Publications
ICS Publications
Conferences (138)
Papers in Proceedings (full-paper reviewed)
- Pachilakis, M, Papadopoulos, P., Laoutaris, N., Markatos, E.P., & Kourtellis, N. (2022). YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy. ACM SIGMETRICS, Mumbai, India, June 2022. (pdf).
- Marchioro, T., Giaretta, L., Markatos, E.P., & Girdzijauskas, Š. (2022). Federated Naive Bayes under Differential Privacy. 19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
- Kazlouski, A., Marchioro, T., & Markatos, E.P. (2022). What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets. 19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
- Anastasiadi, E., Athanasopoulos, E., & Markatos, E.P. (2022). The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. 19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
- Gkolemi, M., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2022). YouTubers Not madeForKids: Detecting Channels Sharing Inappropriate Videos Targeting Children. 14th ACM Web Science Conference 2022 (WebSci 2022), Barcelona, Spain, July 2022. (pdf).
- Papadogiannakis, E., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2022). Leveraging Google’s Publisher-Specific IDs to Detect Website Administration. ACM Web Conference 2022, Virtual Event, Lyon France, April 2022. (pdf).
- Pantelakis, G., Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2022). Measuring the (Over) use of Service Workers for In-Page Push Advertising Purposes . International Conference on Passive and Active Network Measurement (PAM 2022), Online, March 2022 (pp. 426-438). (pdf).
- Marchioro, T., Kazlouski, A., & Markatos, E.P. (2021). User Identification from Time Series of Fitness Data. 18th International Conference on Security and Cryptography (SECRYPT 2021), Online, July 2021.
- Chalkiadakis, M., Kornilakis, A., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2021). The Rise and Fall of Fake News sites: A Traffic Analysis. Proceedings of the 13th ACM Web Science Conference (WebSci 2021), Online, June 2021 (pp. 168-177). (pdf).
- Giaretta, L., Savvidis, I., Marchioro, T., Girdzijauskas, Š., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2021). PDS^2: A user-centered decentralized marketplace for privacy preserving data processing. Proceedings of the 37th International Conference on Data Engineering Workshops (ICDEW), Online, April 2021 (pp. 92-99). (pdf).
- Papadogiannakis, E., Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2021). User tracking in the post-cookie era: How websites bypass gdpr consent to track users. Proceedings of the 30th Web Conference 2021, Online, April 2021. (pdf).
- Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2021). I still See You! Inferring Fitness Data from Encrypted Traffic of Wearables. 14th International Joint Conference on Biomedical Engineering Systems and Technologies HEALTHINF , Vienna, Austria, February 2021 (pp. 369-376).
- Korniotakis, J., Papadopoulos, P., & Markatos, E.P. (2020). Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes. In Proceedings of the1 7th International Conference on Security and Cryptography (SECRYPT 2020), Online, July 2020.
- Paschalides, D., Kornilakis, A., Christodoulou, C., Andreou, R., Pallis, G., Dikaiakos, M., & Markatos, E.P. (2019). Check-It: A Plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web. IEEE/WIC/ACM International Conference on Web Intelligence, Thessaloniki, Greece, October 2019 (pp. 298-302).
- Pachilakis, M, Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2019). No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem. Proceedings of the 19th Internet Measurements Conference 2019 (IMC'19), Amsterdam, Netherlands, October 2019. (pdf).
- Papadopoulos, P., Ilia, P., & Markatos, E.P. (2019). Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking. Proceedings of 22nd Information Security Conference (ISC), New York, USA, September 2019. (pdf).
- Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2019). Cookie synchronization: Everything you always wanted to know but were afraid to ask. Proceedings of the 28th International Conference on World Wide Web, San Fransisco, USA, May 2019. (pdf).
- Diamantaris, M., Papadopoulos, E. P. , Markatos, E.P., Ioannidis, S., & Polakis, I. (2019). REAPER: Real-time App Analysis for Augmenting the Android Permission System. Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), Dallas, TX, USA, March 2019. (pdf).
- Papadopoulos, P., Ilia, P., Polychronakis, M., Markatos, E.P., Ioannidis, S., & Vasiliadis, G. (2019). Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. Proceedings of the the Network and Distributed System Security Symposium (NDSS '19), San Diego, USA, February 2019. website, (pdf).
- Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). Where’s Wally? How to Privately Discover your Friends on the Internet. In proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018), Songdo, Incheon, Korea, June 2018. (pdf).
- Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). The Cost of Digital Advertisement: Comparing User and Advertiser Views. Proceedings of the 27th International World Wide Web Conference (WWW 2018), Lyon, France, April 2018. (pdf).
- Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E.P., & Ioannidis, S. (2017). No Sugar but all the Taste! Memory Encryption without Architectural Support. Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017), Oslo, Norway, September 2017. (pdf).
- Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2017). CCSP: a Compressed Certificate Status Protocol. Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '17), Atlanta, GA, USA, May 2017. (pdf).
- Papadopoulos, E. P. , Diamantaris, M., Papadopoulos, P., Petsas, T., Ioannidis, S., & Markatos, E.P. (2017). The Long-Standing Privacy Debate: Mobile Websites Vs Mobile Apps. Proceedings of the 26th International World Wide Web Conference, (WWW 2017), Perth, Western Australia, April 2017. (pdf).
- Papadopoulos, P., Athanasopoulos, E., Kosta, E., Siganos, G., Keromytis, A.D., & Markatos, E.P. (2016). Provable Network Activity for Protecting Users against False Accusation. Proceedings of the 10th International Conference on Information Security Theory and Practice (WISTP'2016) , Heraklion, Crete, Greece, September 2016. (pdf).
- Polakis, I., Volanis, S., Athanasopoulos, E., & Markatos, E.P. (2013). The man who was there: Validating check-ins in location-based services. In Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
- Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, Th., & Markatos, E.P. (2013). k-subscription: Privacy-preserving Microblogging Browsing through Obfuscation. In Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
- Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2013). Rise of the Planet of the Apps: A Systematic Study of the Mobile App Ecosystem. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
- Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2013). Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
- Gessiou, E., Volanis, S., Athanasopoulos, E., Markatos, E.P., & Ioannidis, S. (2012). Digging up social structures from documents on the web. In Proceedings of IEEE 2012 Communication and Information System Security Symposium (Globecom CISS), Anaheim, CA, USA, December 2012.
- Athanasopoulos, E., Kemerlis, V. P., Polychronakis, M., & Markatos, E.P. (2012). ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS'12), Singapore, June 2012. (pdf).
- Kontaxis, G., Polychronakis, M., Keromytis, A. D., & Markatos, E.P. (2012). Privacy-Preserving Social Plugins. In Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, August 2012.
- Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2012). Tolerating Overload Attacks Against Packet Capturing Systems. In Proceedings of the USENIX Annual Technical Conference (ATC)(available from usenix website ), Boston, MA, USA, June 2012. (pdf).
- Antoniades, D., Kontaxis, G., Athanasopoulos, E., Ioannidis, S., Markatos, E.P., & Karagiannis, Th. (2011). we.b: The Web of Short URLs. In Proceedings of the 20th International World Wide Web Conference (WWW), Hyderabad, India, March 2011. (pdf).
- Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2011). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms. In Proceedings of the 14th Information Security Conference (ISC), Xi'an, China, October 2011. (pdf).
- Markatos, E.P., Petsas, T., Polakis, I.S., & Antonatos, S. (2010). A systematic characterization of IM threats using honeypots. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 2010), Feb 2010. (pdf).
- Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). An architecture for enforcing JavaScript randomization in web2.0 applications. Short paper in Proceedings of the 13th Information Security Conference (ISC 2010), Boca Raton, FL, USA, 25 October 2010 through 28 October 2010 (vol. 6531 LNCS, pp. 203-209). (03029743; 9783642181771 (ISBN)), (pdf).
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2010). Comprehensive shellcode detection using runtime heuristics. Proceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, (pp. 287-296). New York, NY, USA: ACM (978-1-4503-0133-6), (pdf).
- Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2010). D(e|i)aling with VoIP: Robust prevention of DIAL attacks. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece, September 20-22 (vol. 6345, pp. 663-678). (03029743; 3642154964 (ISBN); 9783642154966 (ISBN)), (pdf).
- Kontaxis, G., Polakis, I., & Markatos, E.P. (2010). Experiences and observations from the NoAH infrastructure. 6th European Conference on Computer Network Defense, EC2ND 2010, Berlin, October 28-29 (pp. 11-18). (9780769543116 (ISBN)), (pdf).
