Conferences

Papers in Proceedings (full-paper reviewed)

  • Ladakis, E, Koromilas, L., Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2013). You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger.  In Proceedings of the 6th European Workshop on System Security (EuroSec). April , Prague, Czech Republic
  • Polakis, I., Lancini, M, Kondaxis, G., Maggi, F, Ioannidis, S., Keromytis, A. D., & Zanero, S. (2012). All your face are belong to us: Breaking Facebook¢s Social Authentication. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC). December , Orlando, FL, USA
  • Athanasopoulos, E., Kemerlis, V. P., Polychronakis, M., & Markatos, E.P. (2012). ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS'12). June 2012, Singapore
  • Gessiou, E., Volanis, S., Athanasopoulos, E., Markatos, E.P., & Ioannidis, S. (2012). Digging up social structures from documents on the web. In Proceedings of IEEE 2012 Communication and Information System Security Symposium (Globecom CISS). December 2012, Anaheim, CA, USA
  • Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2012). Minimizing information disclosure to third parties in social login platforms. In International Journal of Information Security (IJIS). October 5
  • Kontaxis, G., Polychronakis, M., Keromytis, A. D., & Markatos, E.P. (2012). Privacy-Preserving Social Plugins. In Proceedings of the 21st USENIX Security Symposium. August 2012, Bellevue, WA, USA
  • Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2012). Tolerating Overload Attacks Against Packet Capturing Systems. In Proceedings of the USENIX Annual Technical Conference (ATC). June 2012, Boston, MA, USA
  • Antoniades, D., Kontaxis, G., Athanasopoulos, E., Ioannidis, S., Markatos, E.P., & Karagiannis, Th. (2011).  we.b: The Web of Short URLs. In Proceedings of the 20th International World Wide Web Conference (WWW). March 2011, Hyderabad, India
  • Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2011). MIDeA: A Multi-Parallel Intrusion Detection Architecture. In Proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS). October 2011, Chicago, IL, USA
  • Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2011). Parallelization and Characterization of Pattern Matching using GPUs.  In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC). November 2011, Austin, TX, USA
  • Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2011). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms. In Proceedings of the 14th Information Security Conference (ISC). October 2011, Xi'an, China
  • Markatos, E.P., Petsas, T., Polakis, I.S., & Antonatos, S. (2010). A systematic characterization of IM threats using honeypots. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 2010). Feb 2010
  • Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). An architecture for enforcing JavaScript randomization in web2.0 applications. Short paper in Proceedings of the 13th Information Security Conference (ISC 2010). 25 October 2010 through 28 October 2010, Boca Raton, FL, USA. (pp. 203-209) (03029743; 9783642181771 (ISBN))
  • Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2010). Comprehensive shellcode detection using runtime heuristics. Proceedings of the 26th Annual Computer Security Applications Conference. Austin, Texas. (pp. 287-296). New York, NY, USA: ACM (978-1-4503-0133-6)
  • Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2010). D(e|i)aling with VoIP: Robust prevention of DIAL attacks. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). September 20-22, Athens, Greece. (pp. 663-678) (03029743; 3642154964 (ISBN); 9783642154966 (ISBN))
  • Kontaxis, G., Polakis, I., & Markatos, E.P. (2010). Experiences and observations from the NoAH infrastructure. 6th European Conference on Computer Network Defense, EC2ND 2010. October 28-29, Berlin. (pp. 11-18) (9780769543116 (ISBN))
  • Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2010). GPU-assisted malware. 5th International Conference on Malicious and Unwanted Software, Malware 2010. October 19-20, Nancy. (pp. 1-6) (9781424493555 (ISBN))
  • Vasiliadis, G., & Ioannidis, S. (2010). GrAVity: A massively parallel antivirus engine. In Proceedings of the 13th International Symposium On Recent Advances In Intrusion Detection (RAID). September 15-17, Ottawa, Canada. (pp. 79-96) (03029743; 3642155111 (ISBN); 9783642155116 (ISBN))
  • Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). Hunting Cross-Site Scripting Attacks in the Network. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP). May 2010, Oakland, California
  • Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). Improving the accuracy of network intrusion detection systems under load using selective packet discarding. Proceedings of the Third European Workshop on System Security. Paris, France. (pp. 15-21). New York, NY, USA: ACM (978-1-4503-0059-9)
  • Krithinakis, A., Athanasopoulos, E., & Markatos, E.P. (2010). Isolating javaScript in dynamic code environments. 2010 Workshop on the Analysis and Programming Languages for Web Applications and Cloud Applications, APLWACA 2010. June 6, Toronto, ON. (pp. 45-49) (9781605589138 (ISBN))
  • Antoniades, D., Markatos, E.P., & Dovrolis, C. (2010). MOR: monitoring and measurements through the onion router. Proceedings of the 11th international conference on Passive and active measurement. Zurich, Switzerland. (pp. 131-140). Berlin, Heidelberg: Springer-Verlag (3-642-12333-3, 978-3-642-12333-7)
  • Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). RRDtrace: Long-term raw network traffic recording using fixed-size storage. 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010. August 17-19, Miami Beach, FL. (pp. 101-110) (9780769541976 (ISBN))
  • Danilatou, V., & Ioannidis, S. (2010). Security and Privacy Architectures for Biomedical Cloud Computing. In Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine. November, Corfu, Greece
  • Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., & Markatos, E.P. (2010). Using social networks to harvest email addresses. 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS '10. October 4-8, Chicago, IL. (pp. 11-20) (15437221; 9781450300964 (ISBN))
  • Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.P., & Karagiannis, Th. (2010). xJS: practical XSS prevention for web application development. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps). Boston, MA, USA. (pp. 13). Berkeley, CA, USA: USENIX Association
  • Gessiou, E., Labrinidis, A., & Ioannidis, S. (2009). A Greek (privacy) tragedy: the introduction of social security numbers in Greece. WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society. Chicago, Illinois, USA. (pp. 101-104). New York, NY, USA: ACM (978-1-60558-783-7)
  • Nikiforakis, N., Makridakis, A., Athanasopoulos, E., & Markatos, E.P. (2009). Alice, what did you do last time? Fighting Phishing Using Past Activity Tests. Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND '07); LNEE (Lecture Notes on Electrical Engineering). 4-5 October, Heraklion, Greece. Springer (978-0-387-85554-7)
  • Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). An Empirical Study of Real-world Polymorphic Code Injection Attacks. 2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET '09). April, Boston, MA, USA
  • Papadakis, H., Trufino, P., Talia, D., & Fragopoulou, P. (2009). An Experimental Evaluation of the DQ-DHT Algorithm in a Grid Information Service. In Proceedings of the CoreGRID ERCIM Working Group Workshop on Grids, P2P and Service Computing. Held in conjunction With EuroPAR 2009. August, Delft, The Netherlands
  • Athanasopoulos, E., Pappas, V., & Markatos, E.P. (2009). Code-Injection Attacks in Browsers Supporting Policies. In Proceedings of the Third Workshop on Web 2.0 Security & Privacy (W2SP). May, Oakland, CA, USA
