ITE - ΙΝΣΤΙΤΟΥΤΟ ΠΛΗΡΟΦΟΡΙΚΗΣ
ITE - ΙΝΣΤΙΤΟΥΤΟ ΠΛΗΡΟΦΟΡΙΚΗΣ
|  Publications of (DiSCS)

Publications

Publications of (DiSCS)

Conferences (224)

Papers in Proceedings (full-paper reviewed)

  1. Pachilakis, M, Papadopoulos, P., Laoutaris, N., Markatos, E.P., & Kourtellis, N. (2022). YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy. ACM SIGMETRICS, Mumbai, India, June 2022. (pdf).
  2. Marchioro, T., Giaretta, L., Markatos, E.P., & Girdzijauskas, Š. (2022).  Federated Naive Bayes under Differential Privacy19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
  3. Kazlouski, A., Marchioro, T., & Markatos, E.P. (2022).  What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
  4. Anastasiadi, E., Athanasopoulos, E., & Markatos, E.P. (2022). The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. 19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
  5. Gkolemi, M., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2022). YouTubers Not madeForKids: Detecting Channels Sharing Inappropriate Videos Targeting Children. 14th ACM Web Science Conference 2022 (WebSci 2022), Barcelona, Spain, July 2022. (pdf).
  6. Papadogiannakis, E., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2022). Leveraging Google’s Publisher-Specific IDs to Detect Website Administration. ACM Web Conference 2022, Virtual Event, Lyon France, April 2022. (pdf).
  7. Pantelakis, G., Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2022). Measuring the (Over) use of Service Workers for In-Page Push Advertising Purposes . International Conference on Passive and Active Network Measurement (PAM 2022), Online, March 2022 (pp. 426-438). (pdf).
  8. Karagounis, D., Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2021). A Hardware Implementation of BitSurfing for Communication without Packet CreationProceedings of the Eight Annual ACM International Conference on Nanoscale Computing and Communication, Online, Semptember 2021.
  9. Deyannis , D., Karnikis, D., Vasiliadis, G., & Ioannidis, S. (2021). Andromeda: Enabling Secure Enclaves for the Android Ecosystem. Proceedings of the International Conference on Information Security, Online, November 2021. (pdf).
  10. Diamantaris, M., Moustakas, S., Sun, L., Ioannidis, S., & Polakis, I. (2021). This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data ExfiltrationProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021.
  11. Hatzivasilis, G., & al,  (2021). The THREAT-ARREST Cyber Range Platform2021 IEEE International Conference on Cyber Security and Resilience (CSR), Online, July 2021.
  12. Marchioro, T., Kazlouski, A., & Markatos, E.P. (2021). User Identification from Time Series of Fitness Data18th International Conference on Security and Cryptography (SECRYPT 2021), Online, July 2021.
  13. Chalkiadakis, M., Kornilakis, A., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2021). The Rise and Fall of Fake News sites: A Traffic Analysis. Proceedings of the 13th ACM Web Science Conference (WebSci 2021), Online, June 2021 (pp. 168-177). (pdf).
  14. Giaretta, L., Savvidis, I., Marchioro, T., Girdzijauskas, Š., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2021). PDS^2: A user-centered decentralized marketplace for privacy preserving data processing. Proceedings of the 37th International Conference on Data Engineering Workshops (ICDEW), Online, April 2021 (pp. 92-99). (pdf).
  15. Papadogiannakis, E., Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2021). User tracking in the post-cookie era: How websites bypass gdpr consent to track users. Proceedings of the 30th Web Conference 2021, Online, April 2021. (pdf).
  16. Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2021). I still See You! Inferring Fitness Data from Encrypted Traffic of Wearables14th International Joint Conference on Biomedical Engineering Systems and Technologies HEALTHINF , Vienna, Austria, February 2021 (pp. 369-376).
