☰

Sotiris Ioannidis, Ph.D. - Publications

Affiliations: 
2005 University of Pennsylvania, Philadelphia, PA, United States 
Area:
Networks: Networked Systems; Security and Privacy

51 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2023 Shevtsov A, Oikonomidou M, Antonakaki D, Pratikakis P, Ioannidis S. What Tweets and YouTube comments have in common? Sentiment and graph analysis on data related to US elections 2020. Plos One. 18: e0270542. PMID 36719868 DOI: 10.1371/journal.pone.0270542  0.749
2021 Papadogiannaki E, Ioannidis S. Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware. Sensors (Basel, Switzerland). 21. PMID 33562000 DOI: 10.3390/s21041140  0.315
2019 Liaskos C, Tsioliaridou A, Nie S, Pitsillides A, Ioannidis S, Akyildiz IF. On the Network-Layer Modeling and Configuration of Programmable Wireless Environments Ieee/Acm Transactions On Networking. 27: 1696-1713. DOI: 10.1109/Tnet.2019.2925658  0.378
2019 Tasolamprou AC, Pitilakis A, Abadal S, Tsilipakos O, Timoneda X, Taghvaee H, Sajjad Mirmoosa M, Liu F, Liaskos C, Tsioliaridou A, Ioannidis S, Kantartzis NV, Manessis D, Georgiou J, Cabellos-Aparicio A, et al. Exploration of Intercell Wireless Millimeter-Wave Communication in the Landscape of Intelligent Metasurfaces Ieee Access. 7: 122931-122948. DOI: 10.1109/Access.2019.2933355  0.3
2018 Liaskos C, Ioannidis S. Network Topology Effects on the Detectability of Crossfire Attacks Ieee Transactions On Information Forensics and Security. 13: 1682-1695. DOI: 10.1109/Tifs.2018.2799425  0.412
2018 Liaskos C, Nie S, Tsioliaridou A, Pitsillides A, Ioannidis S, Akyildiz I. A New Wireless Communication Paradigm through Software-Controlled Metasurfaces Ieee Communications Magazine. 56: 162-169. DOI: 10.1109/Mcom.2018.1700659  0.313
2018 Antonakaki D, Ioannidis S, Fragopoulou P. Utilizing the average node degree to assess the temporal growth rate of Twitter Social Network Analysis and Mining. 8: 12. DOI: 10.1007/S13278-018-0490-5  0.734
2017 Antonakaki D, Spiliotopoulos D, V Samaras C, Pratikakis P, Ioannidis S, Fragopoulou P. Social media analysis during political turbulence. Plos One. 12: e0186836. PMID 29088263 DOI: 10.1371/Journal.Pone.0186836  0.738
2017 Vasiliadis G, Koromilas L, Polychronakis M, Ioannidis S. Design and Implementation of a Stateful Network Packet Processing Framework for GPUs Ieee Acm Transactions On Networking. 25: 610-623. DOI: 10.1109/Tnet.2016.2597163  0.397
2017 Abadal S, Liaskos C, Tsioliaridou A, Ioannidis S, Pitsillides A, Sole-Pareta J, Alarcon E, Cabellos-Aparicio A. Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis Ieee Access. 5: 6225-6235. DOI: 10.1109/Access.2017.2693267  0.388
2017 Tsioliaridou A, Liaskos C, Dedu E, Ioannidis S. Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path Scheme Nano Communication Networks. 12: 63-71. DOI: 10.1016/J.Nancom.2017.01.001  0.305
2016 Antonakaki D, Polakis I, Athanasopoulos E, Ioannidis S, Fragopoulou P. Exploiting abused trending topics to identify spam campaigns in Twitter Social Network Analysis and Mining. 6: 48. DOI: 10.1007/S13278-016-0354-9  0.77
2015 Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S. Face/off: Preventing privacy leakage from photos in social networks Proceedings of the Acm Conference On Computer and Communications Security. 2015: 781-792. DOI: 10.1145/2810103.2813603  0.365
2015 Petsas T, Tsirantonakis G, Athanasopoulos E, Ioannidis S. Two-factor authentication: Is the world ready? quantifying 2FA adoption Proceedings of the 8th European Workshop On System Security, Eurosec 2015. DOI: 10.1145/2751323.2751327  0.315
2015 Liaskos C, Tsioliaridou A, Pitsillides A, Akyildiz IF, Kantartzis NV, Lalas AX, Dimitropoulos X, Ioannidis S, Kafesaki M, Soukoulis CM. Design and Development of Software Defined Metamaterials for Nanonetworks Ieee Circuits and Systems Magazine. 15: 12-25. DOI: 10.1109/Mcas.2015.2484098  0.364
