    Flexible network monitoring with FLAME. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:14, pp:2548-2563 [Journal]
  18. Sotiris Ioannidis, Umit Rencuzogullari, Robert Stets, Sandhya Dwarkadas
    CRAUL: Compiler and run-time integration for adaptation under load. [Citation Graph (0, 0)][DBLP]
    Scientific Programming, 1999, v:7, n:3-4, pp:261-273 [Journal]
  19. Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer
    Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:221-228 [Conf]

  20. D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. [Citation Graph (, )][DBLP]

  21. Distributed Privacy-Preserving Policy Reconciliation. [Citation Graph (, )][DBLP]

  22. Compromising Anonymity Using Packet Spinning. [Citation Graph (, )][DBLP]

  23. Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]

  24. GrAVity: A Massively Parallel Antivirus Engine. [Citation Graph (, )][DBLP]

  25. Gnort: High Performance Network Intrusion Detection Using Graphics Processors. [Citation Graph (, )][DBLP]

  26. Regular Expression Matching on Graphics Hardware for Intrusion Detection. [Citation Graph (, )][DBLP]

  27. Controlling Access to XML Documents over XML Native and Relational Databases. [Citation Graph (, )][DBLP]

  28. Sub-operating systems: a new approach to application security. [Citation Graph (, )][DBLP]

  29. Efficient packet monitoring for network management. [Citation Graph (, )][DBLP]

  30. HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. [Citation Graph (, )][DBLP]

  31. Decentralized access control in distributed file systems. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002