ICS Publications - DCS

Conferences (180)

    Papers in Proceedings (full-paper reviewed)

  1. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). The Cost of Digital Advertisement: Comparing User and Advertiser Views. Proceedings of the 27th International World Wide Web Conference (WWW 2018), Lyon, France, April 2018. (pdf).
  2. Tsirantonakis, G., Ilia, P., Ioannidis, S., Athanasopoulos, E., & Polychronakis, M. (2018). A Large-scale Analysis of Content Modification by Open HTTP Proxies.. Proceedings of the Network and Distributed System Security Symposium (NDSS '18), San Diego, USA, February 2018.
  3. Papadopoulos, P., Kourtellis, N., Rodriguez , P., & Laoutaris, N. (2017). If you are not paying for it, you are the product: How much do advertisers pay to reach you?. Proceedings of the 17th Internet Measurements Conference 2017 (IMC'17), London, UK, November 2017. (pdf).
  4. Tsioliaridou, N. A., Liaskos, C. K., Pitsillides, A., & Ioannidis, S. (2017). A Novel Protocol for Network-Controlled Metasurfaces.. Proceedings of the 4nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), September 2017. Washington, DC, USA (pdf).
  5. Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E.P., & Ioannidis, S. (2017). No Sugar but all the Taste! Memory Encryption without Architectural Support. Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017), Oslo, Norway, September 2017. (pdf).
  6. Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2017). The Socket Store: An App Model for the Application-Network Interaction. Proceedings of the 22nd IEEE Symposium on Computers and Communication (ISCC 2017), Heraklion, Crete, Greece, July 2017. (pdf).
  7. Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2017). CCSP: a Compressed Certificate Status Protocol. Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '17), Atlanta, GA, USA, May 2017. (pdf).
  8. Papadopoulos, E. P. , Diamantaris, M., Papadopoulos, P., Petsas, T., Ioannidis, S., & Markatos, E.P. (2017). The Long-Standing Privacy Debate: Mobile Websites Vs Mobile Apps. Proceedings of the 26th International World Wide Web Conference, (WWW 2017), Perth, Western Australia, April 2017. (pdf).
  9. Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S. (2017). SAMPAC: Socially-Aware collaborative Multi-Party Access Control. Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), Scottsdale, USA, March 2017. (pdf).
  10. Koromilas, L., Vasiliadis, G., Athanasopoulos, E., & Ioannidis, S. (2016). GRIM: Leveraging GPUs for Kernel Integrity Monitoring. Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), France, Paris, September 2016. (pdf).
  11. Papadopoulos, P., Athanasopoulos, E., Kosta, E., Siganos, G., Keromytis, A.D., & Markatos, E.P. (2016). Provable Network Activity for Protecting Users against False Accusation. Proceedings of the 10th International Conference on Information Security Theory and Practice (WISTP'2016) , Heraklion, Crete, Greece, September 2016. (pdf).
  12. Tsioliaridou, N. A., Liaskos, C. K., Dedu, E., & Ioannidis, S. (2016). Stateless Linear-path Routing for 3D Nanonetworks. Proceedings of the 3nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), New York City, New York, USA, September 2016. (pdf).
  13. Antonakaki, D., Spiliotopoulos, D., Samaras, C., Ioannidis, S., & Fragopoulou, P. (2016). Investigating the Complete Corpus of Referendum and Elections Tweets. Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2016), San Francisco, CA, USA, August 2016. (pdf).
  14. Spiliotopoulos, D., Antonakaki, D., Ioannidis, S., & Fragopoulou, P. (2016). Usability Evaluation of Accessible Complex Graphs. Proceedings of the 15th International Conference on Computers Helping People with Special Needs, Linz, Austria, July 2016. (pdf).
  15. Koryzis, D., Samaras, C., Makri, E., Svolopoulos, V., & Spiliotopoulos, D. (2016). Visual Cue Streams for Multimodal Dialogue Interaction. Proceedings of the 7th International Conference on Applied Human Factors and Ergonomics, Orlando, FL, USA, July 2016. (pdf).
  16. Koryzis, D., Svolopoulos, V., & Spiliotopoulos, D. (2016). Metalogue: A Multimodal Learning Journey. Proceedings of the 9th ACM International Conference on Pervasive Technologies Related to Assistive Environments, New York, NY, USA, June 2016. (pdf).
  17. Spiliotopoulos, D., Antonakaki, D., Ioannidis, S., & Fragopoulou, P. (2016). Motivation Effect of Social Media Posts about Well-being and Healthy Living. Proceedings of the 9th ACM International Conference on Pervasive Technologies Related to Assistive Environments. ACM, New York, NY, USA, June 2016. (pdf).
  18. Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., & Kantartzis, N. , Pitsillides, A. (2016). A Deployable Routing System for Nanonetworks. In proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia , May 2016. (pdf).
  19. Tsioliaridou, N. A., Liaskos, C. K., Pachis, L. , Ioannidis, S., & Pitsillides, A. (2016). N3: Addressing and Routing in 3D Nanonetworks. IEEE International Conference on Telecommunications (ICT), Thessaloniki, Greece, May 2016. (pdf).
  20. Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2016). DCSP: Performant Certificate Revocation a DNS-based approach. Proceedings of the 9th European Workshop on Systems Security (EuroSec), London, UK, April 2016. (pdf).
  21. Christoulakis, N., Christou, G., Athanasopoulos, E., & Ioannidis, S. (2016). HCFI: Hardware-enforced Control-Flow Integrity. In proceedings of the 6th ACM Conference on Data and Applications Security and Privacy (CODASPY), New Orleans, LA, US , March 2016. (Oustanding Paper Award).