- Antoniades, D., Markatos, E.P., & Dovrolis, C. (2010). MOR: monitoring and measurements through the onion router. Proceedings of the 11th international conference on Passive and active measurement, Zurich, Switzerland, (pp. 131-140). Berlin, Heidelberg: Springer-Verlag (3-642-12333-3, 978-3-642-12333-7), (pdf).
- Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). RRDtrace: Long-term raw network traffic recording using fixed-size storage. 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010, Miami Beach, FL, August 17-19 (pp. 101-110). (9780769541976 (ISBN)), (pdf).
- Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.P., & Karagiannis, Th. (2010). xJS: practical XSS prevention for web application development. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps), Boston, MA, USA, (pp. 13). Berkeley, CA, USA: USENIX Association (pdf).
- Antonatos, S., Locasto, M., Sidiroglou, S., Keromytis, A.D., & Markatos, E.P. (2009). Defending against next generation through network/endpoint collaboration and interaction. Proceedings of the 3rd European Conference on Computer Network Defense , (pp. 131-141).
- Chin, W.Y., Markatos, E.P., Antonatos, S., & Ioannidis, S. (2009). HoneyLab: Large-scale honeypot deployment and resource sharing. 2009 3rd International Conference on Network and System Security, NSS 2009, Gold Coast, QLD, 19 October 2009 through 21 October 2009 (pp. 381-388). (9780769538389 (ISBN)), (pdf).
- Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2009). Imbuing unstructured P2P systems with non-intrusive topology awareness. In Proceedings of the 9th International Conference on Peer-to-Peer Computing., Seattle, USA, 91-1 September (pp. 51-60). (pdf).
- Antoniades, D., Markatos, E.P., & Dovrolis, C. (2009). One-click hosting services: a file-sharing hideout. IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, Chicago, Illinois, USA, (pp. 223-234). New York, NY, USA: ACM (978-1-60558-771-4), (pdf).
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). Real-world Polymorphic Attack Detection. In Proceedings of the 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA), Athens, Greece, June. (pdf).
- Friedl, A., Ubik, S., Kapravelos, A., Polychronakis, M., & Markatos, E.P. (2009). Realistic passive packet loss measurement for high-speed networks. 1st International Workshop on Traffic Monitoring and Analysis, TMA 2009, Aachen, 11 May 2009 through 11 May 2009 (vol. 5537 LNCS, pp. 1-7). (03029743; 9783642016448 (ISBN)), (pdf).
- Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E.P., & Ioannidis, S. (2009). Regular Expression Matching on Graphics Hardware for Intrusion Detection. Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25 (pp. 265-283). (pdf).
- Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., & Markatos, E.P. (2008). Antisocial networks: Turning a social network into a botnet. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 146-160). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
- Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2008). Compromising anonymity using packet spinning. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 161-174). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
- Bos, H., & Markatos, E.P. (2008). European Conference on Computer Systems: Preface. 1st European Workshop on System Security, EUROSEC '08, Glasgow, 31 March 2008 through 31 March 2008. Association for Computing Machinery (9781605581194 (ISBN)).
- Politopoulos, P.I., Markatos, E.P., & Ioannidis, S. (2008). Evaluation of compression of remote network monitoring data streams. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, Brazil, 7 April 2008 through 11 April 2008 (pp. 109-115). (9781424420674 (ISBN)), (pdf).
- Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., & Ioannidis, S. (2008). Gnort: High performance network intrusion detection using graphics processors. Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings, Cambridge, MA, USA, 15 September 2008 through 17 September 2008 (vol. 5230 LNCS, pp. 116-134). (03029743; 354087402X (ISBN); 9783540874027 (ISBN)), (pdf).
- Antonatos, S., Athanatos, M., Kondaxis, G., Velegrakis, J., Hatzibodozis, N., Ioannidis, S., & Markatos, E.P. (2008). Honey@home: A new approach to large-scale threat monitoring. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008, Amsterdam, 21 April 2008 through 22 April 2008 (pp. 3-16). (9780769533476 (ISBN)), (pdf).
- Antoniades, D., Polychronakis, M., Nikiforakis, N., Markatos, E.P., & Mitsos, Y. (2008). Monitoring three National Research Networks for eight weeks: Observations and implications. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 153-156). (9781424420674 (ISBN)), (pdf).
- Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2008). On the Anonymization and Deanonymization of Netflow Traffic. In Proceedings of FloCon 2008, Savannah, Georgia, USA, January. (pdf).
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2008). Real-world polymorphic attack detection using network-level emulation. CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research, Oak Ridge, Tennessee, (pp. 1-3). New York, NY, USA: ACM (978-1-60558-098-2), (pdf).
- Theocharides, A., Antoniades, D., Polychronakis, M., Athanasopoulos, E., & Markatos, E.P. (2008). Topnet: A Network-aware top(1). LISA; Proceedings of the 22nd Large Installation System Administration Conference, {LISA} 2008, November 9-14, 2008, San Diego, {CA {USA}, San Diego, California, September (pp. 145-157). USENIX Association (978-1-931971-63-8), (pdf).
- Nikiforakis, N., Antoniades, D., Markatos, E.P., Ioannidis, S., & Øslebø, A. (2008). When AppMon met Stager. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 157-160). (9781424420674 (ISBN)), (pdf).
- Krithinakis, A., Stroetmann, L., Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2008). WSIM: A Software Platform to Simulate All-Optical Security Operations. Computer Network Defense, 2008. EC2ND 2008. European Conference on, Dublin, Ireland, Decembe (pp. 41-47). (pdf).
- Nikiforakis, N., Makridakis, A., Athanasopoulos, E., & Markatos, E.P. (2007). Alice, what did you do last time? Fighting Phishing Using Past Activity Tests. Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND '07); LNEE (Lecture Notes on Electrical Engineering), Heraklion, Greece, 4-5 October. Springer (978-0-387-85554-7), (pdf).
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Emulation-based detection of non-self-contained polymorphic shellcode. 10th Symposium on Recent Advances in Intrusion Detection, RAID 2007, Gold Coast, Australia, 5 September 2007 through 7 September 2007 (vol. 4637 LNCS, pp. 87-106). (03029743; 9783540743194 (ISBN)), (pdf).
- Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2007). Flexible and high-performance anonymization of Netflow records using anontool. 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, Nice, 17 September 2007 through 21 September 2007 (pp. 33-38). (1424409756 (ISBN); 9781424409754 (ISBN)), (pdf).
- Athanasopoulos, E., Roussopoulos, M., Anagnostakis, K.G., & Markatos, E.P. (2007). GAS: Overloading a file sharing network as an anonymizing system. 2nd International Workshop on Security, IWSEC 2007, Nara, 29 October 2007 through 31 October 2007 (vol. 4752 LNCS, pp. 365-379). (03029743; 9783540756507 (ISBN)), (pdf).
- Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@home: a new approach to large-scale threat monitoring. WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode, Alexandria, Virginia, USA, (pp. 38-45). New York, NY, USA: ACM (978-1-59593-886-2), (pdf).
- Papadogiannakis, A., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2007). Improving the performance of passive network monitoring applications using locality buffering. 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS '07, Istanbul, 24 October 2007 through 26 October 2007 (pp. 151-157). (9781424418541 (ISBN)), (pdf).
- Andreozzi, S., Ciuffoletti, A., Ghiselli, A., Antoniades, D., Polychronakis, M., Markatos, E.P., & Trimintzios, P. (2007). On the Integration of Passive and Active Network Monitoring in Grid Systems. Integrated Research in GRID Computing. Workshop 2005 (Selected Papers), Pisa, Italy, November 28–30 (pp. 147-161). USA: Springer (978-0-387-47656-8 (Print) 978-0-387-47658-2 (Online)), (pdf).
- Koukis, D., Antonatos, S., Antoniades, D., Markatos, E.P., & Trimintzios, P. (2006). A generic anonymization framework for network traffic. 2006 IEEE International Conference on Communications, ICC 2006, Istanbul, 11 July 2006 through 15 July 2006 (vol. 5, pp. 2302-2309). (05361486; 1424403553 (ISBN); 9781424403554 (ISBN)), (pdf).
- Antoniades, D., Polychronakis, M., Antonatos, S., Markatos, E.P., Ubik, S., & Øslebø, A. (2006). Appmon: An Application for Accurate per Application Network Traffic Characterisation. In IST Broadband Europe 2006 Conference, Geneva, Switzerland, December. (pdf).