  17. Humphries, G., Nordvik, R., Manifavas, H., Cobley, P., & Sorell, M. (2021). Law Enforcement educational challenges for mobile forensics. Proceedings of the 1st DFRWS APAC Conference on Digital Forensics, Online, January 2021. (pdf).
  18. Bajovic, D., Bakhtiarnia, A., Bravos, G., Brutti, A., Burkhardt, F., Cauchi, D., Chazapis, A., Cianco, C., Dall’Asen, N., Delic, V., Dimou, Ch., Djokic, D., Escobar-Molero, A., Esterle, L., Eyben, F., Farella, E., Festi, Th., Geromitsos, A., Giakoumakis, G., Hatzivasilis, G., Ioannidis, S., Iosifidis, A., Kallipolitou, Th., Kalogiannis, G., Kiousi, A., Kopanaki, D., Marazakis, M., Markopoulou, S., Muscat, A., Paissan, F., Pariente Lobo, T., Pavlovic, D., Raptis, Th.P., Ricci, E., Saez, B., Sahito, F., Scerri, K., Schuller, B., Simic, N., Spanoudakis, G., Tomasi, A., Triantafyllopoulos, A., Valerio, L., Villazán, J., Wang, Y., Xuereb, A., & Zammit, J. (2021). MARVEL: Multimodal Extreme Scale Data Analytics for Smart Cities Environments. Novi Sad, Serbia, 20-22 Sept. (pp. 143-147). IEEE.
  19. Maglaras, L., Drivas, G., Chouliaras, N., Boiten, E., Lambrinoudakis, C., & Ioannidis, S. (2020). Cybersecurity in the Era of Digital Transformation: The case of Greece2020 International Conference on Internet of Things and Intelligent Applications (ITIA), Zhenjiang, China , November 2020.
  20. Drakonakis, K., Ioannidis, S., & Polakis, I. (2020). The cookie hunter: Automated black-box auditing for web authentication and authorization flaws2020 ACM SIGSAC Conference on Computer and Communications Security, Online, October 2020.
  21. Chalkiadakis, N., Deyannis , D., Karnikis, D., Vasiliadis, G., & Ioannidis, S. (2020). The Million Dollar Handshake: Secure and Attested Communications in the Cloud2020 IEEE 13th International Conference on Cloud Computing (CLOUD), Online, October 2020.
  22. Cucurull, J., Tselios, C., Rueda, C., Folch, N., Copty, F., Igbaria, R., Athanatos, M., Krithinakis, A., Ioannidis, S., Francisco-Ruiz, J., & Barrientos, P. (2020). Integration of an online voting solution with the SMESEC security framework2020 IEEE International Systems Conference (SysCon), Online, August 2020.
  23. Korniotakis, J., Papadopoulos, P., & Markatos, E.P. (2020). Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing ModesIn Proceedings of the1 7th International Conference on Security and Cryptography (SECRYPT 2020), Online, July 2020.
  24. Giakoumakis, G., Papadogiannaki, E., Vasiliadis, G., & Ioannidis, S. (2020). Pythia: Scheduling of concurrent network packet processing applications on heterogeneous devices2020 6th IEEE Conference on Network Softwarization (NetSoft), Online, June 2020.
  25. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2020). Mobility-aware Beam Steering in Metasurface-based Programmable Wireless EnvironmentsICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Online, April 2020.
  26. Deyannis , D., Papadogiannaki, E., Kalivianakis, G., Vasiliadis, G., & Ioannidis, S. (2020). Trustav: Practical and privacy preserving malware analysis in the cloud (CODASPY '21)Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, Online, March 2020.
  27. Hatzivasilis, G., & Et, al. (2019). Secure Semantic Interoperability for IoT Applications with Linked Data2019 IEEE Global Communications Conference (GLOBECOM), December 2019 (pp. 1-6).
  28. Paschalides, D., Kornilakis, A., Christodoulou, C., Andreou, R., Pallis, G., Dikaiakos, M., & Markatos, E.P. (2019). Check-It: A Plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web. IEEE/WIC/ACM International Conference on Web Intelligence, Thessaloniki, Greece, October 2019 (pp. 298-302).