  22. Haller, I., Göktaş, E., Athanasopoulos, E., Portokalidis, G., & Bos, H. (2015). ShrinkWrap: VTable protection without loose endsIn proceedings of the 31st Annual Computer Security Applications Conference (ACSAC) , Los Angeles, CA, US, December, 2015.
  23. Ilia, P., Polakis, I., Athanasopoulos, E., & Maggi, F, Ioannidis, S. (2015). Face/Off: Preventing Privacy Leakage From Photos in Social Networks. Proceedings of the 22nd ACM/SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA, November 2015. (pdf).
  24. Papadopoulos, P., Petsas, T., Christou, G., & Vasiliadis, G. (2015). MAD: A Middleware Framework for Multi-Step Attack Detection . Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), Kyoto, Japan, November 2015. (pdf).
  25. Polakis, I., Ilia, P., Tzermias, Z., Ioannidis, S., & Fragopoulou, P. (2015). Social Forensics: Searching for Needles in Digital Haystacks. Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), Kyoto, Japan, November 2015.
  26. Tsioliaridou, N. A., Liaskos, C. K., Ioannidis, S., & Pitsillides, A. (2015). CORONA: A Coordinate and Routing system for Nanonetworks. Proceedings of the 2nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), Boston, Massachusetts, USA, September 2015. (pdf).
  27. Ladakis, E, Vasiliadis, G., Polychronakis, M., Ioannidis, S., & Portokalidis, G. (2015). GPU-Disasm: A GPU-based x86 DisassemblerIn proceedings of the 18th Information Security Conference (ISC), Trondheim, Norway, September 2015.
  28. Moffie, M., Goldsteen, A., Chen, W., Weyer, T., Ioannidis, S., & Kalogiros, C. (2015). Trust and Trustworthiness Maintenance: From Architecture to Evaluation. Proceedings of the 8th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, September 2015.
  29. Samaras, C., Tsioliaridou, N. A., Liaskos, C. K., Spiliotopoulos, D., & Ioannidis, S. (2015). Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering . Proceedings of the 8th International Conference on Trust & Trustworthy Computing (TRUST 2015), Crete, Heraklion, Greece, August 2015. (pdf).
  30. Polakis, I., Diamantaris, M., Petsas, T., & Maggi, F, Ioannidis, S. (2015). Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.In proceedings of the 12th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2015), Milano, Italy, July, 2015.
  31. Zarras, A., Papadogiannakis, A., Ioannidis, S., & Holz, Th. (2015). Revealing the Relationship Network Behind Link Spam. In Proceedings of the 13th Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 2015. (pdf).
  32. Athanasakis , M., Athanasopoulos, E., Polychronakis, M., Portokalidis, G., & Ioannidis, S. (2015). The Devil is in the Constants: Bypassing Defenses in Browser JIT EnginesProceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015), San Diego, CA, US, February 2015.
  33. Göktaş, E., Athanasopoulos, E., Polychronakis, M., Bos, H., & Portokalidis, G. (2014). Size Does Matter - Why Using Gadget Chain Length to Prevent Code-reuse Attacks is HardProceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 2014.
  34. Lindorfer, M, Volanis, S., Sisto, A, Neugschwandtner, M, Athanasopoulos, E., Maggi, F, Platzer, C, Zanero, S., & Ioannidis, S. (2014). AndRadar: Fast Discovery of Android Applications in Alternative MarketsIn Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), London, UK, July 2014.
  35. Koromilas, L., Vasiliadis, G., Manousakis, I., & Ioannidis, S. (2014). Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware ArchitecturesProceedings of the 10th ACM/IEEE Symposium on Architecture for Networking and Communications Systems (ANCS), Los Angeles, CA, USA, October 2014.
  36. Deyannis , D., Koromilas, L., Vasiliadis, G., Athanasopoulos, E., & Ioannidis, S. (2014). Flying Memcache: Lessons Learned from Different Acceleration StrategiesProceedings of the 26th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), Paris, France, October, 2014.
  37. Vasiliadis, G., Koromilas, L., Polychronakis, M., & Ioannidis, S. (2014). GASPP: A GPU-Accelerated Stateful Packet Processing FrameworkIn Proceedings of the 2014 USENIX Annual Technical Conference (ATC)., Philadelphia, PA, USA, June 2014.
  38. Göktaş, E., Athanasopoulos, E., Bos, H., & Portokalidis, G. (2014). Out Of Control: Overcoming Control-Flow IntegrityIn Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, USA, May 2014.
  39. Vasiliadis, G., Athanasopoulos, E., Polychronakis, M., & Ioannidis, S. (2014). PixelVault: Using GPUs for securing cryptographic operationsProceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 2014.
  40. Petsas, T., Voyatzis, G, Athanasopoulos, E., Polychronakis, M., & Ioannidis, S. (2014). Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android MalwareIn Proceedings of the 7th European Workshop on System Security (EuroSec), Amsterdam, The Netherlands, April 2014.
  41. Stroggylos, K, Mitropoulos, D, Tzermias, Z., Papadopoulos, P., Rafailidis, F, Spinellis, D, Ioannidis, S., & Katsaros, P (2014). Securing Legacy Code with the TRACER PlatformIn Proceedings of the 18th Panhellenic Conference on Informatics (PCI 2014), Athens, Greece, October 2014.
  42. Antonakaki, D., Polakis, I., Athanasopoulos, E., Fragopoulou, P., & Ioannidis, S. (2014). Think before RT: An Experimental Study of Abusing Twitter Trends Proceedings of the 6thInternational Conference on Social Informatics (SocInfo), Barcelona, Spain, November 2014.
  43. Zarras, A., Papadogiannakis, A., Gaw­lik, R., & Holz, Th. (2014). Au­to­ma­ted Ge­ne­ra­ti­on of Mo­dels for Fast and Pre­cise De­tec­tion of HTTP-Ba­sed Mal­wa­reIn Proceedings of the 12th An­nual Con­fe­rence on Pri­va­cy, Se­cu­ri­ty and Trust (PST), To­ron­to, Ca­na­da, July 2014.
