Year |
Citation |
Score |
2014 |
Pappas V, Krell F, Vo B, Kolesnikov V, Malkin T, Choi SG, George W, Keromytis A, Bellovin S. Blind seer: A scalable private DBMS Proceedings - Ieee Symposium On Security and Privacy. 359-374. DOI: 10.1109/SP.2014.30 |
0.512 |
|
2014 |
Pappas V, Polychronakis M, Keromytis AD. Dynamic reconstruction of relocation information for stripped binaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 68-87. DOI: 10.1007/978-3-319-11379-1_4 |
0.526 |
|
2013 |
Pappas V, Kemerlis VP, Zavou A, Polychronakis M, Keromytis AD. CloudFence: Data flow tracking as a cloud service Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8145: 411-431. DOI: 10.1007/978-3-642-41284-4_21 |
0.636 |
|
2013 |
Barbera MV, Kemerlis VP, Pappas V, Keromytis AD. CellFlood: Attacking tor onion routers on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 664-681. DOI: 10.1007/978-3-642-40203-6_37 |
0.591 |
|
2013 |
Zavou A, Pappas V, Kemerlis VP, Polychronakis M, Portokalidis G, Keromytis AD. Cloudopsy: An autopsy of data flows in the cloud Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8030: 366-375. DOI: 10.1007/978-3-642-39345-7-39 |
0.636 |
|
2012 |
Pappas V, Polychronakis M, Keromytis AD. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization Proceedings - Ieee Symposium On Security and Privacy. 601-615. DOI: 10.1109/SP.2012.41 |
0.473 |
|
2012 |
Gessiou E, Pappas V, Athanasopoulos E, Keromytis AD, Ioannidis S. Towards a universal data provenance framework using dynamic instrumentation Ifip Advances in Information and Communication Technology. 376: 103-114. DOI: 10.1007/978-3-642-30436-1_9 |
0.597 |
|
2011 |
Pappas V, Bowen BM, Keromytis AD. Evaluation of a spyware detection system using thin client computing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 222-232. DOI: 10.1007/978-3-642-24209-0_15 |
0.495 |
|
2011 |
Pappas V, Keromytis AD. Measuring the deployment hiccups of DNSSEC Communications in Computer and Information Science. 192: 44-53. DOI: 10.1007/978-3-642-22720-2_5 |
0.538 |
|
2011 |
Pappas V, Bowen BM, Keromytis AD. Crimeware swindling without virtual machines Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6531: 196-202. DOI: 10.1007/978-3-642-18178-8-17 |
0.419 |
|
2010 |
Kemerlis VP, Pappas V, Portokalidis G, Keromytis AD. iLeak: A lightweight system for detecting inadvertent information leaks Proceedings - European Conference On Computer Network Defense, Ec2nd 2010. 21-28. DOI: 10.1109/EC2ND.2010.13 |
0.662 |
|
2007 |
Osterweil E, Pappas V, Massey D, Zhang L. Zone state revocation for DNSSEC Proceedings of the 2007 Workshop On Large Scale Attack Defense, Lsad '07. 153-160. DOI: 10.1145/1352664.1352677 |
0.326 |
|
2007 |
Pappas V, Massey D, Zhang L. Enhancing DNS resilience against denial of service attacks Proceedings of the International Conference On Dependable Systems and Networks. 450-459. DOI: 10.1109/DSN.2007.42 |
0.476 |
|
2006 |
Sarat S, Pappas V, Terzis A. On the use of anycast in DNS Proceedings - International Conference On Computer Communications and Networks, Icccn. 71-78. DOI: 10.1109/ICCCN.2006.286248 |
0.437 |
|
2003 |
Jin Y, Zhang B, Pappas V, Zhang L, Jamin S. DIP: Distance information protocol for IDMaps Proceedings - Ieee Symposium On Computers and Communications. 775-782. DOI: 10.1109/ISCC.2003.1214212 |
0.364 |
|
Show low-probability matches. |