  29. Pachilakis, M, Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2019). No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem. Proceedings of the 19th Internet Measurements Conference 2019 (IMC'19), Amsterdam, Netherlands, October 2019. (pdf).
  30. Liaskos, C. K., Pyrialakos, G. G, Pitilakis, A., Abadal, S., Tsioliaridou, N. A., Tasolamprou, A., Tsilipakos, O., Kantartzis, N. , Ioannidis, S., Alarcón, E., Cabellos-Aparicio, A., Kafesaki, M. , Pitsillides, A., Kossifos, K., Georgiou, J., & Akyildiz, I. (2019). ABSense: Sensing Electromagnetic Waves on Metasurfaces via Ambient Compilation of Full AbsorptionProceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication (NANOCOM '19), Dublin, Irelan, September 25 - 27, Article No.: 14 (pp. 1-6). ACM.
  31. Solomos, K., Ilia, P., Ioannidis, S., & Kourtellis, N. (2019). Talon: An Automated Framework for Cross-Device Tracking Detection. Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China, September 2019. (pdf).
  32. Papadopoulos, P., Ilia, P., & Markatos, E.P. (2019). Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking. Proceedings of 22nd Information Security Conference (ISC), New York, USA, September 2019. (pdf).
  33. Chatzimpyrros, M., Solomos, K., & Ioannidis, S. (2019). You Shall Not Register! Detecting Privacy Leaks Across Registration FormsIOSec/MSTEC/FINSEC@ ESORICS, September 2019.
  34. Tasolamprou, A., Pitilakis, A., Tsilipakos, O., Liaskos, C. K., Tsioliaridou, N. A., Liu, F., Wang, X., Mirmoosa, M., Kossifos, K., Georgiou, J., Pitsillides, A., Kantartzis, N. , Manessis, D., Ioannidis, S., Kenanakis, G., Deligeorgis, G. , Economou, N.T., Tretyakov, S., & Soukoulis, C. , Kafesaki, M.  (2019). The Software-Defined Metasurfaces Concept and Electromagnetic Aspects. Proceedings of the 10th International Conference on Metamaterials, Photonic Crystals and Plasmonics (META19), Lisbon, Portugal, July 2019.
  35. Arapakis, I., & Et, al. (2019). Towards specification of a software architecture for cross-sectoral big data applications2019 IEEE World Congress on Services (SERVICES), July 2019.
  36. Tzagkarakis, Ch., Petroulakis, N.E., & Ioannidis, S. (2019). Botnet Attack Detection at the IoT Edge Based on Sparse RepresentationGlobal IoT Summit (GIoTS 2019), Aarhus, Denmark, 17-21 June. IEEE.
  37. Marcantoni, F., Diamantaris, M., Ioannidis, S., & Polakis, I. (2019). A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks. In Proceedings of The World Wide Web Conference, San Francisco, USA, May 2019. (pdf).
  38. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2019). Cookie synchronization: Everything you always wanted to know but were afraid to ask. Proceedings of the 28th International Conference on World Wide Web, San Fransisco, USA, May 2019. (pdf).
  39. Hatzivasilis, G., Soultatos, O., Ioannidis, S., Verikoukis, C., Demetriou, G., & Tsatsoulis, C. (2019). Review of security and privacy for the Internet of Medical Things (IoMT)2019 15th international conference on distributed computing in sensor systems (DCOSS), May 2019.
  40. Hatzivasilis, G., Christodoulakis, N., Tzagkarakis, Ch., Ioannidis, S., Demetriou, G., Fysarakis, K., & Panayiotou, M. (2019). The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), May 2019.
  41. Kritikos, K., Papoutsakis, M., Ioannidis, S., & Magoutis, K. (2019). Towards configurable cloud application security2019 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), May 2019.