2015 Tsioliaridou A, Liaskos C, Ioannidis S, Pitsillides A. Lightweight, self-tuning data dissemination for dense nanonetworks Nano Communication Networks. DOI: 10.1016/J.Nancom.2015.09.003  0.379
2015 Vasiliadis G, Polychronakis M, Ioannidis S. GPU-assisted malware International Journal of Information Security. 14: 289-297. DOI: 10.1007/S10207-014-0262-9  0.321
2015 Athanasopoulos E, Boehner M, Ioannidis S, Giuffrida C, Pidan D, Prevelakis V, Sourdis I, Strydis C, Thomson J. Secure hardware-software architectures for robust computing systems Communications in Computer and Information Science. 570: 209-212. DOI: 10.1007/978-3-319-27164-4_17  0.351
2015 Antonakaki D, Polakis I, Athanasopoulos E, Ioannidis S, Fragopoulou P. Think Before RT: An Experimental Study of Abusing Twitter Trends Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8852: 402-413. DOI: 10.1007/978-3-319-15168-7_49  0.77
2014 Polakis I, Ilia P, Maggi F, Lancini M, Kontaxis G, Zanero S, Ioannidis S, Keromytis AD. Faces in the distorting mirror: Revisiting photo-based social authentication Proceedings of the Acm Conference On Computer and Communications Security. 501-512. DOI: 10.1145/2660267.2660317  0.554
2014 Koromilas L, Vasiliadis G, Manousakis I, Ioannidis S. Efficient software packet processing on heterogeneous and asymmetric hardware architectures Ancs 2014 - 10th 2014 Acm/Ieee Symposium On Architectures For Networking and Communications Systems. 207-218. DOI: 10.1109/Tnet.2016.2642338  0.368
2013 Andriotis P, Tzermias Z, Mparmpaki A, Ioannidis S, Oikonomou G. Multilevel visualization using enhanced social network analysis with smartphone data International Journal of Digital Crime and Forensics. 5: 34-54. DOI: 10.4018/Ijdcf.2013100103  0.454
2012 Polakis I, Lancini M, Kontaxis G, Maggi F, Ioannidis S, Keromytis AD, Zanero S. All your face are belong to us: Breaking Facebook's social authentication Acm International Conference Proceeding Series. 399-408. DOI: 10.1145/2420950.2421008  0.59
2012 Gessiou E, Volanis S, Athanasopoulos E, Markatos EP, Ioannidis S. Digging up social structures from documents on the web Globecom - Ieee Global Telecommunications Conference. 744-750. DOI: 10.1109/GLOCOM.2012.6503202  0.306
2012 Ioannidis S, Massoulié L, Chaintreau A. Distributed caching over heterogeneous mobile networks Queueing Systems. 72: 279-309. DOI: 10.1007/S11134-012-9297-7  0.36
2012 Gessiou E, Pappas V, Athanasopoulos E, Keromytis AD, Ioannidis S. Towards a universal data provenance framework using dynamic instrumentation Ifip Advances in Information and Communication Technology. 376: 103-114. DOI: 10.1007/978-3-642-30436-1_9  0.551
2011 Kontaxis G, Polakis I, Ioannidis S, Markatos EP. Detecting social network profile cloning 2011 Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2011. 295-300. DOI: 10.1109/PERCOMW.2011.5766886  0.382
2011 Zyba G, Voelker GM, Ioannidis S, Diot C. Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd Proceedings - Ieee Infocom. 1179-1187. DOI: 10.1109/INFCOM.2011.5934896  0.332
2010 Makridakis A, Athanasopoulos E, Antonatos S, Antoniades D, Ioannidis S, Markatos E. Understanding the behavior of malicious applications in social networks Ieee Network. 24: 14-19. DOI: 10.1109/Mnet.2010.5578913  0.456
2008 Miltchev S, Smith JM, Prevelakis V, Keromytis A, Ioannidis S. Decentralized access control in distributed file systems Acm Computing Surveys. 40. DOI: 10.1145/1380584.1380588  0.674
2008 Athanasopoulos E, Makridakis A, Antonatos S, Antoniades D, Ioannidis S, Anagnostakis KG, Markatos EP. Antisocial networks: Turning a social network into a botnet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5222: 146-160. DOI: 10.1007/978-3-540-85886-7_10  0.363
2007 Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Anagnostakis K, Smith JM. Virtual private services: Coordinated policy enforcement for distributed applications International Journal of Network Security. 4: 69-80. DOI: 10.6633/Ijns.200701.4(1).08  0.657