  44. Polakis, I., Ilia, P., Maggi, F, Lancini, M, Kontaxis, G., Zanero, S., Ioannidis, S., & Keromytis, A.D. (2014). Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication . Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Arizona, USA, November 2014. (pdf).
  45. Tzermias, Z., Prevelakis, V., & Ioannidis, S. (2014). Privacy Risks from Public Data Sources. In Proceedings of the 29th IFIP International Information Security and Privacy Conference (SEC), , Marrakech, Morocco, June 2014. (pdf).
  46. Stroggylos, K, Mitropoulos, D, Tzermias, Z., Papadopoulos, P., Rafailidis, F, Spinellis, D, Ioannidis, S., & Katsaros, P (2014). TRACER: A Platform for Securing Legacy CodeIn Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, June 2014.
  47. Papadogiannakis, A., Loutsis, L., Papaefstathiou, V., & Ioannidis, S. (2013). ASIST: Architectural Support for Instruction Set RandomizationIn Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany , November 2013. (pdf).
  48. Andriotis, P, Tzermias Zacharias, Z., Mparmpaki, A, Ioannidis, S., & Oikonomou, G. (2013). Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone DataIn International Journal of Digital Crime and Forensics (IJDCF), IGI Global, 2013 (vol. 5, pp. 34-54).
  49. Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, Th., & Markatos, E.P. (2013). k-subscription: Privacy-preserving Microblogging Browsing through ObfuscationIn Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
  50. Chinis, G., Pratikakis , P., Athanasopoulos, E., & Ioannidis, S. (2013). Practical Information Flow for Legacy Web ApplicationsIn Proceedings of the International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS), co-located with ECOOP, Montpellier, France, July 2013.
  51. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2013). Rise of the Planet of the Apps: A Systematic Study of the Mobile App EcosystemIn Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
  52. Kondaxis, G., Athanasopoulos, E., Portokalidis, G., & Keromytis, A.D. (2013). SAuth: Protecting User Accounts from Password Database LeaksIn Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany , November 2013.
  53. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2013). Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed NetworksIn Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
  54. Polakis, I., Volanis, S., Athanasopoulos, E., & Markatos, E.P. (2013). The man who was there: Fortifying the Economy of Location-Based ServicesIn Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
  55. Ladakis, E, Koromilas, L., Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2013). You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger In Proceedings of the 6th European Workshop on System Security (EuroSec), Prague, Czech Republic, April. (pdf).
  56. Gessiou, E., Volanis, S., Athanasopoulos, E., Markatos, E.P., & Ioannidis, S. (2012). Digging up social structures from documents on the webIn Proceedings of IEEE 2012 Communication and Information System Security Symposium (Globecom CISS), Anaheim, CA, USA, December 2012.
  57. Polakis, I., Lancini, M, Kondaxis, G., Maggi, F, Ioannidis, S., Keromytis, A. D., & Zanero, S. (2012). All your face are belong to us: Breaking Facebook¢s Social Authentication. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December . (pdf).
  58. Athanasopoulos, E., Kemerlis, V. P., Polychronakis, M., & Markatos, E.P. (2012). ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS'12), Singapore, June 2012. (pdf).
  59. Kontaxis, G., Polychronakis, M., Keromytis, A. D., & Markatos, E.P. (2012). Privacy-Preserving Social PluginsIn Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, August 2012.
  60. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2012). Tolerating Overload Attacks Against Packet Capturing SystemsIn Proceedings of the USENIX Annual Technical Conference (ATC)(available from usenix website ), Boston, MA, USA, June 2012. (pdf).
  61. Gessiou, E., Pappas, V., Athanasopoulos, E., Keromytis, A.D., & Ioannidis, S. (2012). Towards a Universal Data Provenance Framework using Dynamic Instrumentation. In Proceedings of the 27th IFIP International Information Security and Privacy Conference (IFIP SEC), Heraklion, Crete, Greece, June 2012. (pdf).
  62. Antoniades, D., Kontaxis, G., Athanasopoulos, E., Ioannidis, S., Markatos, E.P., & Karagiannis, Th. (2011).  we.b: The Web of Short URLsIn Proceedings of the 20th International World Wide Web Conference (WWW), Hyderabad, India, March 2011. (pdf).
  63. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2011). MIDeA: A Multi-Parallel Intrusion Detection ArchitectureIn Proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 2011. (pdf).
  64. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2011). Parallelization and Characterization of Pattern Matching using GPUs In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC), Austin, TX, USA, November 2011. (pdf).
  65. Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2011). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On PlatformsIn Proceedings of the 14th Information Security Conference (ISC), Xi'an, China, October 2011. (pdf).
  66. Markatos, E.P., Petsas, T., Polakis, I.S., & Antonatos, S. (2010). A systematic characterization of IM threats using honeypots. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 2010), Feb 2010. (pdf).
  67. Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). An architecture for enforcing JavaScript randomization in web2.0 applicationsShort paper in Proceedings of the 13th Information Security Conference (ISC 2010), Boca Raton, FL, USA, 25 October 2010 through 28 October 2010 (vol. 6531 LNCS, pp. 203-209). (03029743; 9783642181771 (ISBN)), (pdf).
  68. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2010). Comprehensive shellcode detection using runtime heuristicsProceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, (pp. 287-296). New York, NY, USA: ACM (978-1-4503-0133-6), (pdf).
  69. Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2010). D(e|i)aling with VoIP: Robust prevention of DIAL attacksIn Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece, September 20-22 (vol. 6345, pp. 663-678). (03029743; 3642154964 (ISBN); 9783642154966 (ISBN)), (pdf).
