Gnort: High performance network intrusion detection using graphics processors G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis International workshop on recent advances in intrusion detection, 116-134, 2008 | 435 | 2008 |
Defending against hitlist worms using network address space randomization S Antonatos, P Akritidis, EP Markatos, KG Anagnostakis Computer Networks 51 (12), 3471-3490, 2007 | 300 | 2007 |
Generating realistic workloads for network intrusion detection systems S Antonatos, KG Anagnostakis, EP Markatos Proceedings of the 4th International Workshop on Software and Performance …, 2004 | 245 | 2004 |
Regular expression matching on graphics hardware for intrusion detection G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis International Workshop on Recent Advances in Intrusion Detection, 265-283, 2009 | 174 | 2009 |
E 2 xB: A Domain-Specific String Matching Algorithm for Intrusion Detection KG Anagnostakis, S Antonatos, EP Markatos, M Polychronakis IFIP International Information Security Conference, 217-228, 2003 | 127 | 2003 |
Exclusion-based signature matching for intrusion detection EP Markatos, S Antonatos, M Polychronakis, KG Anagnostakis Proceedings of the IASTED International Conference on Communications and …, 2002 | 115 | 2002 |
Antisocial networks: Turning a social network into a botnet E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ... International Conference on Information Security, 146-160, 2008 | 108 | 2008 |
A generic anonymization framework for network traffic D Koukis, S Antonatos, D Antoniades, EP Markatos, P Trimintzios 2006 IEEE International Conference on Communications 5, 2302-2309, 2006 | 96 | 2006 |
Puppetnets: Misusing web browsers as a distributed attack infrastructure VT Lam, S Antonatos, P Akritidis, KG Anagnostakis Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 87 | 2006 |
An active splitter architecture for intrusion detection and prevention K Xinidis, I Charitakis, S Antonatos, KG Anagnostakis, EP Markatos IEEE Transactions on Dependable and Secure Computing 3 (1), 31-44, 2006 | 83 | 2006 |
Performance analysis of content matching intrusion detection systems S Antonatos, KG Anagnostakis, EP Markatos, M Polychronakis 2004 International Symposium on Applications and the Internet. Proceedings …, 2004 | 83 | 2004 |
Enhanced captchas: Using animation to tell humans and computers apart E Athanasopoulos, S Antonatos IFIP International Conference on Communications and Multimedia Security, 97-108, 2006 | 73 | 2006 |
Using social networks to harvest email addresses I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010 | 64 | 2010 |
On the privacy risks of publishing anonymized IP network traces D Koukis, S Antonatos, KG Anagnostakis IFIP International Conference on Communications and Multimedia Security, 22-32, 2006 | 50 | 2006 |
Piranha: Fast and memory-efficient pattern matching for intrusion detection S Antonatos, M Polychronakis, P Akritidis, KG Anagnostakis, EP Markatos IFIP International Information Security Conference, 393-408, 2005 | 47 | 2005 |
Appmon: An application for accurate per application network traffic characterization D Antoniades, M Polychronakis, S Antonatos, EP Markatos, S Ubik, ... In IST Broadband Europe 2006 Conference, 2006 | 45 | 2006 |
Understanding the behavior of malicious applications in social networks A Makridakis, E Athanasopoulos, S Antonatos, D Antoniades, S Ioannidis, ... IEEE network 24 (5), 14-19, 2010 | 42 | 2010 |
Oscillation resolution for mobile phone cellular tower data to enable mobility modelling W Wu, Y Wang, JB Gomes, DT Anh, S Antonatos, M Xue, P Yang, GE Yap, ... 2014 IEEE 15th International Conference on Mobile Data Management 1, 321-328, 2014 | 41 | 2014 |
Honey@ home: a new approach to large-scale threat monitoring S Antonatos, K Anagnostakis, E Markatos Proceedings of the 2007 ACM workshop on recurring malcode, 38-45, 2007 | 41 | 2007 |
Puppetnets: Misusing web browsers as a distributed attack infrastructure S Antonatos, P Akritidis, VT Lam, KG Anagnostakis ACM Transactions on Information and System Security (TISSEC) 12 (2), 1-38, 2008 | 37 | 2008 |