2007 Anagnostakis KG, Greenwald MB, Ioannidis S, Keromytis AD. COVERAGE: Detecting and reacting to worm epidemics using cooperation and validation International Journal of Information Security. 6: 361-378. DOI: 10.1007/S10207-007-0032-Z  0.592
2006 Anagnostakis KG, Greenwald MB, Ioannidis S, Li D, Smith JM. Flexible network monitoring with FLAME Computer Networks. 50: 2548-2563. DOI: 10.1016/J.Comnet.2006.04.018  0.572
2006 Anagnostakis K, Ioannidis S, Keromytis AD, Greenwald MB. Robust reactions to potential day-zero worms through cooperation and validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 427-442.  0.552
2003 Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Smith JM. Design and implementation of virtual private services Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 269-274. DOI: 10.1109/ENABL.2003.1231419  0.648
2003 Levine A, Prevelakis V, Ioannidis J, Ioannidis S, Keromytis AD. WebDAVA: An administrator-free approach to Web file-sharing Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 59-64. DOI: 10.1109/ENABL.2003.1231383  0.601
2003 Keromytis AD, Ioannidis S, Greenwald MB, Smith JM. The STRONGMAN architecture Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 178-188. DOI: 10.1109/DISCEX.2003.1194883  0.585
2003 Blaze M, Ioannidis J, Ioannidis S, Keromytis AD, Nikander P, Prevelakis V. TAPI: Transactions for accessing public infrastructure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2775: 90-100. DOI: 10.1007/978-3-540-39867-7_8  0.597
2003 Anagnostakis KG, Greenwald MB, Ioannidis S, Keromytis AD, Li D. A cooperative immunization system for an untrusting internet Ieee International Conference On Networks, Icon. 403-408.  0.531
2002 Ioannidis S, Bellovin SM, Smith JM. Sub-operating systems: A new approach to application security Proceedings of the 10th Workshop On Acm Sigops European Workshop, Ew 10. 108-115. DOI: 10.1145/1133373.1133394  0.435
2002 Ioannidis S, Anagnostakis KG, Ioannidis J, Keromytis AD. XPF: Packet filtering for low-cost network monitoring Ieee International Conference On High Performance Switching and Routing, Hpsr. 116-120. DOI: 10.1109/HPSR.2002.1024219  0.566
2002 Anagnostakis KG, Greenwald M, Ioannidis S, Miltchev S. Open packet monitoring on FLAME: Safety, performance, and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2546: 120-131. DOI: 10.1007/3-540-36199-5_10  0.376
2002 Anagnostakis KG, Ioannidis S, Miltchev S, Greenwald M, Smith JM, Ioannidis J. Efficient packet monitoring for network management Ieee Symposium Record On Network Operations and Management Symposium. 423-436.  0.541
2001 Anagnostakis KG, Ioannidis S, Miltchev S, Smith JM. Practical network applications on a lightweight active management environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2207: 101-115. DOI: 10.1007/3-540-45451-9_7  0.565
2000 Anagnostakis KG, Hicks MW, Ioannidis S, Keromytis AD, Smith JM. Scalable resource control in active networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1942: 343-357. DOI: 10.1007/3-540-40057-5_25  0.658
2000 Ioannidis S, Keromytis AD, Bellovin SM, Smith JM. Implementing a distributed firewall Proceedings of the Acm Conference On Computer and Communications Security. 190-199.  0.593
1999 Ioannidis S, Papathanasiou AE, Magklis G, Markatos EP, Pnevmatikatos DN, Sevaslidou J. On Using Reliable Network RAM in Networks of Workstations Scalable Computing: Practice and Experience. 2. DOI: 10.12694/Scpe.V2I2.132  0.347
1999 Ioannidis S, Rencuzogullari U, Stets R, Dwarkadas S. CRAUL: Compiler and Run-Time Integration for Adaptation under Load Scientific Programming. 7: 261-273. DOI: 10.1155/1999/603478  0.34
1999 Pnevmatikatos D, Markatos EP, Magklis G, Ioannidis S. On using network RAM as a non-volatile buffer Cluster Computing. 2: 295-303. DOI: 10.1023/A:1019003514550  0.303
1998 Ioannidis S, Dwarkadas S. Compiler and run-time support for adaptive load balancing in software distributed shared memory systems ? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1511: 107-122. DOI: 10.1007/3-540-49530-4_8  0.402
Show low-probability matches.