Sotiris Ioannidis
Sotiris Ioannidis
Technical University of Crete and Foundation for Research and Technology - Hellas
Verified email at ece.tuc.gr - Homepage
Title
Cited by
Cited by
Year
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communications …, 2000
8342000
Gnort: High performance network intrusion detection using graphics processors
G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 116-134, 2008
4122008
A new wireless communication paradigm through software-controlled metasurfaces
C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz
IEEE Communications Magazine 56 (9), 162-169, 2018
2352018
Rage against the Virtual Machine: Hindering Dynamic Analysis of Android Malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the Seventh European Workshop on System Security (EuroSec), 6, 2014
2152014
Regular expression matching on graphics hardware for intrusion detection
G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis
International Conference on Recent Advances in Intrusion Detection, 265-283, 2009
1682009
MIDeA: a multi-parallel intrusion detection architecture
G Vasiliadis, M Polychronakis, S Ioannidis
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1452011
Detecting social network profile cloning
G Kontaxis, I Polakis, S Ioannidis, EP Markatos
2011 IEEE international conference on pervasive computing and communications …, 2011
1302011
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
1242011
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1032015
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
1022008
A cooperative immunization system for an untrusting internet
KG Anagnostakis, MB Greenwald, S Ioannidis, AD Keromytis, D Li
The 11th IEEE International Conference on Networks (ICON), 403-408, 2003
912003
Sub-operating systems: A new approach to application security
S Ioannidis, SM Bellovin, JM Smith
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 108-115, 2002
912002
Efficient packet monitoring for network management
KG Anagnostakis, S Ioannidis, S Miltchev, M Greenwald, JM Smith, ...
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
902002
Gravity: a massively parallel antivirus engine
G Vasiliadis, S Ioannidis
International Workshop on Recent Advances in Intrusion Detection, 79-96, 2010
872010
A study of the relative costs of network security protocols
S Miltchev, S Ioannidis, AD Keromytis
USENIX Annual Technical Conference (ATC), Freenix Track, 41-48, 2002
872002
Fileteller: Paying and getting paid for file storage
J Ioannidis, S Ioannidis, AD Keromytis, V Prevelakis
International Conference on Financial Cryptography, 282-299, 2002
842002
The STRONGMAN architecture
AD Keromytis, S Ioannidis, MB Greenwald, JM Smith
DARPA Information Survivability Conference and Exposition (DISCEX) 1, 178-188, 2003
702003
HCFI: Hardware-enforced Control Flow Integrity
N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis
6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
672016
AndRadar: Fast Discovery of Android Applications in Alternative Markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
11th Conference on Detection of Intrusions and Malware & Vulnerability …, 2014
662014
Two-factor authentication: is the world ready? Quantifying 2FA adoption
T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis
Proceedings of the eighth european workshop on system security, 1-7, 2015
652015
The system can't perform the operation now. Try again later.
Articles 1–20