The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Spyros Antonatos: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. V. T. Lam, Spyros Antonatos, P. Akritidis, Kostas G. Anagnostakis
    Puppetnets: misusing web browsers as a distributed attack infrastructure. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:221-234 [Conf]
  2. Spyros Antonatos, Kostas G. Anagnostakis
    TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:12-21 [Conf]
  3. Elias Athanasopoulos, Spyros Antonatos
    Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:97-108 [Conf]
  4. D. Koukis, Spyros Antonatos, Kostas G. Anagnostakis
    On the Privacy Risks of Publishing Anonymized IP Network Traces. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:22-32 [Conf]
  5. Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis
    Performance Analysis of Content Matching Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:208-218 [Conf]
  6. Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
    E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:217-228 [Conf]
  7. Spyros Antonatos, Michalis Polychronakis, P. Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:393-408 [Conf]
  8. Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
    Generating realistic workloads for network intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    WOSP, 2004, pp:207-215 [Conf]
  9. Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
    Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:30-40 [Conf]
  10. Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
    An Active Splitter Architecture for Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:31-44 [Journal]
  11. Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
    Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3471-3490 [Journal]

  12. Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]


  13. Gnort: High Performance Network Intrusion Detection Using Graphics Processors. [Citation Graph (, )][DBLP]


  14. Regular Expression Matching on Graphics Hardware for Intrusion Detection. [Citation Graph (, )][DBLP]


  15. Harnessing the Power of P2P Systems for Fast Attack Signature Validation. [Citation Graph (, )][DBLP]


  16. HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002