ICS Publications - DCS

Technical & Research Reports (29)

          M.S. Theses

        1. Sfakianakis, A. (2012). CensMon : a web censorship monitor
        2. Koromilas, L. (2012). Implementing an architecture for efficient network traffic processing on modern graphics hardware. 
        3. Chinis, G. (2012). Practical Information Flow for Legacy Web Applications
        4. Petsas, A.  (2012). Rise of the Planet of the Apps:A Systematic Study of the Mobile App Ecosystem. 
        5. Kontaxis, G. (2011). A Lightweight Censorship-resistant Web Access Architecture
        6. Tzermias Zacharias, Z. (2011). Combining Static and Dynamic Analysis for the Detection of Malicious Documents
        7. Zarras, A. (2011). Detecting and Defending Against Fraud in the Underground Economy
        8. Gkesiou, E. (2011). Trawling the Deep Web
        9. Krithinakis, A. (2010). RaJa: Cross-site Scripting Detection and Prevention Using Souirce Randomization. October 2010.
        10. Kapravelos, A. (2010). Robust prevention of DIAL attacks. July 2010.
        11. Makridakis, A. (2009). Antisocial Networks: Turning a Social Network into an Attack Platform . November 2009.
        12. Polakis, I.S. (2009). Exploring honeypot Technologies for malware Collection and Cyber-attack Information Acquisition. November 2009.
        13. Lekakis, V. (2009). Overlay Networks based on Selfish Neighbor Selection. 2009.
        14. Nikiforakis, N. (2009). Parasitic Storage Systems: Free, Reliable and Globally Accesible Gigabytes. 2009.
        15. Pappas, V. (2009). xJS: Fighting Cross-Site Scripting Attacks Using Isolation Operators. 2009.
        16. Vasileiadis, G. (2008). Improving the Performance of Network Intrusion Detection Systems Using Graphics Processors. December 2008.
        17. Antoniadis, D. (2007). Appmon: An Application for Accurate Per-Application Network Traffic Characterization. December 2007.
        18. Papadogiannakis, A. (2007). Improving the Performance of Passive Network Monitoring Applications. December 2007.
        19. Athanatos, E. (2007). Prototype Deployment of the Network of Affined Honeypots Architecture. December 2007.
        20. Athanasopoulos, I. (2007). Using Unstructured Peer-to-Peer Systems as Denial of Service Attack Platforms. May 2007.
        21. Papoutsidis, E. (2006). A Biomedical GRID Infrastructure to Enable High-performing Data Mining and Knowledge Extraction Operations. April 2006.
        22. Koukis, D.V. (2006). A Framework for Network Traffic Anonymization. April 2006.
        23. Akritidis, P. (2005). Detection of Zero-Day Worms. December 2005.
        24. Antonatos, S. (2005). Network Address Space Randomization: A Proactive Defense Against Hitlist Worms. December 2005.
        25. Moschous, E. (2005). Transcoding Techniques for Mobile Web Access using the CC/PP Protocol. December 2005.
        26. Koutsourakis, P. (2004). Segmentation using graph cuts applied to change detection. November 2004.
        27. Lelis, S. (2003). An Agent-based Model of Sites Popularity. 2003.
        28. Zikos, G. (1998). A Wavelet Based Framework for Human Face Detection and Recognition. November 1998.
        29. Kloukinas, Ch. (1997). Ομαδοποίηση "εν πτήσει" Δοσοληψιών σε Ομάδες με Παρόμοια Χαρακτηριστικά Φόρτου Εργασίας . April 1997.
              Found: 29 publications
              Conditions of Use | Privacy Policy