Technical & Research Reports
M.S. Theses
- Sfakianakis, A. (2012). CensMon : a web censorship monitor.
- Chinis, G. (2012). Practical Information Flow for Legacy Web Applications.
- Kontaxis, G. (2011). A Lightweight Censorship-resistant Web Access Architecture.
- Tzermias Zacharias, Z. (2011). Combining Static and Dynamic Analysis for the Detection of Malicious Documents.
- Zarras, A. (2011). Detecting and Defending Against Fraud in the Underground Economy.
- Gkesiou, E. (2011). Trawling the Deep Web.
- Krithinakis, A. (2010). RaJa: Cross-site Scripting Detection and Prevention Using Souirce Randomization. October 2010
- Kapravelos, A. (2010). Robust prevention of DIAL attacks. July 2010
- Makridakis, A. (2009). Antisocial Networks: Turning a Social Network into an Attack Platform . November 2009
- Polakis, I.S. (2009). Exploring honeypot Technologies for malware Collection and Cyber-attack Information Acquisition. November 2009
- Lekakis, V. (2009). Overlay Networks based on Selfish Neighbor Selection. 2009
- Nikiforakis, N. (2009). Parasitic Storage Systems: Free, Reliable and Globally Accesible Gigabytes. 2009
- Pappas, V. (2009). xJS: Fighting Cross-Site Scripting Attacks Using Isolation Operators. 2009
- Vasileiadis, G. (2008). Improving the Performance of Network Intrusion Detection Systems Using Graphics Processors. December 2008
- Antoniadis, D. (2007). Appmon: An Application for Accurate Per-Application Network Traffic Characterization. December 2007
- Papadogiannakis, A. (2007). Improving the Performance of Passive Network Monitoring Applications. December 2007
- Athanatos, E. (2007). Prototype Deployment of the Network of Affined Honeypots Architecture. December 2007
- Athanasopoulos, I. (2007). Using Unstructured Peer-to-Peer Systems as Denial of Service Attack Platforms. May 2007
- Papoutsidis, E. (2006). A Biomedical GRID Infrastructure to Enable High-performing Data Mining and Knowledge Extraction Operations. April 2006
- Koukis, D.V. (2006). A Framework for Network Traffic Anonymization. April 2006
- Akritidis, P. (2005). Detection of Zero-Day Worms. December 2005
- Antonatos, S. (2005). Network Address Space Randomization: A Proactive Defense Against Hitlist Worms. December 2005
- Moschous, E. (2005). Transcoding Techniques for Mobile Web Access using the CC/PP Protocol. December 2005
- Koutsourakis, P. (2004). Segmentation using graph cuts applied to change detection. November 2004
- Lelis, S. (2003). An Agent-based Model of Sites Popularity. 2003
- Zikos, G. (1998). A Wavelet Based Framework for Human Face Detection and Recognition. November 1998
- Kloukinas, Ch. (1997). Ομαδοποίηση "εν πτήσει" Δοσοληψιών σε Ομάδες με Παρόμοια Χαρακτηριστικά Φόρτου Εργασίας
. April 1997