  • Koromilas, L., Chinis, G., Fundulaki, I., & Ioannidis, S. (2009). Controlling access to XML documents over XML native and relational databases. In Proceedings of the 6th VLDB Workshop on Secure Data Management (SDM). 28 August 2009 through 28 August 2009, Lyon, France. (pp. 122-141) (03029743; 364204218X (ISBN); 9783642042188 (ISBN)) (pdf)
  • Foukarakis, M., Antoniades, D., & Polychronakis, M. (2009). Deep packet anonymization. EUROSEC '09: Proceedings of the Second European Workshop on System Security. March, Nuremburg, Germany. (pp. 16-21). New York, NY, USA: ACM (978-1-60558-472-0)
  • Bos, H., Ioannidis, S., Jonsson, E., Kirda, E., & Kruegel, Ch. (2009). Future Threats to Future Trust. In Proceedings of the Future of Trust in Computing Conference. July 2008, Berlin, Germany. (pp. 49-54)
  • Antonatos, S., & Vu, Q. (2009). Harnessing the power of P2P systems for fast attack signature validation. In Proceedings of the 3rd International Conference on Network and System Security (NSS 2009). 19-21 October, Gold Coast, Australia. (pp. 107-114)
  • Chin, W.Y., Markatos, E.P., Antonatos, S., & Ioannidis, S. (2009). HoneyLab: Large-scale honeypot deployment and resource sharing. 2009 3rd International Conference on Network and System Security, NSS 2009. 19 October 2009 through 21 October 2009, Gold Coast, QLD. (pp. 381-388) (9780769538389 (ISBN))
  • Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2009). Imbuing unstructured P2P systems with non-intrusive topology awareness. In Proceedings of the 9th International Conference on Peer-to-Peer Computing.. 91-1 September, Seattle, USA. (pp. 51-60)
  • Antoniades, D., Markatos, E.P., & Dovrolis, C. (2009). One-click hosting services: a file-sharing hideout. IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. Chicago, Illinois, USA. (pp. 223-234). New York, NY, USA: ACM (978-1-60558-771-4)
  • Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). Real-world Polymorphic Attack Detection. In Proceedings of the 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA). June, Athens, Greece
  • Friedl, A., Ubik, S., Kapravelos, A., Polychronakis, M., & Markatos, E.P. (2009). Realistic passive packet loss measurement for high-speed networks. 1st International Workshop on Traffic Monitoring and Analysis, TMA 2009. 11 May 2009 through 11 May 2009, Aachen. (pp. 1-7) (03029743; 9783642016448 (ISBN))
  • Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E.P., & Ioannidis, S. (2009). Regular Expression Matching on Graphics Hardware for Intrusion Detection. Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009. September 23-25, Saint-Malo, France. (pp. 265-283)
  • Athanasopoulos, E., Krithinakis, A., Kopidakis, G., Maxwell, G., Poustie, A., Manning, B., Webb, R., Koyabe, M., & Cairano-Gilfedder, C.D. (2009). WISDOM: Security-aware fibres. 2nd European Workshop on System Security, EUROSEC '09. 31 March 2009 through 31 March 2009, Nuremberg. (pp. 22-27) (9781605584720 (ISBN))
  • Forestiero, A., Mastroianni, C., Papadakis, H., Fragopoulou, P., Tretola, G., & Zimeo, E. (2008). A Scalable Architecture for Discovery and Composition in P2P Service Networks. In Proceedings of the CoreGRID Integration Workshop. July, Heraklion, Crete, Greece. (pp. 97-108). USA: Springer
  • Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., & Markatos, E.P. (2008). Antisocial networks: Turning a social network into a botnet. 11th International Conference on Information Security, ISC 2008. 15 September 2008 through 18 September 2008, Taipei, Taiwan. (pp. 146-160) (03029743; 3540858849 (ISBN); 9783540858843 (ISBN))
  • Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2008). Compromising anonymity using packet spinning. 11th International Conference on Information Security, ISC 2008. 15 September 2008 through 18 September 2008, Taipei, Taiwan. (pp. 161-174) (03029743; 3540858849 (ISBN); 9783540858843 (ISBN))
  • Smaragdakis, G., Lekakis, V., Laoutaris, N., Bestavros, A., Byers, J.W., & Roussopoulos, M. (2008). EGOIST: Overlay routing using selfish neighbor selection. 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08. 9 December 2008 through 12 December 2008, Madrid (9781605582108 (ISBN))