  70. Kontaxis, G., Polakis, I., & Markatos, E.P. (2010). Experiences and observations from the NoAH infrastructure6th European Conference on Computer Network Defense, EC2ND 2010, Berlin, October 28-29 (pp. 11-18). (9780769543116 (ISBN)), (pdf).
  71. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2010). GPU-assisted malware. 5th International Conference on Malicious and Unwanted Software, Malware 2010, Nancy, October 19-20 (pp. 1-6). (9781424493555 (ISBN)), (pdf).
  72. Vasiliadis, G., & Ioannidis, S. (2010). GrAVity: A massively parallel antivirus engine. In Proceedings of the 13th International Symposium On Recent Advances In Intrusion Detection (RAID), Ottawa, Canada, September 15-17 (vol. 6307 LNCS, pp. 79-96). (03029743; 3642155111 (ISBN); 9783642155116 (ISBN)), (pdf).
  73. Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). Hunting Cross-Site Scripting Attacks in the Network. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, California, May 2010. (pdf).
  74. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). Improving the accuracy of network intrusion detection systems under load using selective packet discarding. Proceedings of the Third European Workshop on System Security, Paris, France, (pp. 15-21). New York, NY, USA: ACM (978-1-4503-0059-9), (pdf).
  75. Krithinakis, A., Athanasopoulos, E., & Markatos, E.P. (2010). Isolating javaScript in dynamic code environments. 2010 Workshop on the Analysis and Programming Languages for Web Applications and Cloud Applications, APLWACA 2010, Toronto, ON, June 6 (pp. 45-49). (9781605589138 (ISBN)), (pdf).
  76. Antoniades, D., Markatos, E.P., & Dovrolis, C. (2010). MOR: monitoring and measurements through the onion router. Proceedings of the 11th international conference on Passive and active measurement, Zurich, Switzerland, (pp. 131-140). Berlin, Heidelberg: Springer-Verlag (3-642-12333-3, 978-3-642-12333-7), (pdf).
  77. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). RRDtrace: Long-term raw network traffic recording using fixed-size storage. 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010, Miami Beach, FL, August 17-19 (pp. 101-110). (9780769541976 (ISBN)), (pdf).
  78. Danilatou, V., & Ioannidis, S. (2010). Security and Privacy Architectures for Biomedical Cloud Computing. In Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine, Corfu, Greece, November. (pdf).
  79. Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., & Markatos, E.P. (2010). Using social networks to harvest email addresses9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS '10, Chicago, IL, October 4-8 (pp. 11-20). (15437221; 9781450300964 (ISBN)), (pdf).
  80. Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.P., & Karagiannis, Th. (2010). xJS: practical XSS prevention for web application development. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps), Boston, MA, USA, (pp. 13). Berkeley, CA, USA: USENIX Association (pdf).
  81. Gessiou, E., Labrinidis, A., & Ioannidis, S. (2009). A Greek (privacy) tragedy: the introduction of social security numbers in Greece. WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society, Chicago, Illinois, USA, (pp. 101-104). New York, NY, USA: ACM (978-1-60558-783-7), (pdf).
  82. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). An Empirical Study of Real-world Polymorphic Code Injection Attacks2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET '09), Boston, MA, USA, April. (pdf).
  83. Papadakis, H., Trufino, P., Talia, D., & Fragopoulou, P. (2009). An Experimental Evaluation of the DQ-DHT Algorithm in a Grid Information Service. In Proceedings of the CoreGRID ERCIM Working Group Workshop on Grids, P2P and Service Computing. Held in conjunction With EuroPAR 2009, Delft, The Netherlands, August. (pdf).
  84. Athanasopoulos, E., Pappas, V., & Markatos, E.P. (2009). Code-Injection Attacks in Browsers Supporting Policies. In Proceedings of the Third Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, CA, USA, May. (pdf).
  85. Foukarakis, M., Antoniades, D., & Polychronakis, M. (2009). Deep packet anonymization. EUROSEC '09: Proceedings of the Second European Workshop on System Security, Nuremburg, Germany, March (pp. 16-21). New York, NY, USA: ACM (978-1-60558-472-0), (pdf).
  86. Antonatos, S., & Vu, Q. (2009). Harnessing the power of P2P systems for fast attack signature validation. In Proceedings of the 3rd International Conference on Network and System Security (NSS 2009), Gold Coast, Australia, 19-21 October (pp. 107-114).
  87. Chin, W.Y., Markatos, E.P., Antonatos, S., & Ioannidis, S. (2009). HoneyLab: Large-scale honeypot deployment and resource sharing. 2009 3rd International Conference on Network and System Security, NSS 2009, Gold Coast, QLD, 19 October 2009 through 21 October 2009 (pp. 381-388). (9780769538389 (ISBN)), (pdf).
  88. Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2009). Imbuing unstructured P2P systems with non-intrusive topology awareness. In Proceedings of the 9th International Conference on Peer-to-Peer Computing., Seattle, USA, 91-1 September (pp. 51-60). (pdf).
  89. Antoniades, D., Markatos, E.P., & Dovrolis, C. (2009). One-click hosting services: a file-sharing hideout. IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, Chicago, Illinois, USA, (pp. 223-234). New York, NY, USA: ACM (978-1-60558-771-4), (pdf).
  90. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). Real-world Polymorphic Attack Detection. In Proceedings of the 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA), Athens, Greece, June. (pdf).
  91. Friedl, A., Ubik, S., Kapravelos, A., Polychronakis, M., & Markatos, E.P. (2009). Realistic passive packet loss measurement for high-speed networks. 1st International Workshop on Traffic Monitoring and Analysis, TMA 2009, Aachen, 11 May 2009 through 11 May 2009 (vol. 5537 LNCS, pp. 1-7). (03029743; 9783642016448 (ISBN)), (pdf).
