|
Search the dblp DataBase
Spyros Antonatos:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- V. T. Lam, Spyros Antonatos, P. Akritidis, Kostas G. Anagnostakis
Puppetnets: misusing web browsers as a distributed attack infrastructure. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:221-234 [Conf]
- Spyros Antonatos, Kostas G. Anagnostakis
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:12-21 [Conf]
- Elias Athanasopoulos, Spyros Antonatos
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:97-108 [Conf]
- D. Koukis, Spyros Antonatos, Kostas G. Anagnostakis
On the Privacy Risks of Publishing Anonymized IP Network Traces. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:22-32 [Conf]
- Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis
Performance Analysis of Content Matching Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] SAINT, 2004, pp:208-218 [Conf]
- Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:217-228 [Conf]
- Spyros Antonatos, Michalis Polychronakis, P. Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:393-408 [Conf]
- Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
Generating realistic workloads for network intrusion detection systems. [Citation Graph (0, 0)][DBLP] WOSP, 2004, pp:207-215 [Conf]
- Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP] WORM, 2005, pp:30-40 [Conf]
- Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
An Active Splitter Architecture for Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:31-44 [Journal]
- Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:12, pp:3471-3490 [Journal]
Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. [Citation Graph (, )][DBLP]
Regular Expression Matching on Graphics Hardware for Intrusion Detection. [Citation Graph (, )][DBLP]
Harnessing the Power of P2P Systems for Fast Attack Signature Validation. [Citation Graph (, )][DBLP]
HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|