  • Bos, H., & Markatos, E.P. (2008). European Conference on Computer Systems: Preface. 1st European Workshop on System Security, EUROSEC '08. 31 March 2008 through 31 March 2008, Glasgow. Association for Computing Machinery (9781605581194 (ISBN))
  • Politopoulos, P.I., Markatos, E.P., & Ioannidis, S. (2008). Evaluation of compression of remote network monitoring data streams. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08. 7 April 2008 through 11 April 2008, Salvador da Bahia, Brazil. (pp. 109-115) (9781424420674 (ISBN))
  • Polychronakis, M., Mavrommatis, P., & Provos, N. (2008). Ghost turns zombie: exploring the life cycle of web-based malware. LEET '08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. April, San Francisco, California. (pp. 1-8). Berkeley, CA, USA: USENIX Association
  • Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., & Ioannidis, S. (2008). Gnort: High performance network intrusion detection using graphics processors. Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings. 15 September 2008 through 17 September 2008, Cambridge, MA, USA. (pp. 116-134) (03029743; 354087402X (ISBN); 9783540874027 (ISBN))
  • Antonatos, S., Athanatos, M., Kondaxis, G., Velegrakis, J., Hatzibodozis, N., Ioannidis, S., & Markatos, E.P. (2008). Honey@home: A new approach to large-scale threat monitoring. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008. 21 April 2008 through 22 April 2008, Amsterdam. (pp. 3-16) (9780769533476 (ISBN))
  • Antoniades, D., Trimintzios, P., Polychronakis, M., Ubik, S., Papadogiannakis, A., & Smotlacha, V.R. (2008). LOBSTER: a European platform for passive network traffic monitoring. TridentCom '08: Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities. Innsbruck, Austria. (pp. 1-10). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; ICST, Brussels, Belgium, Belgium: ICST (978-963-9799-24-0)
  • Antoniades, D., Polychronakis, M., Nikiforakis, N., Markatos, E.P., & Mitsos, Y. (2008). Monitoring three National Research Networks for eight weeks: Observations and implications. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08. 7 April 2008 through 11 April 2008, Salvador da Bahia. (pp. 153-156) (9781424420674 (ISBN))
  • Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2008). On the Anonymization and Deanonymization of Netflow Traffic. In Proceedings of FloCon 2008. January, Savannah, Georgia, USA
  • Williams, P., Rosenthal, D.S.H., Roussopoulos, M., & Georgis, S. (2008). Predicting archival life of removable hard disk drives. Archiving 2008. 24 June 2008 through 27 June 2008, Bern. (pp. 188-192) (9780892082773 (ISBN))
  • Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2008). Real-world polymorphic attack detection using network-level emulation. CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research. Oak Ridge, Tennessee. (pp. 1-3). New York, NY, USA: ACM (978-1-60558-098-2)
  • Theocharides, A., Antoniades, D., Polychronakis, M., Athanasopoulos, E., & Markatos, E.P. (2008). Topnet: A Network-aware top(1). LISA; Proceedings of the 22nd Large Installation System Administration Conference, {LISA} 2008, November 9-14, 2008, San Diego, {CA {USA}. September, San Diego, California. (pp. 145-157). USENIX Association (978-1-931971-63-8)
  • Nikiforakis, N., Antoniades, D., Markatos, E.P., Ioannidis, S., & Øslebø, A. (2008). When AppMon met Stager. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08. 7 April 2008 through 11 April 2008, Salvador da Bahia. (pp. 157-160) (9781424420674 (ISBN))
  • Krithinakis, A., Stroetmann, L., Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2008). WSIM: A Software Platform to Simulate All-Optical Security Operations. Computer Network Defense, 2008. EC2ND 2008. European Conference on. Decembe, Dublin, Ireland. (pp. 41-47)