  42. Hatzivasilis, G., Soultatos, O., Chatziadam, P., Fysarakis, K., Askoxylakis, I., Ioannidis, S., Alaxandris, G., Katos, V., & Spanoudakis, G. (2019). WARDOG: Awareness detection watchbog for Botnet infection on the host deviceIEEE Transactions on Sustainable Computing, May 2019.
  43. Diamantaris, M., Papadopoulos, E. P. , Markatos, E.P., Ioannidis, S., & Polakis, I. (2019). REAPER: Real-time App Analysis for Augmenting the Android Permission System. Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), Dallas, TX, USA, March 2019. (pdf).
  44. Papadopoulos, P., Ilia, P., Polychronakis, M., Markatos, E.P., Ioannidis, S., & Vasiliadis, G. (2019). Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. Proceedings of the the Network and Distributed System Security Symposium (NDSS '19), San Diego, USA, February 2019. website, (pdf).
  45. Drakonakis, K., Ilia, P., Ioannidis, S., & Polakis, I. (2019). Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. In Proceedings of the Network and Distributed System Security Symposium (NDSS) , San Diego, CA, February 2019. (pdf).
  46. Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). Where’s Wally? How to Privately Discover your Friends on the Internet. In proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018), Songdo, Incheon, Korea, June 2018. (pdf).
  47. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). The Cost of Digital Advertisement: Comparing User and Advertiser Views. Proceedings of the 27th International World Wide Web Conference (WWW 2018), Lyon, France, April 2018. (pdf).
  48. Tsirantonakis, G., Ilia, P., Ioannidis, S., Athanasopoulos, E., & Polychronakis, M. (2018). A Large-scale Analysis of Content Modification by Open HTTP Proxies.. Proceedings of the Network and Distributed System Security Symposium (NDSS '18), San Diego, USA, February 2018. (pdf).
  49. Vasiliadis, G., Jakovetic, D., Spais, I., & Ioannidis, S. (2018). I-BiDaaS: Industrial-Driven Big Data as a Self-service SolutionEuropean Conference on Service-Oriented and Cloud Computing, September 2018. Springer, Cham.
  50. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2018). Realizing Wireless Communication Through Software-Defined HyperSurface EnvironmentsIEEE 19th International Symposium on 'A World of Wireless, Mobile and Multimedia Networks' (WoWMoM 2018), Chania, Greece, 12-15 June. IEEE (pdf).
  51. Pitilakis, A., Tasolamprou, A., Liaskos, C. K., Liu, F., Tsilipakos, O., Wang, X., Mirmoosa, M., Kossifos, K., Georgiou, J., Pitsillides, A., Kantartzis, N. , Ioannidis, S., Economou, E., Kafesaki, M. , Tretyakov, S., & Soukoulis, C.  (2018). Software-Defined Metasurface Paradigm: Concept, Challenges, Prospects12th International Congress on Artificial Materials for Novel Wave Phenomena (Metamaterials 2018), Espoo, Finland, 27 Aug.-1 Sept. (pp. 483-485). IEEE (pdf).
  52. Papadopoulos, P., Kourtellis, N., Rodriguez , P., & Laoutaris, N. (2017). If you are not paying for it, you are the product: How much do advertisers pay to reach you?. Proceedings of the 17th Internet Measurements Conference 2017 (IMC'17), London, UK, November 2017. (pdf).
  53. Tsioliaridou, N. A., Liaskos, C. K., Pitsillides, A., & Ioannidis, S. (2017). A Novel Protocol for Network-Controlled Metasurfaces.Proceedings of the 4nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), September 2017. Washington, DC, USA (pdf).
  54. Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E.P., & Ioannidis, S. (2017). No Sugar but all the Taste! Memory Encryption without Architectural Support. Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017), Oslo, Norway, September 2017. (pdf).
  55. Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2017). The Socket Store: An App Model for the Application-Network Interaction. Proceedings of the 22nd IEEE Symposium on Computers and Communication (ISCC 2017), Heraklion, Crete, Greece, July 2017. (pdf).