  92. Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E.P., & Ioannidis, S. (2009). Regular Expression Matching on Graphics Hardware for Intrusion Detection. Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25 (pp. 265-283). (pdf).
  93. Athanasopoulos, E., Krithinakis, A., Kopidakis, G., Maxwell, G., Poustie, A., Manning, B., Webb, R., Koyabe, M., & Cairano-Gilfedder, C.D. (2009). WISDOM: Security-aware fibres. 2nd European Workshop on System Security, EUROSEC '09, Nuremberg, 31 March 2009 through 31 March 2009 (pp. 22-27). (9781605584720 (ISBN)), (pdf).
  94. Forestiero, A., Mastroianni, C., Papadakis, H., Fragopoulou, P., Tretola, G., & Zimeo, E. (2008). A Scalable Architecture for Discovery and Composition in P2P Service Networks. In Proceedings of the CoreGRID Integration Workshop, Heraklion, Crete, Greece, July (pp. 97-108). USA: Springer (pdf).
  95. Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., & Markatos, E.P. (2008). Antisocial networks: Turning a social network into a botnet. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 146-160). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
  96. Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2008). Compromising anonymity using packet spinning. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 161-174). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
  97. Smaragdakis, G., Lekakis, V., Laoutaris, N., Bestavros, A., Byers, J.W., & Roussopoulos, M. (2008). EGOIST: Overlay routing using selfish neighbor selection. 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08, Madrid, 9 December 2008 through 12 December 2008. (9781605582108 (ISBN)), (pdf).
  98. Bos, H., & Markatos, E.P. (2008). European Conference on Computer Systems: Preface. 1st European Workshop on System Security, EUROSEC '08, Glasgow, 31 March 2008 through 31 March 2008. Association for Computing Machinery (9781605581194 (ISBN)).
  99. Politopoulos, P.I., Markatos, E.P., & Ioannidis, S. (2008). Evaluation of compression of remote network monitoring data streams. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, Brazil, 7 April 2008 through 11 April 2008 (pp. 109-115). (9781424420674 (ISBN)), (pdf).
  100. Bos, H., Ioannidis, S., Jonsson, E., Kirda, E., & Kruegel, Ch. (2008). Future Threats to Future Trust. In Proceedings of the Future of Trust in Computing Conference, Berlin, Germany, July 2008 (pp. 49-54). (pdf).
  101. Polychronakis, M., Mavrommatis, P., & Provos, N. (2008). Ghost turns zombie: exploring the life cycle of web-based malware. LEET '08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California, April (pp. 1-8). Berkeley, CA, USA: USENIX Association (pdf).
  102. Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., & Ioannidis, S. (2008). Gnort: High performance network intrusion detection using graphics processors. Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings, Cambridge, MA, USA, 15 September 2008 through 17 September 2008 (vol. 5230 LNCS, pp. 116-134). (03029743; 354087402X (ISBN); 9783540874027 (ISBN)), (pdf).
  103. Antonatos, S., Athanatos, M., Kondaxis, G., Velegrakis, J., Hatzibodozis, N., Ioannidis, S., & Markatos, E.P. (2008). Honey@home: A new approach to large-scale threat monitoring. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008, Amsterdam, 21 April 2008 through 22 April 2008 (pp. 3-16). (9780769533476 (ISBN)), (pdf).
  104. Antoniades, D., Trimintzios, P., Polychronakis, M., Ubik, S., Papadogiannakis, A., & Smotlacha, V.R. (2008). LOBSTER: a European platform for passive network traffic monitoring. TridentCom '08: Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities, Innsbruck, Austria, (pp. 1-10). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; ICST, Brussels, Belgium, Belgium: ICST (978-963-9799-24-0), (pdf).
  105. Antoniades, D., Polychronakis, M., Nikiforakis, N., Markatos, E.P., & Mitsos, Y. (2008). Monitoring three National Research Networks for eight weeks: Observations and implications. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 153-156). (9781424420674 (ISBN)), (pdf).
  106. Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2008). On the Anonymization and Deanonymization of Netflow Traffic. In Proceedings of FloCon 2008, Savannah, Georgia, USA, January. (pdf).
  107. Williams, P., Rosenthal, D.S.H., Roussopoulos, M., & Georgis, S. (2008). Predicting archival life of removable hard disk drives. Archiving 2008, Bern, 24 June 2008 through 27 June 2008 (pp. 188-192). (9780892082773 (ISBN)), (pdf).
  108. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2008). Real-world polymorphic attack detection using network-level emulation. CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research, Oak Ridge, Tennessee, (pp. 1-3). New York, NY, USA: ACM (978-1-60558-098-2), (pdf).
  109. Smaragdakis, G., Laoutaris, N., Michiardi, P., Roussopoulos, M., Byers, J.W., & Bestavros, A. (2008). Swarming on optimized graphs for n-way broadcast. In Proceedings of IEEE INFOCOM, April 2008. (pdf).
  110. Theocharides, A., Antoniades, D., Polychronakis, M., Athanasopoulos, E., & Markatos, E.P. (2008). Topnet: A Network-aware top(1)LISA; Proceedings of the 22nd Large Installation System Administration Conference, {LISA} 2008, November 9-14, 2008, San Diego, {CA {USA}, San Diego, California, September (pp. 145-157). USENIX Association (978-1-931971-63-8), (pdf).
  111. Nikiforakis, N., Antoniades, D., Markatos, E.P., Ioannidis, S., & Øslebø, A. (2008). When AppMon met Stager. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 157-160). (9781424420674 (ISBN)), (pdf).
  112. Krithinakis, A., Stroetmann, L., Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2008). WSIM: A Software Platform to Simulate All-Optical Security Operations. Computer Network Defense, 2008. EC2ND 2008. European Conference on, Dublin, Ireland, Decembe (pp. 41-47). (pdf).