  • Ciuffoletti, A., & Polychronakis, M. (2007). Architecture of a Network Monitoring Element. Workshops: CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics, Revised Selected Papers. August 29-September 1, Dresden, Germany. (pp. 5-14)
  • Papadakis, H., Trunfio, P., Talia, D., & Fragopoulou, P. (2007). Design and implementation of a hybrid P2P-based grid resource discovery system. In Proceedings of the CoreGRID Workshop on Grid Programming Model, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments. Heraklion, Crete, Greece. Springer
  • Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Emulation-based detection of non-self-contained polymorphic shellcode. 10th Symposium on Recent Advances in Intrusion Detection, RAID 2007. 5 September 2007 through 7 September 2007, Gold Coast, Australia. (pp. 87-106) (03029743; 9783540743194 (ISBN))
  • Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2007). Flexible and high-performance anonymization of Netflow records using anontool. 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. 17 September 2007 through 21 September 2007, Nice. (pp. 33-38) (1424409756 (ISBN); 9781424409754 (ISBN))
  • Athanasopoulos, E., Roussopoulos, M., Anagnostakis, K.G., & Markatos, E.P. (2007). GAS: Overloading a file sharing network as an anonymizing system. 2nd International Workshop on Security, IWSEC 2007. 29 October 2007 through 31 October 2007, Nara. (pp. 365-379) (03029743; 9783540756507 (ISBN))
  • Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@home: a new approach to large-scale threat monitoring. WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode. Alexandria, Virginia, USA. (pp. 38-45). New York, NY, USA: ACM (978-1-59593-886-2)
  • Papadogiannakis, A., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2007). Improving the performance of passive network monitoring applications using locality buffering. 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS '07. 24 October 2007 through 26 October 2007, Istanbul. (pp. 151-157) (9781424418541 (ISBN))
  • Andreozzi, S., Ciuffoletti, A., Ghiselli, A., Antoniades, D., Polychronakis, M., Markatos, E.P., & Trimintzios, P. (2007). On the Integration of Passive and Active Network Monitoring in Grid Systems. Integrated Research in GRID Computing. Workshop 2005 (Selected Papers). November 28–30, Pisa, Italy. (pp. 147-161). USA: Springer (978-0-387-47656-8 (Print) 978-0-387-47658-2 (Online))
  • Koukis, D., Antonatos, S., Antoniades, D., Markatos, E.P., & Trimintzios, P. (2006). A generic anonymization framework for network traffic. 2006 IEEE International Conference on Communications, ICC 2006. 11 July 2006 through 15 July 2006, Istanbul. (pp. 2302-2309) (05361486; 1424403553 (ISBN); 9781424403554 (ISBN))
  • Antoniades, D., Polychronakis, M., Antonatos, S., Markatos, E.P., Ubik, S., & Øslebø, A. (2006). Appmon: An Application for Accurate per Application Network Traffic Characterisation. In IST Broadband Europe 2006 Conference. December, Geneva, Switzerland
  • Ciuffoletti, A., & Polychronakis, M. (2006). Architecture of a network monitoring element. 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2006. 26 June 2006 through 28 June 2006, Manchester. (pp. 220-221) (15244547; 0769526233 (ISBN); 9780769526232 (ISBN))
  • Antoniades, D., Athanatos, M., Papadogiannakis, A., Markatos, E.P., & Dovrolis, C. (2006). Available bandwidth measurement as simple as running wget. In Proceedings of the Passive and Active Measurement Conference (PAM2006). March, Adelaide, Australia
  • Popov, K., Papadakis, H., Fragopoulou, P., & Vlassov, V. (2006). Building Scalable Self-Organizing Grid Services Using P2P Technologies. In Proceedings of the 3rd CoreGrid Integration Workshop. 19-20 October, Krakow, Poland
  • Trimintzios, P., Polychronakis, M., Papadogiannakis, A., Foukarakis, M., Markatos, E.P., & Øslebø, A. (2006). DiMAPI: An application programming interface for distributed network monitoring. 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006. 3 April 2006 through 7 April 2006, Vancouver, BC. (pp. 382-393) (1424401429 (ISBN); 9781424401420 (ISBN))
  • Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2006). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. In Proceedings of the 3nd CoreGRID Integration Workshop. Krakow Poland
  • Athanasopoulos, E., & Antonatos, S. (2006). Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS '06). October 19-21, Heraklion, Crete, Greece. (pp. 97-108)
  • Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2006). Grid Reliability: A Study of Failures on the EGEE Infrastructure. Proceedings of the 3rd CoreGRID Integration Workshop. 19-20 October, Krakow, Poland. (pp. 165-176)
  • Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets. 4th International Conference on Applied Cryptography and Network Security, ACNS 2006. 6 June 2006 through 9 June 2006, Singapore. (pp. 130-145) (03029743; 3540347038 (ISBN); 9783540347033 (ISBN))
  • Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation. July 13-14, Berlin, Germany. (pp. 54-73)
  • Koukis, D., Antonatos, S., & Anagnostakis, K.G. (2006). On the Privacy Risks of Publishing Anonymized IP Network Traces. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS '06). October 19-21, Heraklion, Crete, Greece. (pp. 22-32)
  • Papadogiannakis, A., Kapravelos, A., Polychronakis, M., Markatos, E.P., & Ciuffoletti, A. (2006). Passive end-to-end packet loss estimation for GRID traffic monitoring. CoreGRID Integration Workshop 2006. October 19-20, Krakow, Poland. Krakow: CYFRONET AG (83-915141-6-1)
  • Lam, V.T., Antonatos, S., Akritidis, P., & Anagnostakis, K.G. (2006). Puppetnets: misusing web browsers as a distributed attack infrastructure. CCS '06: Proceedings of the 13th ACM conference on Computer and communications security. Alexandria, Virginia, USA. (pp. 221-234). New York, NY, USA: ACM (1-59593-518-5)
  • Antonatos, S., & Anagnostakis, K.G. (2006). TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. In Proceedings of the 10th IFIP TC-6 TC-11 International Conference, CMS 2006. October 19-21, Heraklion, Crete, Greece. (pp. 12-21)
  • Papadakis, H., Fragopoulou, P., Athanasopoulos, E., Dikaiakos, M., & Markatos, E.P. (2005). A Feedback-based Approach to Reduce Duplicate Messages. In Proceedings of the 2nd CoreGrid Integration Workshop. November, Lisbon, Portugal
  • Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2005). Defending against hitlist worms using network address space randomization. WORM '05 - 2005 ACM Workshop on Rapid Malcode. 11 November 2005 through 11 November 2005, Farfax, VA. (pp. 30-40) (1595932291 (ISBN))
  • Xinidis, K., Anagnostakis, K.G., & Markatos, E.P. (2005). Design and Implementation of a High-Performance Network Intrusion Prevention System. IFIP TC11 20th International Information Security Conference. May 30 – June 1, Chiba, Japan. (pp. 359-374)
  • Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow Honeypots. Proceedings of the 14th {USENIX} Security Symposium. August, USENIX
  • Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Efficient content-based detection of zero-day worms. Communications, 2005. ICC 2005. 2005 IEEE International Conference on Communications (ICC 2005). 16-20 May, Seoul, Korea. (pp. 837-843)
  • Andreozzi, S., Antoniades, D., Ciuffoletti, A., Ghiselli, A., Markatos, E.P., Polychronakis, M., & Trimintzios, P. (2005). Issues about the Integration of Passive and Active Monitoring for Grid Networks. CoreGRID Integration Workshop 2005. Nov, Pisa
  • Trunfio, P., Talia, D., Fragopoulou, P., Papadakis, H., Mordacchini, M., Pennanen, M., Popov, K., Vlassov, V., & Haridi, S. (2005). Peer-to-Peer Models for Resource Discovery on Grids. In Proceedings of the 2nd CoreGrid Integration Workshop. January, Lisbon, Portugal
  • Antonatos, S., Polychronakis, M., Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC. May 30 - June 1, Chiba, Japan. (pp. 393-408)
