Angelos D. Keromytis, Ph.D.
Affiliations: | Computer Science | Columbia University, New York, NY | |
2001 | University of Pennsylvania, Philadelphia, PA, United States |
Area:
Security, Cryptography, Networks, Operating Systems, Distributed Systems.Google:
"Angelos Keromytis"Parents
Sign in to add mentorJonathan M. Smith | grad student | 2001 | Penn | |
(STRONGMAN: A scalable solution to trust management in networks.) |
Children
Sign in to add traineeDebra L. Cook | grad student | 2006 | Columbia |
Michael E. Locasto | grad student | 2008 | Columbia |
Stylianos Sidiroglou | grad student | 2008 | Columbia |
Mansoor Alicherry | grad student | 2011 | Columbia |
Sambuddho Chakravarty | grad student | 2014 | Columbia |
Vasileios Pappas | grad student | 2015 | Columbia |
Angeliki Zavou | grad student | 2015 | Columbia |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Mitropoulos D, Louridas P, Polychronakis M, et al. (2019) Defending Against Web Application Attacks: Approaches, Challenges and Implications Ieee Transactions On Dependable and Secure Computing. 16: 188-203 |
Petsios T, Kemerlis VP, Polychronakis M, et al. (2015) DynaGuard: Armoring canary-based protections against brute-force attacks Acm International Conference Proceeding Series. 7: 351-360 |
Oren Y, Kemerlis VP, Sethumadhavan S, et al. (2015) The spy in the sandbox: Practical cache attacks in JavaScript and their implications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1406-1418 |
Oren Y, Keromytis AD. (2015) Attacking the internet using broadcast digital television Acm Transactions On Information and System Security. 17 |
Tsiatsikas Z, Geneiatakis D, Kambourakis G, et al. (2015) An efficient and easily deployable method for dealing with DoS in SIP services Computer Communications. 57: 50-63 |
Chakravarty S, Portokalidis G, Polychronakis M, et al. (2015) Detection and analysis of eavesdropping in anonymous communication networks International Journal of Information Security. 14: 205-220 |
Polakis I, Ilia P, Maggi F, et al. (2014) Faces in the distorting mirror: Revisiting photo-based social authentication Proceedings of the Acm Conference On Computer and Communications Security. 501-512 |
Pappas V, Krell F, Vo B, et al. (2014) Blind seer: A scalable private DBMS Proceedings - Ieee Symposium On Security and Privacy. 359-374 |
Pappas V, Polychronakis M, Keromytis AD. (2014) Dynamic reconstruction of relocation information for stripped binaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 68-87 |
Chakravarty S, Barbera MV, Portokalidis G, et al. (2014) On the effectiveness of traffic analysis against anonymity networks using flow records Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8362: 247-257 |