  113. Nikiforakis, N., Makridakis, A., Athanasopoulos, E., & Markatos, E.P. (2007). Alice, what did you do last time? Fighting Phishing Using Past Activity Tests. Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND '07); LNEE (Lecture Notes on Electrical Engineering), Heraklion, Greece, 4-5 October. Springer (978-0-387-85554-7), (pdf).
  114. Papadakis, H., Trunfio, P., Talia, D., & Fragopoulou, P. (2007). Design and implementation of a hybrid P2P-based grid resource discovery system. In Proceedings of the CoreGRID Workshop on Grid Programming Model, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments, Heraklion, Crete, Greece, Springer (pdf).
  115. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Emulation-based detection of non-self-contained polymorphic shellcode. 10th Symposium on Recent Advances in Intrusion Detection, RAID 2007, Gold Coast, Australia, 5 September 2007 through 7 September 2007 (vol. 4637 LNCS, pp. 87-106). (03029743; 9783540743194 (ISBN)), (pdf).
  116. Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2007). Flexible and high-performance anonymization of Netflow records using anontool. 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, Nice, 17 September 2007 through 21 September 2007 (pp. 33-38). (1424409756 (ISBN); 9781424409754 (ISBN)), (pdf).
  117. Athanasopoulos, E., Roussopoulos, M., Anagnostakis, K.G., & Markatos, E.P. (2007). GAS: Overloading a file sharing network as an anonymizing system. 2nd International Workshop on Security, IWSEC 2007, Nara, 29 October 2007 through 31 October 2007 (vol. 4752 LNCS, pp. 365-379). (03029743; 9783540756507 (ISBN)), (pdf).
  118. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@home: a new approach to large-scale threat monitoring. WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode, Alexandria, Virginia, USA, (pp. 38-45). New York, NY, USA: ACM (978-1-59593-886-2), (pdf).
  119. Papadogiannakis, A., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2007). Improving the performance of passive network monitoring applications using locality buffering. 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS '07, Istanbul, 24 October 2007 through 26 October 2007 (pp. 151-157). (9781424418541 (ISBN)), (pdf).
  120. Andreozzi, S., Ciuffoletti, A., Ghiselli, A., Antoniades, D., Polychronakis, M., Markatos, E.P., & Trimintzios, P. (2007). On the Integration of Passive and Active Network Monitoring in Grid Systems. Integrated Research in GRID Computing. Workshop 2005 (Selected Papers), Pisa, Italy, November 28–30 (pp. 147-161). USA: Springer (978-0-387-47656-8 (Print) 978-0-387-47658-2 (Online)), (pdf).
  121. Koukis, D., Antonatos, S., Antoniades, D., Markatos, E.P., & Trimintzios, P. (2006). A generic anonymization framework for network traffic. 2006 IEEE International Conference on Communications, ICC 2006, Istanbul, 11 July 2006 through 15 July 2006 (vol. 5, pp. 2302-2309). (05361486; 1424403553 (ISBN); 9781424403554 (ISBN)), (pdf).
  122. Antoniades, D., Polychronakis, M., Antonatos, S., Markatos, E.P., Ubik, S., & Øslebø, A. (2006). Appmon: An Application for Accurate per Application Network Traffic Characterisation. In IST Broadband Europe 2006 Conference, Geneva, Switzerland, December. (pdf).
  123. Ciuffoletti, A., & Polychronakis, M. (2006). Architecture of a Network Monitoring Element. Workshops: CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics, Revised Selected Papers, Dresden, Germany, August 29-September 1 (pp. 5-14). (pdf).
  124. Ciuffoletti, A., & Polychronakis, M. (2006). Architecture of a network monitoring element. 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2006, Manchester, 26 June 2006 through 28 June 2006 (pp. 220-221). (15244547; 0769526233 (ISBN); 9780769526232 (ISBN)), (pdf).
  125. Antoniades, D., Athanatos, M., Papadogiannakis, A., Markatos, E.P., & Dovrolis, C. (2006). Available bandwidth measurement as simple as running wget. In Proceedings of the Passive and Active Measurement Conference (PAM2006), Adelaide, Australia, March. (pdf).
  126. Popov, K., Papadakis, H., Fragopoulou, P., & Vlassov, V. (2006). Building Scalable Self-Organizing Grid Services Using P2P Technologies. In Proceedings of the 3rd CoreGrid Integration Workshop, Krakow, Poland, 19-20 October.
  127. Trimintzios, P., Polychronakis, M., Papadogiannakis, A., Foukarakis, M., Markatos, E.P., & Øslebø, A. (2006). DiMAPI: An application programming interface for distributed network monitoring. 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, BC, 3 April 2006 through 7 April 2006 (pp. 382-393). (1424401429 (ISBN); 9781424401420 (ISBN)), (pdf).
  128. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2006). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. In Proceedings of the 3nd CoreGRID Integration Workshop, Krakow Poland.
  129. Athanasopoulos, E., & Antonatos, S. (2006). Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS '06), Heraklion, Crete, Greece, October 19-21 (pp. 97-108). (pdf).
  130. Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2006). Grid Reliability: A Study of Failures on the EGEE Infrastructure. Proceedings of the 3rd CoreGRID Integration Workshop, Krakow, Poland, 19-20 October (pp. 165-176). (pdf).
  131. Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets. 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, Singapore, 6 June 2006 through 9 June 2006 (vol. 3989 LNCS, pp. 130-145). (03029743; 3540347038 (ISBN); 9783540347033 (ISBN)), (pdf).
  132. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation. Berlin, Germany, July 13-14 (pp. 54-73). (pdf).