  • Akritidis, P., Markatos, E.P., Polychronakis, M., & Anagnostakis, K.G. (2005). STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis. May 30 – June 1, Chiba, Japan. (pp. 375-391)
  • Polychronakis, M., Markatos, E.P., Anagnostakis, K.G., & Øslebø, A. (2004). Design of an application programming interface for IP network monitoring. 2004 IEEE/IFIP Network Operations and Management Symposium: Managing Next Generation Convergence Networks and Services, NOMS 2004. 1 April 2004 through 1 April 2004, Seoul. (pp. 483-496)
  • Markatos, E.P., Ji R Novotn, Y., Polychronakis, M., Smotlacha, V.R., & Ubik, S. (2004). SCAMPI - A Scaleable Monitoring Platform for the Internet. In Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004). 22-23 March, Budapest, Hungary
  • Luque, E., Castaños, J.G., Markatos, E.P., & Perego, R. (2004). Topic 3: Scheduling and Load Balancing. August 31- September 3, Pisa, Italy. (pp. 220-221)
  • Lalis, S. (2003). Discovery in a Dynamically Composable Personal System. Proceedings of the Tenth International Conference on Human-Computer Interaction; Universal access in HCI : inclusive design in the information society. June 22-27, Crete, Greece. (pp. 429-433)
  • Karypidis, A., & Lalis, S. (2003). Harnessing the potential of mobile personal data repositories. In Proceedings Hawaii International Conference on System Sciences (HICSS-36). January 6-9, Hawaii. (pp. 10 pp.)
  • Karypidis, A., & Lalis, S. (2003). The tangible file system. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCSW '03). May 19-22, Rhode Island, USA. (pp. 268-273)
  • Kakarontzas, G., & Lalis, S. (2001). A market-based protocol with leasing support for globally distributed computing. 15-18 May, (pp. 562-567)
  • Houstis, C.E., & Lalis, S. (2001). ARION: A scalable architecture for a digital library of scientific collections. 8-10 November, Nicosia, Cyprus
  • Lalis, S., & Karypidis, A. (2000). An open market-based architecture for distributed computing. May, Cancun, Mexico
  • Kapidakis, S. (1999). Issues in the Development and Operation of a Digital Library. ECDL '99: Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries.  (pp. 363-382). London, UK: Springer-Verlag (3-540-66558-7)
  • Anastasiadi, A., Kapidakis, S., Nikolaou, Ch., & Sairamesh, J. (1998). A computational economy for dynamic load balancing and data replication. ICE '98: Proceedings of the first international conference on Information and computation economies. Charleston, South Carolina, United States. (pp. 166-180). New York, NY, USA: ACM (1-58113-076-7)
  • Kapidakis, S., Terzis, S., & Sairamesh, J. (1998). A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries. ECDL '98: Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries.  (pp. 95-114). London, UK: Springer-Verlag (3-540-65101-2)
  • Toraki, K., & Kapidakis, S. (1998). The Technical Chamber of Greece Digital Library: The Vision of a Special Organisation to Save and Disseminate Its Information Work Through the Network. ECDL '98: Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries.  (pp. 691-692). London, UK: Springer-Verlag (3-540-65101-2)
  • Nikolaou, Ch., Marazakis, M., Papadakis, D., & Yeorgiannakis, Y. (1997). Towards a Common Infrastructure for Large-Scale Distributed Applications. Research and Advanced Technology for Digital Libraries. September 1–3, Pisa, Italy. (pp. 173-??) (0302-9743)
  • Kapidakis, S., & Mavronicolas, M. (1995). Load balancing networks. PODC '95: Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing. Ottowa, Ontario, Canada. (pp. 275). New York, NY, USA: ACM (0-89791-710-3)
  • Marazakis, M., & Nikolaou, Ch. (1995). Towards adaptive scheduling of tasks in transactional workflows. Proceedings of the 1995 Winter Simulation Conference, WSC '95. 3 December 1995 through 6 December 1995, Arlington, VA, USA. (pp. 604-611). Piscataway, NJ, United States: IEEE (02750708)
© Copyright 2007 FOUNDATION FOR RESEARCH & TECHNOLOGY - HELLAS, All rights reserved.