2010 | ||
---|---|---|
31 | Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh: A Virtualization Architecture for In-Depth Kernel Isolation. HICSS 2010: 1-10 | |
2009 | ||
30 | Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo: Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46 | |
29 | Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh: A2M: Access-Assured Mobile Desktop Computing. ISC 2009: 186-201 | |
28 | Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein: Adding Trust to P2P Distribution of Paid Content. ISC 2009: 459-474 | |
27 | Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou: Privacy Preservation over Untrusted Mobile Networks. Privacy in Location-Based Applications 2009: 84-105 | |
26 | Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo: Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60 | |
25 | Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou: SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061 | |
2008 | ||
24 | Jason Nieh, Angelos Stavrou: Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008 ACM 2008 | |
23 | Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54 | |
22 | Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95 | |
21 | Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 | |
20 | Claudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati, Rhandi Martin: A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. PiLBA 2008 | |
19 | Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin: PAR: Payment for Anonymous Routing. Privacy Enhancing Technologies 2008: 219-236 | |
18 | Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28 | |
17 | Michael E. Locasto, Angelos Stavrou: The Hidden Difficulties of Watching and Rebuilding Networks. IEEE Security & Privacy 6(2): 79-82 (2008) | |
2007 | ||
16 | Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551 | |
15 | Angelos Stavrou, David Turner, Angelos D. Keromytis, Vassilis Prevelakis: Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007 | |
14 | Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis: A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250 | |
13 | Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis: From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232 | |
2006 | ||
12 | Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364 | |
11 | Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis: Dark application communities. NSPW 2006: 11-18 | |
2005 | ||
10 | Angelos Stavrou, Angelos D. Keromytis: Countering DoS attacks with stateless multipath overlays. ACM Conference on Computer and Communications Security 2005: 249-259 | |
9 | Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis: gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193 | |
8 | Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein: MOVE: An End-to-End Solution to Network Denial of Service. NDSS 2005 | |
7 | Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks 48(5): 781-807 (2005) | |
2004 | ||
6 | Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134 | |
5 | Angelos Stavrou, Dan Rubenstein, Sambit Sahu: A lightweight, robust P2P system to handle flash crowds. IEEE Journal on Selected Areas in Communications 22(1): 6-17 (2004) | |
4 | Edward G. Coffman Jr., Andreas Constantinides, Dan Rubenstein, Bruce Shepherd, Angelos Stavrou: Content distribution for seamless transmission. SIGMETRICS Performance Evaluation Review 32(2): 31-32 (2004) | |
2003 | ||
3 | William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: Using graphic turing tests to counter automated DDoS attacks against web servers. ACM Conference on Computer and Communications Security 2003: 8-19 | |
2002 | ||
2 | Angelos Stavrou, Dan Rubenstein, Sambit Sahu: A Lightweight, Robust P2P System to Handle Flash Crowds. ICNP 2002: 226-235 | |
1 | Angelos Stavrou, Dan Rubenstein, Sambit Sahu: A lightweight, robust P2P system to handle flash crowds. Computer Communication Review 32(3): 17 (2002) |