Подписаться
Platon Kotzias
Platon Kotzias
Principal Research Engineer, Norton Research Group
Подтвержден адрес электронной почты в домене nortonlifelock.com
Название
Процитировано
Процитировано
Год
AVclass: A Tool for Massive Malware Labeling
M Sebastián, R Rivera, P Kotzias, J Caballero
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
4972016
Can i opt out yet? gdpr and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
2232019
Coming of Age: A Longitudinal Study of TLS Deployment
P Kotzias, A Razaghpanah, J Amann, KG Paterson, N Vallina-Rodriguez, ...
Proceedings of the Internet Measurement Conference 2018, 415-428, 2018
1102018
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
1072017
Measuring {PUP} prevalence and {PUP} distribution through pay-per-install services
P Kotzias, L Bilge, J Caballero
25th {USENIX} Security Symposium ({USENIX} Security 16), 739-756, 2016
902016
Certified PUP: Abuse in Authenticode Code Signing
P Kotzias, S Matic, R Rivera, J Caballero
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
642015
How did that get in my phone? unwanted app distribution on android devices
P Kotzias, J Caballero, L Bilge
2021 IEEE Symposium on Security and Privacy (SP), 53-69, 2021
482021
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services
S Matic, P Kotzias, J Caballero
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
462015
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
P Kotzias, L Bilge, PA Vervier, J Caballero
NDSS, 2019
392019
A specification-based intrusion detection engine for infrastructure-less networks
C Panos, C Xenakis, P Kotzias, I Stavrakakis
Computer Communications 54, 67-83, 2014
322014
Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem
E Blázquez, S Pastrana, Á Feal, J Gamba, P Kotzias, N Vallina-Rodriguez, ...
2021 IEEE Symposium on Security and Privacy (SP), 1606-1622, 2021
192021
Longitudinal Study of the Prevalence of Malware Evasive Techniques
L Maffia, D Nisi, P Kotzias, G Lagorio, S Aonzo, D Balzarotti
arXiv preprint arXiv:2112.11289, 2021
152021
Costly freeware: a systematic analysis of abuse in download portals
R Rivera, P Kotzias, A Sudhodanan, J Caballero
IET Information Security 13 (1), 27-35, 2019
112019
Securing the 802.11 MAC in MANETs: A specification-based intrusion detection engine
C Panos, P Kotzias, C Xenakis, I Stavrakakis
2012 9th Annual Conference on Wireless On-Demand Network Systems and …, 2012
92012
Unsupervised detection and clustering of malicious tls flows
G Gomez, P Kotzias, M Dell’Amico, L Bilge, J Caballero
Security and Communication Networks 2023, 2021
72021
An analysis of pay-per-install economics using entity graphs
P Kotzias, J Caballero
Workshop on Economics and Information Security (WEIS) 17, 2017
52017
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance
S Dambra, Y Han, S Aonzo, P Kotzias, A Vitale, J Caballero, D Balzarotti, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
A Deep Dive into the VirusTotal File Feed
K van Liebergen, J Caballero, P Kotzias, C Gates
International Conference on Detection of Intrusions and Malware, and …, 2023
12023
Identifying accurate locations of in-person payment card transactions to detect location-based payment card anomalies
KA ROUNDY, P Kotzias
US Patent App. 17/853,011, 2023
2023
Systems and methods for utilizing user profile data to protect against phishing attacks
DL Silva, J Roturier, P Efstathopoulos, IS Rola, S Dambra, P Kotzias, ...
US Patent App. 17/805,648, 2023
2023
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20