  133. Koukis, D., Antonatos, S., & Anagnostakis, K.G. (2006). On the Privacy Risks of Publishing Anonymized IP Network Traces. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS '06), Heraklion, Crete, Greece, October 19-21 (pp. 22-32). (pdf).
  134. Papadogiannakis, A., Kapravelos, A., Polychronakis, M., Markatos, E.P., & Ciuffoletti, A. (2006). Passive end-to-end packet loss estimation for GRID traffic monitoring. CoreGRID Integration Workshop 2006, Krakow, Poland, October 19-20. Krakow: CYFRONET AG (83-915141-6-1), (pdf).
  135. Lam, V.T., Antonatos, S., Akritidis, P., & Anagnostakis, K.G. (2006). Puppetnets: misusing web browsers as a distributed attack infrastructure. CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, Virginia, USA, (pp. 221-234). New York, NY, USA: ACM (1-59593-518-5), (pdf).
  136. Antonatos, S., & Anagnostakis, K.G. (2006). TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. In Proceedings of the 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21 (pp. 12-21). (pdf).
  137. Papadakis, H., Fragopoulou, P., Athanasopoulos, E., Dikaiakos, M., & Markatos, E.P. (2005). A Feedback-based Approach to Reduce Duplicate Messages. In Proceedings of the 2nd CoreGrid Integration Workshop, Lisbon, Portugal, November. (pdf).
  138. Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2005). Defending against hitlist worms using network address space randomization. WORM '05 - 2005 ACM Workshop on Rapid Malcode, Farfax, VA, 11 November 2005 through 11 November 2005 (pp. 30-40). (1595932291 (ISBN)), (pdf).
  139. Xinidis, K., Anagnostakis, K.G., & Markatos, E.P. (2005). Design and Implementation of a High-Performance Network Intrusion Prevention System. IFIP TC11 20th International Information Security Conference, Chiba, Japan, May 30 – June 1 (pp. 359-374). (pdf).
  140. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow HoneypotsProceedings of the 14th {USENIX} Security Symposium, August. USENIX (pdf).
  141. Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Efficient content-based detection of zero-day worms. Communications, 2005. ICC 2005. 2005 IEEE International Conference on Communications (ICC 2005), Seoul, Korea, 16-20 May (vol. 2, pp. 837-843). (pdf).
  142. Andreozzi, S., Antoniades, D., Ciuffoletti, A., Ghiselli, A., Markatos, E.P., Polychronakis, M., & Trimintzios, P. (2005). Issues about the Integration of Passive and Active Monitoring for Grid NetworksCoreGRID Integration Workshop 2005, Nov. Pisa (pdf).
  143. Trunfio, P., Talia, D., Fragopoulou, P., Papadakis, H., Mordacchini, M., Pennanen, M., Popov, K., Vlassov, V., & Haridi, S. (2005). Peer-to-Peer Models for Resource Discovery on Grids. In Proceedings of the 2nd CoreGrid Integration Workshop, Lisbon, Portugal, January.
  144. Antonatos, S., Polychronakis, M., Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC, Chiba, Japan, May 30 - June 1 (pp. 393-408). (pdf).
  145. Akritidis, P., Markatos, E.P., Polychronakis, M., & Anagnostakis, K.G. (2005). STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis. Chiba, Japan, May 30 – June 1 (pp. 375-391). (pdf).
  146. Polychronakis, M., Markatos, E.P., Anagnostakis, K.G., & Øslebø, A. (2004). Design of an application programming interface for IP network monitoring. 2004 IEEE/IFIP Network Operations and Management Symposium: Managing Next Generation Convergence Networks and Services, NOMS 2004, Seoul, 1 April 2004 through 1 April 2004 (pp. 483-496). (pdf).
  147. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2004). Generating Realistic Workloads for Network Intrusion Detection Systems. Proceedings of the Fourth International Workshop on Software and Performance (WOSP2004), January 2004. (pdf).
  148. Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2004). Performance Analysis of Content Matching Intrusion Detection Systems. Proceedings of the International Symposium on Applications and the Internet (SAINT2004), January 2004. (pdf).
  149. Markatos, E.P., Ji R Novotn, Y., Polychronakis, M., Smotlacha, V.R., & Ubik, S. (2004). SCAMPI - A Scaleable Monitoring Platform for the InternetIn Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004), Budapest, Hungary, 22-23 March. (pdf).
  150. Luque, E., Castaños, J.G., Markatos, E.P., & Perego, R. (2004). Topic 3: Scheduling and Load Balancing. Pisa, Italy, August 31- September 3 (pp. 220-221).
  151. Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Trafc Splitter Architecture for Intrusion Detection. Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Orlando Florida, October 2003 (pp. 238-240). (pdf).
  152. Charitakis, I., Pnevmatikatos, D., Markatos, E.P., & Anagnostakis, K.G. (2003). Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, Vienna, Austria, September 2003 (pp. 226-239). (pdf).
  153. Lalis, S. (2003). Discovery in a Dynamically Composable Personal System. Proceedings of the Tenth International Conference on Human-Computer Interaction; Universal access in HCI : inclusive design in the information society, Crete, Greece, June 22-27 (vol. 4, pp. 429-433).
  154. Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2003). E2xB: A domain–specific string matching algorithm for intrusion detection. Proceedings of the 18th IFIP International Information Security Conference (SEC2003), May 2003. (pdf).
  155. Karypidis, A., & Lalis, S. (2003). Harnessing the potential of mobile personal data repositories. In Proceedings Hawaii International Conference on System Sciences (HICSS-36), Hawaii, January 6-9 (pp. 10 pp.).
  156. Coppens, J., Van den Berghe, S., Bos, H., Markatos, E.P., De Turck, F., Oslebo, A., & Ubik, S. (2003). SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Proceedings of the Workshop on End-to-End Monitoring Techniques and Services (E2EMON), September 2003. (pdf).
