Sotiris Ioannidis
Sotiris Ioannidis
Technical University of Crete and Foundation for Research and Technology - Hellas
Bestätigte E-Mail-Adresse bei ece.tuc.gr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communications …, 2000
8292000
Gnort: High performance network intrusion detection using graphics processors
G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 116-134, 2008
4092008
Rage against the Virtual Machine: Hindering Dynamic Analysis of Android Malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the Seventh European Workshop on System Security (EuroSec), 6, 2014
2082014
A new wireless communication paradigm through software-controlled metasurfaces
C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz
IEEE Communications Magazine 56 (9), 162-169, 2018
1782018
Regular expression matching on graphics hardware for intrusion detection
G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 265-283, 2009
1672009
MIDeA: a multi-parallel intrusion detection architecture
G Vasiliadis, M Polychronakis, S Ioannidis
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1422011
Detecting social network profile cloning
G Kontaxis, I Polakis, S Ioannidis, EP Markatos
2011 IEEE international conference on pervasive computing and communications …, 2011
1292011
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
1202011
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
1022008
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
982015
A cooperative immunization system for an untrusting internet
KG Anagnostakis, MB Greenwald, S Ioannidis, AD Keromytis, D Li
The 11th IEEE International Conference on Networks (ICON), 403-408, 2003
912003
Sub-operating systems: A new approach to application security
S Ioannidis, SM Bellovin, JM Smith
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 108-115, 2002
892002
Efficient packet monitoring for network management
KG Anagnostakis, S Ioannidis, S Miltchev, M Greenwald, JM Smith, ...
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
892002
A study of the relative costs of network security protocols
S Miltchev, S Ioannidis, AD Keromytis
872002
Gravity: a massively parallel antivirus engine
G Vasiliadis, S Ioannidis
International Workshop on Recent Advances in Intrusion Detection, 79-96, 2010
862010
Fileteller: Paying and getting paid for file storage
J Ioannidis, S Ioannidis, AD Keromytis, V Prevelakis
International Conference on Financial Cryptography, 282-299, 2002
832002
The STRONGMAN architecture
AD Keromytis, S Ioannidis, MB Greenwald, JM Smith
DARPA Information Survivability Conference and Exposition (DISCEX) 1, 178-188, 2003
702003
Censmon: A web censorship monitor
A Sfakianakis, E Athanasopoulos, S Ioannidis
USENIX Workshop on Free and Open Communication on the Internet (FOCI), 2, 2011
652011
AndRadar: Fast Discovery of Android Applications in Alternative Markets” Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwan
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
11th Conference on Detection of Intrusions and Malware & Vulnerability …, 0
63*
Two-factor authentication: is the world ready? Quantifying 2FA adoption
T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis
Proceedings of the eighth european workshop on system security, 1-7, 2015
612015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20