- Antoniades, D., Athanatos, M., Papadogiannakis, A., Markatos, E.P., & Dovrolis, C. (2006). Available bandwidth measurement as simple as running wget. In Proceedings of the Passive and Active Measurement Conference (PAM2006), Adelaide, Australia, March. (pdf).
- Trimintzios, P., Polychronakis, M., Papadogiannakis, A., Foukarakis, M., Markatos, E.P., & Øslebø, A. (2006). DiMAPI: An application programming interface for distributed network monitoring. 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, BC, 3 April 2006 through 7 April 2006 (pp. 382-393). (1424401429 (ISBN); 9781424401420 (ISBN)), (pdf).
- Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2006). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. In Proceedings of the 3nd CoreGRID Integration Workshop, Krakow Poland.
- Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2006). Grid Reliability: A Study of Failures on the EGEE Infrastructure. Proceedings of the 3rd CoreGRID Integration Workshop, Krakow, Poland, 19-20 October (pp. 165-176). (pdf).
- Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets. 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, Singapore, 6 June 2006 through 9 June 2006 (vol. 3989 LNCS, pp. 130-145). (03029743; 3540347038 (ISBN); 9783540347033 (ISBN)), (pdf).
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation. Berlin, Germany, July 13-14 (pp. 54-73). (pdf).
- Papadogiannakis, A., Kapravelos, A., Polychronakis, M., Markatos, E.P., & Ciuffoletti, A. (2006). Passive end-to-end packet loss estimation for GRID traffic monitoring. CoreGRID Integration Workshop 2006, Krakow, Poland, October 19-20. Krakow: CYFRONET AG (83-915141-6-1), (pdf).
- Papadakis, H., Fragopoulou, P., Athanasopoulos, E., Dikaiakos, M., & Markatos, E.P. (2005). A Feedback-based Approach to Reduce Duplicate Messages. In Proceedings of the 2nd CoreGrid Integration Workshop, Lisbon, Portugal, November. (pdf).
- Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2005). Defending against hitlist worms using network address space randomization. WORM '05 - 2005 ACM Workshop on Rapid Malcode, Farfax, VA, 11 November 2005 through 11 November 2005 (pp. 30-40). (1595932291 (ISBN)), (pdf).
- Xinidis, K., Anagnostakis, K.G., & Markatos, E.P. (2005). Design and Implementation of a High-Performance Network Intrusion Prevention System. IFIP TC11 20th International Information Security Conference, Chiba, Japan, May 30 – June 1 (pp. 359-374). (pdf).
- Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow Honeypots. Proceedings of the 14th {USENIX} Security Symposium, August. USENIX (pdf).
- Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Efficient content-based detection of zero-day worms. Communications, 2005. ICC 2005. 2005 IEEE International Conference on Communications (ICC 2005), Seoul, Korea, 16-20 May (vol. 2, pp. 837-843). (pdf).
- Andreozzi, S., Antoniades, D., Ciuffoletti, A., Ghiselli, A., Markatos, E.P., Polychronakis, M., & Trimintzios, P. (2005). Issues about the Integration of Passive and Active Monitoring for Grid Networks. CoreGRID Integration Workshop 2005, Nov. Pisa (pdf).
- Antonatos, S., Polychronakis, M., Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC, Chiba, Japan, May 30 - June 1 (pp. 393-408). (pdf).
- Akritidis, P., Markatos, E.P., Polychronakis, M., & Anagnostakis, K.G. (2005). STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis. Chiba, Japan, May 30 – June 1 (pp. 375-391). (pdf).
- Polychronakis, M., Markatos, E.P., Anagnostakis, K.G., & Øslebø, A. (2004). Design of an application programming interface for IP network monitoring. 2004 IEEE/IFIP Network Operations and Management Symposium: Managing Next Generation Convergence Networks and Services, NOMS 2004, Seoul, 1 April 2004 through 1 April 2004 (pp. 483-496). (pdf).
- Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2004). Generating realistic workloads for network intrusion detection systems. Proceedings of the Fourth International Workshop on Software and Performance, WOSP '04, Redwood Shores, CA, 14 January 2004 through 16 January 2004 (pp. 207-215). (1581136730 (ISBN)).
- Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2004). Generating Realistic Workloads for Network Intrusion Detection Systems. Proceedings of the Fourth International Workshop on Software and Performance (WOSP2004), January 2004. (pdf).
- Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2004). Performance analysis of content matching intrusion detection systems. Proceedings - 2004 International Symposium on Applications and the Internet (Saint 2004), Tokyo, 26 January 2004 through 30 January 2004 (pp. 208-215). (0769520685 (ISBN)).
- Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2004). Performance Analysis of Content Matching Intrusion Detection Systems. Proceedings of the International Symposium on Applications and the Internet (SAINT2004), January 2004. (pdf).
- Markatos, E.P., Ji R Novotn, Y., Polychronakis, M., Smotlacha, V.R., & Ubik, S. (2004). SCAMPI - A Scaleable Monitoring Platform for the Internet. In Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004), Budapest, Hungary, 22-23 March. (pdf).
- Luque, E., Castaños, J.G., Markatos, E.P., & Perego, R. (2004). Topic 3: Scheduling and Load Balancing. Pisa, Italy, August 31- September 3 (pp. 220-221).
- Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Trafc Splitter Architecture for Intrusion Detection. Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Orlando Florida, October 2003 (pp. 238-240). (pdf).
- Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Traffic Splitter Architecture for Intrusion Detection. MASCOTS, (pp. 238-241). IEEE Computer Society (0-7695-2039-1).
- Charitakis, I., Pnevmatikatos, D., Markatos, E.P., & Anagnostakis, K.G. (2003). Code generation for packet header intrusion analysis on the IXP1200 network processor. Vienna, Austria, September 24-26 (vol. 2826, pp. 226-239). (03029743).
- Charitakis, I., Pnevmatikatos, D., Markatos, E.P., & Anagnostakis, K.G. (2003). Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, Vienna, Austria, September 2003 (pp. 226-239). (pdf).
- Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2003). E2XB: : A Domain-Specific String Matching Algorithm for Intrusion Detection. SEC; Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18$^th$ International Conference on Information Security ({SEC2003}), May 26-28, 2003, Athens, Greece; IFIP Conference Proceedings,, (vol. 250, pp. 217-228). Kluwer (1-4020-7449-2).
- Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2003). E2xB: A domain–specific string matching algorithm for intrusion detection. Proceedings of the 18th IFIP International Information Security Conference (SEC2003), May 2003. (pdf).
- Charitakis, I., Pnevmatikatos, D., Markatos, E.P., & Anagnostakis, K.G. (2003). S2I: a Tool for Automatic Rule Match Compilation for the IXP Network Processor. In Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2003), Vienna, Austria, 24-26 September.
- Coppens, J., Van den Berghe, S., Bos, H., Markatos, E.P., De Turck, F., Øslebø, A., & Ubik, S. (2003). SCAMPI: A scalable and programmable architecture for monitoring gigabit networks. Workshop on End-to-End Monitoring Techniques and Services (E2EMON), Belfast, Ireland, September 7-10 (vol. 2839, pp. 475-487). (03029743).
- Coppens, J., Van den Berghe, S., Bos, H., Markatos, E.P., De Turck, F., Oslebo, A., & Ubik, S. (2003). SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Proceedings of the Workshop on End-to-End Monitoring Techniques and Services (E2EMON), September 2003. (pdf).
- Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002). Exclusion-based signature matching for intrusion detection. In Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN, (pp. 146-152). ACTA Press.
- Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002). Exclusion-based Signature Matching for Intrusion Detection. Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN), Cambridge, USA, November 2002 (pp. 146-152). (pdf).
- Markatos, E.P. (2002). Speeding up TCP/IP: Faster processors are not enough. 21st IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, 3 April 2002 through 5 April 2002 (pp. 341-345).
- Markatos, E.P. (2002). Speeding-up TCP/IP: Faster Processors are not Enough. In Proceedings of the 21st IEEE International Performance, Computing, and Communications Conference (IPCCC 2002), April 2002 (pp. 341-345). (pdf).
- Markatos, E.P. (2002). Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella. CCGRID, (pp. 65-74). IEEE Computer Society (0-7695-1582-7).
- Markatos, E.P. (2002). Tracing a large-scale Peer to Peer System:an hour in the life of Gnutella. In Proceedings of the CCGrid 2002: the second IEEE International Symposium on Cluster Computing and the Grid, May 2002 (pp. 65-74). (pdf).