  157. Karypidis, A., & Lalis, S. (2003). The tangible file system. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCSW '03), Rhode Island, USA, May 19-22 (pp. 268-273).
  158. Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002). Exclusion-based Signature Matching for Intrusion Detection. Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN), Cambridge, USA, November 2002 (pp. 146-152). (pdf).
  159. Markatos, E.P. (2002). Speeding-up TCP/IP: Faster Processors are not Enough. In Proceedings of the 21st IEEE International Performance, Computing, and Communications Conference (IPCCC 2002), April 2002 (pp. 341-345). (pdf).
  160. Markatos, E.P. (2002). Tracing a large-scale Peer to Peer System:an hour in the life of Gnutella. In Proceedings of the CCGrid 2002: the second IEEE International Symposium on Cluster Computing and the Grid, May 2002 (pp. 65-74). (pdf).
  161. Kakarontzas, G., & Lalis, S. (2001). A market-based protocol with leasing support for globally distributed computing. 15-18 May (pp. 562-567).
  162. Houstis, C.E., & Lalis, S. (2001). ARION: A scalable architecture for a digital library of scientific collections. Nicosia, Cyprus, 8-10 November.
  163. Gialama, E.M., Markatos, E.P., Sevaslidou, J.E., Serpanos, D.N., Asimakopoulou, X.A., & Kotsovinos, E.N. (2001). DIVISOR: DIstributed VIdeo Server fOr stReaming. In the Proceedings of the 5th WSES/IEEE WORLD MULTICONFERENCE ON Circuits, Systems, Communications and Computers (CSCC 2001), July 2001 (pp. 4531-4536). (pdf).
  164. Lalis, S., & Karypidis, A. (2000). An open market-based architecture for distributed computing. Cancun, Mexico, May.
  165. Markatos, E.P. (2000). On Caching Search Engine Query Results. In the Proceedings of the 5th International Web Caching and Content Delivery Workshop, May 2000. (pdf).
  166. Kapidakis, S. (1999). Issues in the Development and Operation of a Digital Library. ECDL '99: Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries, (pp. 363-382). London, UK: Springer-Verlag (3-540-66558-7).
  167. Markatos, E.P., Katevenis, M.G.H., Pnevmatikatos, D., & Flouris, M.D. (1999). Secondary Storage Management for Web Proxies. In Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS99), Co-Sponsored by IEEE Computer Society, Technical Committee on the Internet., (pp. 93-104). (pdf).
  168. Anastasiadi, A., Kapidakis, S., Nikolaou, Ch., & Sairamesh, J. (1998). A computational economy for dynamic load balancing and data replication. ICE '98: Proceedings of the first international conference on Information and computation economies, Charleston, South Carolina, United States, (pp. 166-180). New York, NY, USA: ACM (1-58113-076-7).
  169. Kapidakis, S., Terzis, S., & Sairamesh, J. (1998). A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries. ECDL '98: Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries, (pp. 95-114). London, UK: Springer-Verlag (3-540-65101-2).
  170. Markatos, E.P., & Chronaki, C. (1998). A Top-10 Approach to Prefetching the Web. In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
  171. Papathanasiou, A E., & Markatos, E.P. (1998). Lightweight Transactions on Networks of Workstations. In International Conference on Distributed Computing Systems (ICDCS 1998), Amsterdam, May 1998. (pdf).
  172. Ioannidis, S., Markatos, E.P., & Sevaslidou, J.E. (1998). On Using Network Memory to Improve the Performance of TransactionBased Systems.  In Proceedings of 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, USA, July 1998. (pdf).
  173. Papadakis, N., Markatos, E.P., & Papathanasiou, A E. (1998). Palantir: A Visualization Tool for the World Wide Web.  In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
  174. Toraki, K., & Kapidakis, S. (1998). The Technical Chamber of Greece Digital Library: The Vision of a Special Organisation to Save and Disseminate Its Information Work Through the Network. ECDL '98: Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries, (pp. 691-692). London, UK: Springer-Verlag (3-540-65101-2).
  175. Nikolaou, Ch., Marazakis, M., Papadakis, D., & Yeorgiannakis, Y. (1997). Towards a Common Infrastructure for Large-Scale Distributed Applications. Research and Advanced Technology for Digital Libraries, Pisa, Italy, September 1–3 (vol. 1324, pp. 173-??). (0302-9743).
  176. Markatos, E.P., & Dramitinos, G. (1996). Implementation of a Reliable Remote Memory Pager. In the proceedings of the USENIX  Technical Conference, San Diego, Ca, January 22-26. (pdf).
  177. Kapidakis, S., & Mavronicolas, M. (1995). Load balancing networks. PODC '95: Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing, Ottowa, Ontario, Canada, (pp. 275). New York, NY, USA: ACM (0-89791-710-3).
  178. Marazakis, M., & Nikolaou, Ch. (1995). Towards adaptive scheduling of tasks in transactional workflows. Proceedings of the 1995 Winter Simulation Conference, WSC '95, Arlington, VA, USA, 3 December 1995 through 6 December 1995 (pp. 604-611). Piscataway, NJ, United States: IEEE (02750708).
  179. Markatos, E.P., & Chronaki, C. (1994). Using reference counters in Update Based Coherent Memory. In PARLE '94 Parallel ARchitectures and Languages Europe, Athens, Greece (pdf).
  180. Markatos, E.P. (1993).  How Architecture Evolution influences the Scheduling Discipline in Shared-Memory Multiprocessors. In PARCO 93, Grenoble, France (pdf).
                Found: 180 publications
                © Copyright 2007 FOUNDATION FOR RESEARCH & TECHNOLOGY - HELLAS, All rights reserved.