  56. Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2017). CCSP: a Compressed Certificate Status Protocol. Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '17), Atlanta, GA, USA, May 2017. (pdf).
  57. Papadopoulos, E. P. , Diamantaris, M., Papadopoulos, P., Petsas, T., Ioannidis, S., & Markatos, E.P. (2017). The Long-Standing Privacy Debate: Mobile Websites Vs Mobile Apps. Proceedings of the 26th International World Wide Web Conference, (WWW 2017), Perth, Western Australia, April 2017. (pdf).
  58. Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S. (2017). SAMPAC: Socially-Aware collaborative Multi-Party Access Control. Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), Scottsdale, USA, March 2017. (pdf).
  59. Koryzis, D., Svolopoulos, V., & Spiliotopoulos, D. (2017). Implementing Digital Parliament Innovative Concepts for Citizens and Policy Makers4th International Conference, HCIBGO 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14 (pp. 154-170). Springer (978-3-319-58480-5).
  60. Koromilas, L., Vasiliadis, G., Athanasopoulos, E., & Ioannidis, S. (2016). GRIM: Leveraging GPUs for Kernel Integrity Monitoring. Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), France, Paris, September 2016. (pdf).
  61. Papadopoulos, P., Athanasopoulos, E., Kosta, E., Siganos, G., Keromytis, A.D., & Markatos, E.P. (2016). Provable Network Activity for Protecting Users against False Accusation. Proceedings of the 10th International Conference on Information Security Theory and Practice (WISTP'2016) , Heraklion, Crete, Greece, September 2016. (pdf).
  62. Tsioliaridou, N. A., Liaskos, C. K., Dedu, E., & Ioannidis, S. (2016). Stateless Linear-path Routing for 3D Nanonetworks. Proceedings of the 3nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), New York City, New York, USA, September 2016. (pdf).
  63. Antonakaki, D., Spiliotopoulos, D., Samaras, C., Ioannidis, S., & Fragopoulou, P. (2016). Investigating the Complete Corpus of Referendum and Elections Tweets. Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2016), San Francisco, CA, USA, August 2016. (pdf).
  64. Spiliotopoulos, D., Antonakaki, D., Ioannidis, S., & Fragopoulou, P. (2016). Usability Evaluation of Accessible Complex Graphs. Proceedings of the 15th International Conference on Computers Helping People with Special Needs, Linz, Austria, July 2016. (pdf).
  65. Koryzis, D., Samaras, C., Makri, E., Svolopoulos, V., & Spiliotopoulos, D. (2016). Visual Cue Streams for Multimodal Dialogue Interaction. Proceedings of the 7th International Conference on Applied Human Factors and Ergonomics, Orlando, FL, USA, July 2016. (pdf).
  66. Koryzis, D., Svolopoulos, V., & Spiliotopoulos, D. (2016). Metalogue: A Multimodal Learning Journey. Proceedings of the 9th ACM International Conference on Pervasive Technologies Related to Assistive Environments, New York, NY, USA, June 2016. (pdf).
  67. Spiliotopoulos, D., Antonakaki, D., Ioannidis, S., & Fragopoulou, P. (2016). Motivation Effect of Social Media Posts about Well-being and Healthy Living. Proceedings of the 9th ACM International Conference on Pervasive Technologies Related to Assistive Environments. ACM, New York, NY, USA, June 2016. (pdf).
  68. Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., & Kantartzis, N. , Pitsillides, A. (2016). A Deployable Routing System for Nanonetworks. In proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia , May 2016. (pdf).
  69. Tsioliaridou, N. A., Liaskos, C. K., Pachis, L. , Ioannidis, S., & Pitsillides, A. (2016). N3: Addressing and Routing in 3D Nanonetworks. IEEE International Conference on Telecommunications (ICT), Thessaloniki, Greece, May 2016. (pdf).