- Gialama, E.M., Markatos, E.P., Sevaslidou, J.E., Serpanos, D.N., Kotsovinos, E.N., & Asimakopoulou, X.A. (2001). DIVISOR: Distributed video server for streaming. In Proceedings of the 5th IEEE/WSES International Conference on Circuits, Systems, Communications and Computers (CSCC 2001), July (pp. 4531-4536).
- Gialama, E.M., Markatos, E.P., Sevaslidou, J.E., Serpanos, D.N., Asimakopoulou, X.A., & Kotsovinos, E.N. (2001). DIVISOR: DIstributed VIdeo Server fOr stReaming. In the Proceedings of the 5th WSES/IEEE WORLD MULTICONFERENCE ON Circuits, Systems, Communications and Computers (CSCC 2001), July 2001 (pp. 4531-4536). (pdf).
- Markatos, E.P. (2001). On caching search engine query results. 5th International Web Caching and Content Delivery Workshop, 2/1 (vol. 24, pp. 137-143). (0140-3664).
- Markatos, E.P. (2000). On Caching Search Engine Query Results. In the Proceedings of the 5th International Web Caching and Content Delivery Workshop, May 2000. (pdf).
- Markatos, E.P., Katevenis, M.G.H., Pnevmatikatos, D., & Flouris, M.D. (1999). Secondary Storage Management for Web Proxies. USENIX Symposium on Internet Technologies and Systems.
- Markatos, E.P., Katevenis, M.G.H., Pnevmatikatos, D., & Flouris, M.D. (1999). Secondary Storage Management for Web Proxies. In Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS99), Co-Sponsored by IEEE Computer Society, Technical Committee on the Internet., (pp. 93-104). (pdf).
- Markatos, E.P., & Chronaki, C. (1998). A Top-10 Approach to Prefetching the Web. In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
- Markatos, E.P., Tziviskou, Ch., & Papathanasiou, A E. (1998). Effective Resource Discovery on the World Wide Web.
- Papathanasiou, A E., & Markatos, E.P. (1998). Lightweight transactions on networks of workstations. Proceedings of the 1998 18th International Conference on Distributed Computing Systems, Amsterdam, Neth, 26 May 1998 through 29 May 1998 (pp. 544-551). Piscataway, NJ, United States: IEEE.
- Papathanasiou, A E., & Markatos, E.P. (1998). Lightweight Transactions on Networks of Workstations. In International Conference on Distributed Computing Systems (ICDCS 1998), Amsterdam, May 1998. (pdf).
- Ioannidis, S., Markatos, E.P., & Sevaslidou, J.E. (1998). On Using Network Memory to Improve the Performance of Transaction-Based Systems. In International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '98).
- Ioannidis, S., Markatos, E.P., & Sevaslidou, J.E. (1998). On Using Network Memory to Improve the Performance of TransactionBased Systems. In Proceedings of 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, USA, July 1998. (pdf).
- Papadakis, N., Markatos, E.P., & Papathanasiou, A E. (1998). Palantir: A Visualization Tool for the World Wide Web. In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
- Papadakakis, N., Markatos, E.P., & Papathanasiou, A E. (1998). Palantir: AVisualization Tool for the World Wide Web. In Proceedings of INET '98 (The Internet Summit), Geneva, Switzerland, July.
- Papathanasiou, A E., Markatos, E.P., & Papadakis, S.A. (1998). PaperFinder: A Tool for Scalable Search of Digital Libraries. WebNet; Proceedings of WebNet 98 - World Conference on the {WWW} and Internet & Intranet, Orlando, Florida, {USA November 7-12, 1998, AACE (1-880094-31-2,).
- Markatos, E.P., Katevenis, M.G.H., & Vatsolaki, P. (1998). The Remote Enqueue Operation on Networks of Workstations. CANPC, Las Vegas, Nevada, USA, January 31 - February 1 (pp. 1-14).
- Katevenis, M.G.H., Vatsolaki, P., Serpanos, D.N., & Markatos, E.P. (1997). ATLAS: A Single-Chip ATM Switch for NOWs. CANPC, San Antonio, Texas, USA, February 1-2 (pp. 88-101).
- Katevenis, M.G.H., Serpanos, D.N., & Markatos, E.P. (1997). Multi-queue management and scheduling for improved QoS in communication networks. In Proceedings of the European Multimedia Microprocessor Systems and Electronic Commerce (EMMSEC '97, (pp. 906-913).
- Markatos, E.P., & Katevenis, M.G.H. (1997). User-level DMA without operating system kernel modification. Proceedings of the 1997 3rd International Symposium on High-Performance Computer Architecture, HPCA, San Antonio, TX, USA, 1 February 1997 through 5 February 1997 (pp. 322-331). Los Alamitos, CA, United States: IEEE.
- Markatos, E.P., & Dramitinos, G. (1996). Implementation of a Reliable Remote Memory Pager. USENIX Annual Technical Conference, (pp. 177-190,).
- Markatos, E.P., & Dramitinos, G. (1996). Implementation of a Reliable Remote Memory Pager. In the proceedings of the USENIX Technical Conference, San Diego, Ca, January 22-26. (pdf).
- Markatos, E.P. (1996). Issues in reliable network memory paging. Proceedings of the 1996 4th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, San Jose, CA, USA, 1 February 1996 through 3 February 1996 (pp. 207-211). Piscataway, NJ, United States: IEEE.
- Markatos, E.P., & Katevenis, M.G.H. (1996). Telegraphos: high-performance networking for parallel processing on workstation clusters. Proceedings of the 1996 2nd International Symposium on High-Performance Computer Architecture, HPCA, San Jose, CA, USA, 3 February 1996 through 7 February 1996 (pp. 144-153). Los Alamitos, CA, United States: IEEE.
- Markatos, E.P. (1996). Using remote memory to avoid disk thrashing: a simulation study. Proceedings of the 1996 4th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, San Jose, CA, USA, 1 February 1996 through 3 February 1996 (pp. 61-73). Piscataway, NJ, United States: IEEE.
- Markatos, E.P., & Dramitinos, G. (1995). Adding flexibility to a remote memory pager. Proceedings of the 4th International Workshop on Object Orientation in Operating Systems, Lund, Swed, 14 August 1995 through 15 August 1995 (pp. 183-186). Los Alamitos, CA, United States: IEEE (10635351).
- Markatos, E.P., Katevenis, M.G.H., Kalokairinos, G., & Serpanos, D.N. (1995). An Efficient Processor-Network Interface for Local Area Multiprocessors. Proceedings of the 4th Int. Workshop on SCI-based High-Performance Low-Cost Computing, Crete, Greece, 3 October.
- Markatos, E.P., & Chronaki, C. (1994). Using reference counters in update based coherent memory. 6th International PARLE Conference , Proceedings, Athens, Greece, July 4–8 (pp. 805-808).
- Markatos, E.P., & Chronaki, C. (1994). Using reference counters in Update Based Coherent Memory. In PARLE '94 Parallel ARchitectures and Languages Europe, Athens, Greece (pdf).
- Markatos, E.P. (1993). How Architecture Evolution influences the Scheduling Discipline in Shared-Memory Multiprocessors. In PARCO 93, Grenoble, France (pdf).
Poster presentations (abstract reviewed)
- Degkleri, E., Chariton, A. A. , Ilia, P., Papadopoulos, P., & Markatos, E.P. (2016). Leveraging DNS for timely SSL Certificate Revocation. In 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016), Linz, Austria, September 2016. (pdf).
Workshops (22)
Papers in Proceedings (full-paper reviewed)
- Papadopoulos, P., & Pachilakis, M, Chariton, A. A. , Markatos, E.P. (2022). OUTOPIA: Private User Discovery on the Internet. In proceedings of the 15th European Workshop on Systems Security (EuroSec 2022), Rennes, France, April 2022. (pdf).
- Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2021). Do partner apps offer the same level of privacy protection? The case of wearable applications.. Proceedings of the 7th Workshop on Sensing Systems and Applications using Wrist Worn Smart Devices (WristSense), Kassel, Germany, March 2021.
- Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2019). Is Privacy possible without Anonymity? The case for microblogging services. In proceedings of the 12th European Workshop on Systems Security (EuroSec), Dresden, Germany, March 2019. (pdf).
- Tzagarakis, G., Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). 0pass: Zero-storage Password Management Based on Password Reminders. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
- Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
- Kornilakis, A., Papadopoulos, P., & Markatos, E.P. (2018). Incognitus: Privacy-Preserving User Interests in Online Social Networks. Proceedings of the International Workshop on Information and Operational Technology Security Systems (IOSec 2018), Heraklion, Crete, Greece, September 2018.
- Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2016). DCSP: Performant Certificate Revocation a DNS-based approach. Proceedings of the 9th European Workshop on Systems Security (EuroSec), London, UK, April 2016. (pdf).
- Kontaxis, G., Antoniades, D., Polakis, I., & Markatos, E.P. (2011). An Empirical Study on the Security of Cross-Domain Policies in Rich Internet Applications. In Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
- Tzermias, Z., Sykiotakis, G., Polychronakis, M., & Markatos, E.P. (2011). Combining Static and Dynamic Analysis for the Detection of Malicious Documents. In Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
- Kontaxis, G., Polakis, I., Polychronakis, M., & Markatos, E.P. (2011). dead.drop: URL-based Stealthy Messaging. In Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Gothenburg, Sweden, September 2011. (pdf).
- Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos, E.P. (2011). Detecting Social Network Profile Cloning. In Workshop Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications, Seattle, WA, USA, March 2011. (pdf).
- Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). Hunting Cross-Site Scripting Attacks in the Network. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, California, May 2010. (pdf).
- Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). Improving the accuracy of network intrusion detection systems under load using selective packet discarding. Proceedings of the Third European Workshop on System Security, Paris, France, (pp. 15-21). New York, NY, USA: ACM (978-1-4503-0059-9), (pdf).
- Krithinakis, A., Athanasopoulos, E., & Markatos, E.P. (2010). Isolating javaScript in dynamic code environments. 2010 Workshop on the Analysis and Programming Languages for Web Applications and Cloud Applications, APLWACA 2010, Toronto, ON, June 6 (pp. 45-49). (9781605589138 (ISBN)), (pdf).
- Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., & Markatos, E.P. (2010). Using social networks to harvest email addresses. 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS '10, Chicago, IL, October 4-8 (pp. 11-20). (15437221; 9781450300964 (ISBN)), (pdf).
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). An Empirical Study of Real-world Polymorphic Code Injection Attacks. 2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET '09), Boston, MA, USA, April. (pdf).
- Athanasopoulos, E., Pappas, V., & Markatos, E.P. (2009). Code-Injection Attacks in Browsers Supporting Policies. In Proceedings of the Third Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, CA, USA, May. (pdf).
- Markatos, E.P. (1996). Issues in Reliable Network Memory Paging. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
- Markatos, E.P. (1996). Using Remote Memory to avoid Disk Thrashing:A Simulation Study. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
- Markatos, E.P., & Dramitinos, G. (1995). Adding Flexibility to a Remote Memory Pager. In Fourth International Workshop on Object Orientation in Operating Systems, IWOOOS 96, Lund, Sweden, August 1995 (pp. 183-186). (pdf).
- Markatos, E.P., Katevenis, M.G.H., Kalokairinos, G., & Serpanos, D.N. (1995). An Efficient Processor-Network Interface for Local Area Multiprocessors. In Proceedings of the SCIzzL Workshop on LocalArea MultiProcessors, Heraklion, Crete, Greece, October 1995 (pp. 23-32). (pdf).
Posters
- Polakis, I., Kontaxis, G., Ioannidis, S., & Markatos, E.P. (2011). Dynamic Monitoring of Dark IP Address Space. In Proceedings of the COST TMA International Workshop on Traffic Monitoring and Analysis (TMA), Vienna, Austria, April 2011. (pdf).
Books (12)
Whole Book
- Markatos, E.P., & Balzarotti , D. (2013). The Red Book: A Roadmap for Systems Security Research. The SysSec Consortium. August 2013.
- Kruegel, Ch., Almgren, M., Bos, H., Dimitrov, K., Djambazova, E., Ioannidis, S., Jonsson, E., Kirda, E., & Markatos, E.P. (2010). Forward White Book: Emerging ICT Threats. The FORWARD Consortium. January 2010.
Editor
- Bos, H., & Markatos, E.P. (2008). Proceedings of the 1st European Workshop on System Security : March 31, 2008, Glascow, United Kingdom. New York, N.Y.: ACM Press, (ISBN 9781605581194 1605581194).
- Leitold, H., & Markatos, E.P. (2006). Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings. Communications and Multimedia Security; Lecture Notes in Computer Science. Vol. 4237 Springer, (ISBN 3-540-47820-5).
Chapters (in book)
- Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2008). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. Achievements in European Research on grid systems. (pp. 1 - 12), Springer.
- Papadakis, H., Fragopoulou, P., Markatos, E.P., Athanasopoulos, E., Dikaiakos D., M., & Labrinidis, A. (2007). A feedback-based approach to reduce duplicate messages in unstructured peer-to-peer networks. Integrated Research in GRID Computing. January 2007 (pp. 103 - 118), Springer, Boston, MA.
- Papadakis, H., Fragopoulou, P., Markatos, E.P., Athanasopoulos, E., Dikaiakos, M., & Labrinidis, A. (2007). A Feedback-based Approach to reduce Duplicate Messages in Unstructured Peer-to-Peer Systems. Integrated research in Grid Computing. (pp. 103 - 118), Springer, (pdf).
- Danalis, A., & Markatos, E.P. (2001). Web Caching: A Survey. Enterprise Networking: Multilayer Switching and Applications. .
- Markatos, E.P., & Leblanc, Th.J. (1999). Multiprogramming and Multiprocessing. Wiley Encyclopedia of Electrical and Electronics Engineering. .
- Flouris, M.D., & Markatos, E.P. (1999). Network RA, in High Performance Cluster Computing: Architectures and Systems. High Performance Cluster Computing. Vol. 1, Architectures and Systems (pp. 383 - 408), Upper Saddle River, NJ: Prentice Hall PTR.
- Markatos, E.P., & Leblanc, Th.J. (1996). Locality-Based Scheduling in Shared-Memory Multiprocessors. In Parallel Computing: Paradigms and Applications. (8) (pp. 237 - 276), International Thomoson Computer Press, (ISBN 1-85032188-4).
- Markatos, E.P. (1994). How Architecture Evolution Influences the Scheduling Discipline used in Shared-Memory Multiprocessors. Parallel Computing: Trends and Applications, PARCO '93. (pp. 627 - 630), Grenoble, France: Elsevier.
Periodicals (70)
Journal Articles
- Marchioro, T., Kazlouski, A., & Markatos, E.P. (2022). How to Publish Wearables’ Data: Practical Guidelines to Protect User Privacy. Studies in Health Technology and Informatics, 294, 949-950, (pdf).
- Pachilakis, M, Papadopoulos, P., Laoutaris, N., Markatos, E.P., & Kourtellis, N. (2021). YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy. ACM on Measurement and Analysis of Computing Systems, 5(3), 1-26, (pdf).
- Paschalides, D., Christodoulou, C., Orphanou, K., Andreou, R., Kornilakis, A., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2021). Check-It: A plugin for detecting fake news on the web. Online Social Networks and Media, 25.
- Fischer-Hübner, S., Alcaraz, C., Ferreira, A., Fernandez-Gago, C., Lopez, J., Markatos, E.P., Islami, L., & Akil, M. (2021). Stakeholder perspectives and requirements on cybersecurity in Europe. Journal of Information Security and Applications, 61.
- Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2020). Do you know who is talking to your wearable smartband?. EFMI-STC 2020 , 275, 142-146, ( 10.3233/SHTI200711), (pdf).
- Pachilakis, M, Chariton, A. A. , Papadopoulos, P., Ilia, P., Degkleri, E., & Markatos, E.P. (2020). Design and Implementation of a Compressed Certificate Status Protocol. ACM Transactions on Internet Technology, 20(4), 1-25.
- Paschalides, D., Stephanidis, D., Andreou, A., Orphanou, K., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2020). MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech. ACM Transactions on Internet Technology, 20(2).
- Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2017). Measurement, Modeling, and Analysis of the Mobile App Ecosystem. ACM Transactions on on Modeling and Performance Evaluation of Computing Systems (ACM TOPECS), 2(2), 1-33.
- Tsikoudis, N., Papadogiannakis, A., & Markatos, E.P. (2016). LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System. IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber Security, 4(1), 142-155.
- Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2014). Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. IEEE Journal of Selected Areas in Comunications (JSAC), 32(10), 1849-1863.
- Tsikoudis, N., Papadogiannakis, A., & Markatos, E.P. (2014). LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System.. IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber Security, PP(99), 1-1.
- Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2014). Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Deep Packet Inspection: Algorithms, Hardware, and Applications, 32(10), 1-15, (pdf).
- Papadakis, H., Fragopoulou, P., Markatos, E.P., & Roussopoulos, M. (2013). ITA: Innocuous Topology Awareness for Unstructured P2P Networks. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1589-1601.
- Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2012). Minimizing information disclosure to third parties in social login platforms. In International Journal of Information Security (IJIS), 11(5), 321-332.
- Papadogiannakis, A., Vasiliadis, G., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2012). Improving the Performance of Passive Network Monitoring Applications with Memory Locality Enhancements. In Computer Communications Journal (COMCOM)(available from Science Direct), 35(1), 129-140, (pdf).
- Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2012). ITA: Innocuous Topology Awareness for Unstructured P2P Networks. Transactions on Parallel and Distributed Systems.
- Makridakis, A., Athanasopoulos, E., Antonatos, S., Antoniades, D., Ioannidis, S., & Markatos, E.P. (2010). Designing malicious applications in social networks. IEEE Network Special Issue on Online Social Networks, (pdf).
- Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Polychronakis, M., Keromytis, A.D., & Markatos, E.P. (2010). Shadow Honeypots. In International Journal of Computer and Network Security (IJCNS), 2(9), 1-16, (pdf).
- Makridakis, A., Athanasopoulos, E., Antonatos, S., Antoniades, D., Ioannidis, S., & Markatos, E.P. (2010). Understanding the behavior of malicious applications in social networks. In IEEE Network. (available from IEEE Xplore) , 24(5), 14-19, (08908044).
- Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2009). Hash-Based Overlay Partitioning in Unstructured Peer-to-Peer Systems. In Parallel Processing Letters, (available from World Scientific) , 19(1), 57-71, (0129-6264).
- Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2007). Defending against hitlist worms using network address space randomization. In Computer Networks, 51(12), 3471-3490, (1389-1286), (pdf).
- Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2007). Failure Management in Grids: the Case of the EGEE Infrastructure. In Parallel Processing Letters, (available from World Scientific), 17(4), 391-410.
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Network-level polymorphic shellcode detection using emulation. Journal in Computer Virology, 2(4), 257-274, (pdf).
- Xinidis, K., Charitakis, I., Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2006). An active splitter architecture for intrusion detection and prevention. IEEE Trans.Dependable Secure Comput., 3(1), 31-44, (15455971), (pdf).
- Markatos, E.P., Papachristos, Ch., & Dramitinos, G. (2002). Web-based Infrastructure for Tourism Information Systems. Informatics and Telematics, Elsevier Science (ISSN: 0736-5853).
- Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2002). Web-conscious storage management for Web proxies. IEEE/ACM Transactions on Networking, 10(6), 735-748, (1063-6692).
- Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2002). Web-Conscious Storage Management for Web Proxies. In IEEE/ACM Transactions on Networking, (available from IEEE Xplore), 10(6), 735-748.
- Markatos, E.P. (2001). On Caching Search Engine Query Results. In Computer Communications,Elsevier Science, 137-143, (pdf).
- Ioannidis, S., Papathanasiou, A E., Magklis, G.I., Markatos, E.P., Pnevmatikatos, D., & Sevaslidou, J.E. (2001). On using reliable network RAM in networks of workstations. , 109-120, Commack, NY, USA: Nova Science Publishers, Inc (1-59033-113-3).
- Dramitinos, G., & Markatos, E.P. (1999). Adaptive and Reliable Paging to Remote Main Memory. J.Parallel Distrib.Comput., 58(3), 357-388, (07437315).
- Dramitinos, G., & Markatos, E.P. (1999). Adaptive and Reliable Paging to Remote Main Memory. In Journal of Parallel and Distributed Computing (available from Science Direct), 58(3), 357-388.
- Pnevmatikatos, D., Markatos, E.P., Magklis, G.I., & Ioannidis, S. (1999). On using network RAM as a non-volatile buffer. Cluster Computing, 2(4), 295-303,.
- Pnevmatikatos, D., Markatos, E.P., Maglis, Gr., & Ioannidis, S. (1999). On Using Network RAM as a non-volatile Buffer. In Cluster Computing Journal on Networks, Software, and Applications, Baltzer Science Publishers. (available from Springer Link) , 2(4), 295-303.
- Ioannidis, S., Papathanasiou, A E., Magklis, G.I., Markatos, E.P., Pnevmatikatos, D., & Sevaslidou, J.E. (1999). On Using Reliable Network RAM in Networks of Workstations. Parallel and Distributed Computing Practices, 2(2), (1097-2803).
- Ioannidis, S., Papathanasiou, A E., Maglis, Gr., Pnevmatikatos, D., Markatos, E.P., & Sevaslidou, J.E. (1999). On Using Reliable Network RAM in Networks of Workstations. In Parallel and Distributed Computing Practices, Special Issue on High Performance Computing on Clusters, Nova Science Publishers, USA, accepted for publication. (available from SCPE).
- Katevenis, M.G.H., Markatos, E.P., Vatsolaki, P., & Xanthaki, Ch. (1999). Remote Enqueue Operation on Networks of Workstations. Informatica - An International Journal of Computing and Informatics, 23(1), 29-39, (03505596).
- Flouris, M.D., & Markatos, E.P. (1999). The Network RamDisk: Using remote memory on heterogeneous NOWs. Cluster Computing, 2(4), 281-293.
- Flouris, M.D., & Markatos, E.P. (1999). The Network RamDisk: using remote memory on heterogeneous NOWs. In Cluster Computing Journal on Networks, Software, and Applications, Baltzer Science Publishers. (available from Springer Link) , 2(4), 281-293.
- Papathanasiou, A E., Papadakakis, N., & Markatos, E.P. (1999). Visualizing Traffic on the World Wide Web. WebNet Journal: Internet Technologies, Applications & Issues, 1(2), 57-65, Charlottesville, VA: AACE (1522-192X).
- Markatos, E.P., Papathanasiou, A E., & Papadakakis, N. (1999). Visualizing Traffic on the World Wide Web. In WebNet Journal: Internet Technologies, Applications and Issues (available from Ed/ITLib), 1(2), 57-65.
- Markatos, E.P., & Chronaki, C. (1998). A TOP-10 approach to prefetching on Web. Proceedings of INET"98.
- Katevenis, M.G.H., Markatos, E.P., Kalokairinos, G., & Dollas, A. (1997). Telegraphos: a substrate for high-performance computing on workstation clusters. Journal of Parallel and Distributed Computing, 43(2), 94-108, (0743-7315).
- Houstis, C.E., Kapidakis, S., Markatos, E.P., & Gelenbe, E. (1997). Execution of Compute Intensive Applications into Parallel Machines. In Information Sciences, special issue on load balancing in distributed systems, Elsevier Science. (available from Science Direct) , 97(1-2), 83-124.
- Houstis, C.E., Kapidakis, S., Markatos, E.P., & Gelenbe, E. (1997). Execution of compute-intensive applications into parallel machines. Information Sciences, 97(1-2), 83-124, (0020-0255).
- Markatos, E.P. (1997). VISUALIZING WORKING SETS. Operating systems review., 31(4), 3, New York, N.Y.: ACM Special Interest Group on Operating Systems] (0163-5980).
- Markatos, E.P. (1996). Main memory caching of Web documents. Computer Networks and ISDN Systems, 28(7-11), 893-905, (0169-7552).
- Markatos, E.P. (1996). Main Memory Caching of Web Documents. In Computer Networks and ISDN Systems. Also appeared in Proceedings of the Fifth International World Wide Web Conference, Paris, France, May 1996, 28(7-11), 893-906.
- Markatos, E.P., & Leblanc, Th.J. (1994). Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors. In IEEE Transactions on Parallel and Distributed Processing,, 5(4), 379-400, (pdf).
- Markatos, E.P., & Chronaki, C. (1994). Trace-Driven Simulation of Data-Alignment and Ohter Factors Affecting Update and Invalidate Based Coherent Memory. , 44-51,, IEEE Computer Society (0-8186-5292-6).
Magazine article
- Ioannidis, S., Markatos, E.P., Kirda, E., & Kruegel, Ch. (2009). Drivers of Emerging and Future Threats in ICT Infrastructures . , 5(3), http://www.ics.forth.gr/dcs/Activities/forward-enisa-quarterly-2009.3.pdf.
