Conferences

Papers in Proceedings (full-paper reviewed)

  • Forestiero, A., Mastroianni, C., Papadakis, H., Fragopoulou, P., Tretola, G., & Zimeo, E. (2008). A Scalable Architecture for Discovery and Composition in P2P Service Networks. In Proceedings of the CoreGRID Integration Workshop. July, Heraklion, Crete, Greece. (pp. 97-108). USA: Springer
  • Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., & Markatos, E.P. (2008). Antisocial networks: Turning a social network into a botnet. 11th International Conference on Information Security, ISC 2008. 15 September 2008 through 18 September 2008, Taipei, Taiwan. (pp. 146-160) (03029743; 3540858849 (ISBN); 9783540858843 (ISBN))
  • Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2008). Compromising anonymity using packet spinning. 11th International Conference on Information Security, ISC 2008. 15 September 2008 through 18 September 2008, Taipei, Taiwan. (pp. 161-174) (03029743; 3540858849 (ISBN); 9783540858843 (ISBN))
  • Smaragdakis, G., Lekakis, V., Laoutaris, N., Bestavros, A., Byers, J.W., & Roussopoulos, M. (2008). EGOIST: Overlay routing using selfish neighbor selection. 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08. 9 December 2008 through 12 December 2008, Madrid (9781605582108 (ISBN))
  • Bos, H., & Markatos, E.P. (2008). European Conference on Computer Systems: Preface. 1st European Workshop on System Security, EUROSEC '08. 31 March 2008 through 31 March 2008, Glasgow. Association for Computing Machinery (9781605581194 (ISBN))
  • Politopoulos, P.I., Markatos, E.P., & Ioannidis, S. (2008). Evaluation of compression of remote network monitoring data streams. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08. 7 April 2008 through 11 April 2008, Salvador da Bahia, Brazil. (pp. 109-115) (9781424420674 (ISBN))
  • Polychronakis, M., Mavrommatis, P., & Provos, N. (2008). Ghost turns zombie: exploring the life cycle of web-based malware. LEET '08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. April, San Francisco, California. (pp. 1-8). Berkeley, CA, USA: USENIX Association
  • Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., & Ioannidis, S. (2008). Gnort: High performance network intrusion detection using graphics processors. Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings. 15 September 2008 through 17 September 2008, Cambridge, MA, USA. (pp. 116-134) (03029743; 354087402X (ISBN); 9783540874027 (ISBN))
  • Antonatos, S., Athanatos, M., Kondaxis, G., Velegrakis, J., Hatzibodozis, N., Ioannidis, S., & Markatos, E.P. (2008). Honey@home: A new approach to large-scale threat monitoring. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008. 21 April 2008 through 22 April 2008, Amsterdam. (pp. 3-16) (9780769533476 (ISBN))
  • Antoniades, D., Trimintzios, P., Polychronakis, M., Ubik, S., Papadogiannakis, A., & Smotlacha, V.R. (2008). LOBSTER: a European platform for passive network traffic monitoring. TridentCom '08: Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities. Innsbruck, Austria. (pp. 1-10). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; ICST, Brussels, Belgium, Belgium: ICST (978-963-9799-24-0)
  • Antoniades, D., Polychronakis, M., Nikiforakis, N., Markatos, E.P., & Mitsos, Y. (2008). Monitoring three National Research Networks for eight weeks: Observations and implications. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08. 7 April 2008 through 11 April 2008, Salvador da Bahia. (pp. 153-156) (9781424420674 (ISBN))
  • Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2008). On the Anonymization and Deanonymization of Netflow Traffic. In Proceedings of FloCon 2008. January, Savannah, Georgia, USA
  • Williams, P., Rosenthal, D.S.H., Roussopoulos, M., & Georgis, S. (2008). Predicting archival life of removable hard disk drives. Archiving 2008. 24 June 2008 through 27 June 2008, Bern. (pp. 188-192) (9780892082773 (ISBN))
  • Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2008). Real-world polymorphic attack detection using network-level emulation. CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research. Oak Ridge, Tennessee. (pp. 1-3). New York, NY, USA: ACM (978-1-60558-098-2)
  • Theocharides, A., Antoniades, D., Polychronakis, M., Athanasopoulos, E., & Markatos, E.P. (2008). Topnet: A Network-aware top(1). LISA; Proceedings of the 22nd Large Installation System Administration Conference, {LISA} 2008, November 9-14, 2008, San Diego, {CA {USA}. September, San Diego, California. (pp. 145-157). USENIX Association (978-1-931971-63-8)
  • Nikiforakis, N., Antoniades, D., Markatos, E.P., Ioannidis, S., & Øslebø, A. (2008). When AppMon met Stager. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08. 7 April 2008 through 11 April 2008, Salvador da Bahia. (pp. 157-160) (9781424420674 (ISBN))
  • Krithinakis, A., Stroetmann, L., Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2008). WSIM: A Software Platform to Simulate All-Optical Security Operations. Computer Network Defense, 2008. EC2ND 2008. European Conference on. Decembe, Dublin, Ireland. (pp. 41-47)
© Copyright 2007 FOUNDATION FOR RESEARCH & TECHNOLOGY - HELLAS, All rights reserved.