Gnort: High performance network intrusion detection using graphics processors G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 459 | 2008 |
Defending against hitlist worms using network address space randomization S Antonatos, P Akritidis, EP Markatos, KG Anagnostakis Proceedings of the 2005 ACM workshop on Rapid malcode, 30-40, 2005 | 326 | 2005 |
Generating realistic workloads for network intrusion detection systems S Antonatos, KG Anagnostakis, EP Markatos Proceedings of the 4th International Workshop on Software and Performance …, 2004 | 251 | 2004 |
Regular Expression Matching on Graphics Hardware for Intrusion Detection. G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis RAID 9, 265-283, 2009 | 189 | 2009 |
E 2 xB: A Domain-Specific String Matching Algorithm for Intrusion Detection KG Anagnostakis, S Antonatos, EP Markatos, M Polychronakis Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003 | 127 | 2003 |
Exclusion-based signature matching for intrusion detection EP Markatos, S Antonatos, M Polychronakis, KG Anagnostakis Proceedings of the IASTED International Conference on Communications and …, 2002 | 121 | 2002 |
Antisocial networks: Turning a social network into a botnet E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ... Information Security: 11th International Conference, ISC 2008, Taipei …, 2008 | 111 | 2008 |
A generic anonymization framework for network traffic D Koukis, S Antonatos, D Antoniades, EP Markatos, P Trimintzios 2006 IEEE International Conference on Communications 5, 2302-2309, 2006 | 103 | 2006 |
Puppetnets: Misusing web browsers as a distributed attack infrastructure VT Lam, S Antonatos, P Akritidis, KG Anagnostakis Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 88 | 2006 |
An active splitter architecture for intrusion detection and prevention K Xinidis, I Charitakis, S Antonatos, KG Anagnostakis, EP Markatos IEEE Transactions on Dependable and Secure Computing 3 (1), 31-44, 2006 | 87 | 2006 |
Performance analysis of content matching intrusion detection systems S Antonatos, KG Anagnostakis, EP Markatos, M Polychronakis 2004 International Symposium on Applications and the Internet. Proceedings …, 2004 | 84 | 2004 |
Enhanced captchas: Using animation to tell humans and computers apart E Athanasopoulos, S Antonatos Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International …, 2006 | 81 | 2006 |
Using social networks to harvest email addresses I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010 | 71 | 2010 |
Oscillation resolution for mobile phone cellular tower data to enable mobility modelling W Wu, Y Wang, JB Gomes, DT Anh, S Antonatos, M Xue, P Yang, GE Yap, ... 2014 IEEE 15th International Conference on Mobile Data Management 1, 321-328, 2014 | 56 | 2014 |
The bounded Laplace mechanism in differential privacy N Holohan, S Antonatos, S Braghin, P Mac Aonghusa arXiv preprint arXiv:1808.10410, 2018 | 53 | 2018 |
On the privacy risks of publishing anonymized IP network traces D Koukis, S Antonatos, KG Anagnostakis Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International …, 2006 | 52 | 2006 |
Piranha: Fast and memory-efficient pattern matching for intrusion detection S Antonatos, M Polychronakis, P Akritidis, KG Anagnostakis, EP Markatos Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 50 | 2005 |
Understanding the behavior of malicious applications in social networks A Makridakis, E Athanasopoulos, S Antonatos, D Antoniades, S Ioannidis, ... IEEE network 24 (5), 14-19, 2010 | 48 | 2010 |
Appmon: An application for accurate per application network traffic characterization D Antoniades, M Polychronakis, S Antonatos, EP Markatos, S Ubik, ... In IST Broadband Europe 2006 Conference, 2006 | 45 | 2006 |
Honey@ home: a new approach to large-scale threat monitoring S Antonatos, K Anagnostakis, E Markatos Proceedings of the 2007 ACM workshop on recurring malcode, 38-45, 2007 | 41 | 2007 |