- Markatos, E.P., & Anagnostakis, K.G. (2008). NoAH: A European Network of Affined Honeypots for cyber-attack Tracking and Alerting. , (262).
- Antonatos, S., Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@Home: Παγιδεύοντας τις επιθέσεις από το διαδίκτυο. The Economist (Kathimerini), 9.
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). LOBSTER: Ανίχνευση επιθέσεων στο διαδίκτυο. The Economist (Kathimerini), 9.
- Markatos, E.P., Anagnostakis, K.G., Antonatos, S., & Polychronakis, M. (2007). Real-time Monitoring and Detection of Cyberattacks. , 3(1), http://www.ics.forth.gr/_pdf/brochures/noah-lobster-enisa-quarterly-2007.1.pdf.
- Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2007). Ανάπτυξη ασφαλών οπτικών δικτύων. The Economist (Kathimerini), 9.
- Markatos, E.P., Antonatos, S., & Anagnostakis, K.G. (2006). Discovering Hackers, with a honeypot as bait. , http://www.ics.forth.gr/_pdf/brochures/naftemporiki_Dec2006.2.pdf.
- Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2006). Μία Ευρωπαϊκή Πλατφόρμα ανίχνευσης & αναχαίτισης ηλεκτρονικών επιθέσεων στο Διαδίκτυο. The Economist (Kathimerini), 4, 89.
ERCIM News
- Dikaiakos D., M., Pallis, G., & Markatos, E.P. (2016). Mandola: Monitoring and Detecting Online Hate Speech. ERCIM NEWS , (107), 49-50, October 2016.
- Markatos, E.P., Versinskiene, E., & Bruze, E. (2016). SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, training, and Education. ERCIM NEWS , (106), 48-48, July 2016.
- Maggi, F, Zanero, S., & Markatos, E.P. (2015). European Cyber-Security Research and Innovation. ERCIM NEWS, (100), 43-43, January 2015.
- Zanero, S., Ioannidis, S., & Markatos, E.P. (2012). i-Code: Real-Time Malicious Code Identification. ERCIM News, 90, 19-20, July.
- Markatos, E.P., & Bos, H. (2012). SysSec: Managing Theats and Vulnerabilities in the Future Internet. ERCIM News, 90, 13-14, July.
- Ioannidis, S., Markatos, E.P., & Kruegel, Ch. (2009). On looking FORWARD. ERCIM News, 76, January 2009.
- Anagnostakis, K.G., & Markatos, E.P. (2005). Towards a European Malware Containment Infrastructure. ERCIM News, 63, 16-17, October 2005.
- Bilas, A., & Markatos, E.P. (2003). Wearable Systems for Everyday Use. ERCIM News, 52, 15-16, January 2003.
- Markatos, E.P. (2001). ServerGrids: Available and Scalable Global Computing Platforms. ERCIM News, 45, April 2001.
- Markatos, E.P., & Papathanasiou, A E. (1999). Monitoring and Displaying Traffic on the World Wide Web. ERCIM News, 37, April 1999.
- Markatos, E.P. (1998). TeachWEB - Novel Learning Approaches using the World-Wide Web. ERCIM News, 33, April 1998.
- Markatos, E.P., & Chronaki, C. (1996). Caching, Prefetching and Coherence in the World Wide Web. ERCIM News, 25, April 1996.
- Nikolaou, Ch., Saridakis, T., & Markatos, E.P. (1995). ArrayTracer. ERCIM News, 23, April 1995.
Talks (20)
Invited Talks
- Markatos, E.P. (2012). Future Research on Systems Security. At FIA Roadmapping Workshop, June, Brussels, Belgium.
- Markatos, E.P. (2012). Managing Threats and Vulnerabilities in the Future Internet. At Joint EDA EC Workshop, October, Brussels, Belgium.
- Markatos, E.P. (2012). Managing Threats and Vulnerabilities in the Future Internet. At Cyber Security & Privacy EU Forum 2012, April, Berlin, Germany.
- Markatos, E.P. (2012). Privacy-Preserving Social Plugins. Invited talk at Boston University, June, Boston, MA, USA.
- Markatos, E.P. (2012). Privacy-Preserving Social Plugins. Invited talk at University of Miami, June, Miami, FL, USA.
- Markatos, E.P. (2012). Real-world Polymorphic Attack Detection. Invited talk at T-Labs, TU-Berlin, April, Berlin, Germany.
- Markatos, E.P. (2012). Real-world Polymorphic attack Detection. Invited talk at Imperial College, March, London, United Kingdom.
- Markatos, E.P. (2012). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms. Invited talk at Cambridge Systems Workshop, March, Cambridge, United Kingdom.
- Markatos, E.P. (2011). Detecting Polymorphic Cyberattacks. At "Network and Information Security: Research Ideas" workshop. Organized by Trust and Security Unit, DG INFSO, September, Brussels, Belgium.
- Markatos, E.P. (2011). Future Research Needs and Trends in Trustworthy ICT. At Information Day on ICT FP7 Call on Trustworthy ICT. Organized by the European Commission, September, Brussels, Belgium.
- Markatos, E.P. (2011). Privacy and Social Networks. At "Privacy Protection and ICT: Research Ideas" workshop. Organized by Trust and Security Unit, DG INFSO, September, Brussels, Belgium.
- Markatos, E.P., & Polychronakis, M. (2011). Real-world Polymorphic Attack Detection. Invited talk at University of Cyprus, November, Nicosia, Cyprus.
- Markatos, E.P., & Polychronakis, M. (2011). Real-world Polymorphic Attack Detection. At ASPLOS 2012 Program Committee mini-symposium, October, Rochester, NY, USA.
- Markatos, E.P. (2011). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. Invited talk at Northeastern University, July, Boston, MA, USA.
- Markatos, E.P. (2011). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At Effectsplus clustering meeting, July, Amsterdam, The Netherlands.
- Markatos, E.P. (2010). Collaboration in Systems Security. At Inco-Trust networking session in ICT 2010, September, Brussels, Belgium.
- Markatos, E.P. (2010). Managing Threats and Vulnerabilities in the Future Internet. At "WebScienceNet " meeting, December, Patras, Greece.
- Markatos, E.P. (2010). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At "Open Doors FORTH-ICS ", October, Heraklion, Greece.
- Markatos, E.P. (2010). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At Effectsplus networking session in ICT 2010, September, Brussels, Belgium.
- Markatos, E.P. (2010). Threats and Vulnerabilities in the Future Internet: The SysSec project. At Effectsplus 1st technical cluster meeting, March, Brussels, Belgium.
Technical & Research Reports (50)
ICS-FORTH Technical Reports
- Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2009). Digital is Calling the Analog : Robust Prevention of Dial Attacks. (2009.TR399_Robust_Prevention_Dial_Attacks.pdf).
- Athanasopoulos, E., Pappas, V., Ligouras, S., & Markatos, E.P. (2009). JS : Lightweight Cross-Site Scripting Prevention Using Isolation Operators. (2009.TR400_Lightweight_Cross-Site_Scripting.pdf).
- Anagnostakis, K.G., Antonatos, S., & Markatos, E.P. (2006). Honey@home: A New Approach to Large-Scale Threat Monitoring. (2006.TR378_Large-Scale_Threat_Monitoring.pdf).
- Athanasopoulos, E., & Markatos, E.P. (2006). Misusing Unstructured P2P Systems to Perform DoS Attacks:The Network that Never Forgets. (2006.TR370_Misusing_Unstructured_P2P_Systems.pdf).
- Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation. (2006.TR368_Network_Level_Polymorphic_Shellcode_Detection.pdf).
- Anagnostakis, K.G., Antonatos, S., Akritidis, P., & Markatos, E.P. (2005). Defending against Hitlist Worms using Network Address Space Randomization. (2005.TR349_Network_Address_Space_Randomization_Against_Worms.pdf).
- Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow Honeypots. (2005.TR348_Targeted_Attacks_Shadow_Honeypots.pdf).
- Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2004). A Network-Processor-Based Traffic Splitter for Intrusion Detection. (2004.TR342_Network_Processor_Traffic_Splitter_Intrusion_Detection.pdf).
- Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Traffic Splitter Architecture for Intrusion Detection. (2003.TR323.Active_Traffic_Splitter.pdf).
- Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2002). Benchmarking and Design of String Matching Intrusion Detection Systems. (2002.TR315.benchmarking_ids.ps.gz).
- Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2002, December 2002). Benchmarking and Design of String Matching Intrusion Detection Systems. Technical Report 315. December 2002.
- Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2002). E2 XB: A Domain-Specific String Matching Algorithm for Intrusion Detection. (2002.TR311.Domain_String_Matching_Algorithm_Intrusion_Detection.ps.gz).
- Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2002, October 2002). E2 XB: A Domain-Specific String Matching Algorithm for Intrusion Detection. Technical Report 311. October 2002.
- Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002). Exclusion-based signature matching for intrusion detection. (2002.TR310.String_Matching_for_Intrusion_Detection.ps.gz).
- Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002, October 2002). Exclusion-based signature matching for intrusion detection. (2002.TR310.String_Matching_for_Intrusion_Detection.pdf).
- Portokalidis, G., Markatos, E.P., & Marazakis, M. (2002). Study and Bridging of Peer-to-Peer File Sharing Systems. (2002.TR312.Bridging_Peer-to-Peer_File_Sharing_Systems.pdf.gz).
- Portokalidis, G., Markatos, E.P., & Marazakis, M. (2002, October 2002). Study and Bridging of Peer-to-Peer File Sharing Systems. (2002.TR312.Bridging_Peer-to-Peer_File_Sharing_Systems.pdf).
- Markatos, E.P. (2001). Speeding up TCP / IP : Faster Processors are not Enough. (2001.TR297.SpeedingUp_TCP_IP_faster_processors.ps.gz).
- Markatos, E.P. (2001). Tracing a large-scale Peer to Peer System: an hour in the life of Gnutella. (2001.TR298.Tracing_Peer_to_Peer_System.ps.gz).
- Markatos, E.P. (2001). Tracing a large-scale Peer to Peer System:an hour in the life of Gnutella. (2001.TR298.Tracing_Peer_to_Peer_System.pdf).
- Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2000). Web-Conscious Storage Management for Web Proxies. (2000.TR275.Web-Conscious_Storage_Management_Web-Proxies.ps.gz).
- Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2000, October 2000). Web-Conscious Storage Management for Web Proxies. (2000.TR275.Web_Conscious_Storage_Management_Web_Proxies.pdf).
- Dollas, A., Papadimitriou, K., Mathioudakis, C., Markatos, E.P., & Katevenis, M.G.H. (1999). Experimental ATM Network Interface Performance Evaluation. (1999.TR244.ATM_if_perf.ps.gz).
- Markatos, E.P. (1998). A Cash-based Approach to Caching Web Documents. (1998.TR230.cash_based_caching.ps.gz).
- Papathanasiou, A E., & Markatos, E.P. (1998). Lightweight Transactions on Networks of Workstations. (1998.ICDCS.ps.gz).
- Ioannidis, S., Markatos, E.P., & Sevaslidou, J.E. (1998). On Using Network Memory to Improve the Performance of Transaction -Based Systems. (1998.PDTA.RVM_EXODUS.ps.gz).
- Pnevmatikatos, D., Markatos, E.P., Magklis, G.I., & Ioannidis, S. (1998). On Using Network RAM as a non-volatile Buffer. (1998.TR227.NVRAM.ps.gz).
- Flouris, M.D., & Markatos, E.P. (1998). The Network RamDisk : Using Remote Memory on Heterogeneous NOWs. (1998.TR226.nrd_TR.ps.gz).
- Markatos, E.P., Katevenis, M.G.H., & Vatsolaki, P. (1998). The Remote Enqueue Operation on Networks of Workstations. (1998.CANPC98.REQ.ps.gz).
- Katevenis, M.G.H., Vatsolaki, P., Serpanos, D.N., & Markatos, E.P. (1997). ATLAS I: A Single-chip ATM switch for NOWs. (1997.CANPC97.ATLAS.ps.gz).
- Markatos, E.P., Katevenis, M.G.H., Kalokairinos, G., Magklis, G.I., Milolidakis, G., & Oikonomou, Th. (1997). Issues in the Design and Implementation of User-Level DMA. (1997.TR182.UDMA.ps.gz).
- Papathanasiou, A E., & Markatos, E.P. (1997). Lightweight Transactions on Networks of Workstations. (1997.TR209.Lightweight_Transactions_on_NOWs.ps.gz).
- Katevenis, M.G.H., Serpanos, D.N., & Markatos, E.P. (1997). Multi-Queue Management and Scheduling for Improved QoS in Communication Networks. (1997.EMMSEC.Muqpro.ps.gz).
- Ioannidis, S., Markatos, E.P., & Sevaslidou, J.E. (1997). On using Network Memory to Improve the Performance of Transaction-Based Systems. (1997.TR190.Remote_memory_RVM.ps.gz).
- Markatos, E.P. (1997). Tracing a large-scale Peer to Peer System: an hour in the life of Gnutella.
- Markatos, E.P., & Katevenis, M.G.H. (1997). User-Level DMA without Operating System Kernel Modification. (1997.HPCA97.user_level_dma.ps.gz).
- Markatos, E.P. (1997). Visualizing Working Sets. (1997.TR192.Visualizing_working_sets.ps.gz).
- Markatos, E.P., & Chronaki, C. (1996). A Top-10 Approach to Prefetching on the Web. (1996.TR173.Web_Prefetching.ps.gz).
- Nikolaou, Ch., Markatos, E.P., Karavassili, M., & Saridakis, T. (1996). ArrayTracer: A Parallel Performance Analysis Tool. (1996.TR162.ArrayTracer_A_Parallel_Performance_Analysis_Tool.ps.gz).
- Markatos, E.P., & Dramitinos, G. (1996). Implementation of a Reliable Remote Memory Pager. (1996.usenix.ps.gz).
- Markatos, E.P. (1996). Issues in Reliable Network Memory Paging. (1996.MASCOTS96.Reliable_Network_Memory.ps.gz).
- Markatos, E.P., & Katevenis, M.G.H. (1996). Telegraphos :High-Performance Networking for Parallel Processing on Workstation Clusters.. (1996.HPCA96.Telegraphos.ps.gz).
- Markatos, E.P. (1996). Using Remote Memory to avoid Disk Thrashing: A Simulation Study. (1996.MASCOTS96.Remote_memory_paging.ps.gz).
- Georgiannakis, G., Houstis, C.E., Kapidakis, S., Karavassili, M., Nikolaou, Ch., Labrinidis, A., Marazakis, M., Markatos, E.P., Mavronicolas, M., Chabridon, S., Gelenbe, E., Born, E., Richter, L., & Riedl, R. (1995). DESCRIPTION OF THE ADAPTIVE RESOURCE MANAGEMENT PROBLEM, COST FUNCTIONS AND PERFORMANCE OBJECTIVES. (1995.TR130.LYDIA.D1.ps.gz).
- Markatos, E.P., Dramitinos, G., & Papachristos, K. (1995). Implementation and Evaluation of a Remote Memory Pager. (1995.TR129.remote_memory_paging.ps.gz).
- Markatos, E.P., & Chronaki, C. (1994). Using reference counters in Update Based Coherent Memory. (1994.PARLE94.Reference_Counters.ps.Z).
- Markatos, E.P. (1993). How Architecture Evolution Influences the Scheduling Discipline used in Shared-Memory Multiprocessors. (1993.PARCO93.Architecture_infuence_on_Scheduling.ps.Z).
- Markatos, E.P., & Leblanc, Th.J. (1993). Locality-Based Scheduling in Shared-Memory Multiprocessors. (1993.TR94.Locality_Based_Scheduling.ps.Z).
- Markatos, E.P., & Chronaki, C. (1993). Trace-Driven Simulation of Data-Alignment and other Factors affecting Update and Invalidate Based Coherent Memory. (1993.TR93.DATA_ALIGNMENT_IN_VIRTUAL_SHARED_MEMORY.ps.Z).
- Markatos, E.P., & LeBlanc, T.J. (1993). Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors. (1993.TPDS.Affinity_Loop_Scheduling.ps.Z).
Other (3)
Professional
- Polychronakis, M., Markatos, E.P., Mitsos, Y., Gajin, S., & Muratovski, G. (2008). Real-world Polymorphic Attack Detection. 4 (2).
- Markatos, E.P., Ioannidis, S., & Kruegel, Ch. (2008). Tracing the Changing Nature of Cyber-attacks. 4 (4), http://www.ics.forth.gr/_pdf/brochures/forward-enisa-quarterly-2008.4.pdf.
- Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). On Exploiting a File Sharing System for DDoS Attacks . October, http://www.ics.forth.gr/_pdf/brochures/gnutella-ddos-enisa-quarterly-2006.3.pdf.