  70. Christoulakis, N., Christou, G., Athanasopoulos, E., & Ioannidis, S. (2016). HCFI: Hardware-enforced Control-Flow Integrity. In proceedings of the 6th ACM Conference on Data and Applications Security and Privacy (CODASPY), New Orleans, LA, US , March 2016. (Oustanding Paper Award).
  71. Haller, I., Göktaş, E., Athanasopoulos, E., Portokalidis, G., & Bos, H. (2015). ShrinkWrap: VTable protection without loose endsIn proceedings of the 31st Annual Computer Security Applications Conference (ACSAC) , Los Angeles, CA, US, December, 2015.
  72. Ilia, P., Polakis, I., Athanasopoulos, E., & Maggi, F, Ioannidis, S. (2015). Face/Off: Preventing Privacy Leakage From Photos in Social Networks. Proceedings of the 22nd ACM/SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA, November 2015. (pdf).
  73. Tsioliaridou, N. A., Liaskos, C. K., Ioannidis, S., & Pitsillides, A. (2015). CORONA: A Coordinate and Routing system for Nanonetworks. Proceedings of the 2nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), Boston, Massachusetts, USA, September 2015. (pdf).
  74. Ladakis, E, Vasiliadis, G., Polychronakis, M., Ioannidis, S., & Portokalidis, G. (2015). GPU-Disasm: A GPU-based x86 DisassemblerIn proceedings of the 18th Information Security Conference (ISC), Trondheim, Norway, September 2015.
  75. Moffie, M., Goldsteen, A., Chen, W., Weyer, T., Ioannidis, S., & Kalogiros, C. (2015). Trust and Trustworthiness Maintenance: From Architecture to Evaluation. Proceedings of the 8th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, September 2015.
  76. Samaras, C., Tsioliaridou, N. A., Liaskos, C. K., Spiliotopoulos, D., & Ioannidis, S. (2015). Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering . Proceedings of the 8th International Conference on Trust & Trustworthy Computing (TRUST 2015), Crete, Heraklion, Greece, August 2015. (pdf).
  77. Polakis, I., Diamantaris, M., Petsas, T., & Maggi, F, Ioannidis, S. (2015). Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.In proceedings of the 12th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2015), Milano, Italy, July, 2015.
  78. Zarras, A., Papadogiannakis, A., Ioannidis, S., & Holz, Th. (2015). Revealing the Relationship Network Behind Link Spam. In Proceedings of the 13th Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 2015. (pdf).
  79. Athanasakis , M., Athanasopoulos, E., Polychronakis, M., Portokalidis, G., & Ioannidis, S. (2015). The Devil is in the Constants: Bypassing Defenses in Browser JIT EnginesProceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015), San Diego, CA, US, February 2015.
  80. Spiliotopoulos, D., Dalianis, A., & Koryzis, D. (2015). Speech Enabled Ontology Graph Navigation and Editing9th International Conference, UAHCI 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7 (pp. 487-494). Springer ( 978-3-319-20677-6).
  81. Göktaş, E., Athanasopoulos, E., Polychronakis, M., Bos, H., & Portokalidis, G. (2014). Size Does Matter - Why Using Gadget Chain Length to Prevent Code-reuse Attacks is HardProceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 2014.
  82. Lindorfer, M, Volanis, S., Sisto, A, Neugschwandtner, M, Athanasopoulos, E., Maggi, F, Platzer, C, Zanero, S., & Ioannidis, S. (2014). AndRadar: Fast Discovery of Android Applications in Alternative MarketsIn Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), London, UK, July 2014.
  83. Panagiotakis, C., Papadakis, H., & Fragopoulou, P. (2014). CoViFlowPro: a community visualization method based on a flow propagation algorithm8th International Conference on Bioinspired Information and Communications Technologies (BICT 2014), Boston, Massachusetts, December 01 - 03 (pp. 267-270 ). ACM.
  84. Koromilas, L., Vasiliadis, G., Manousakis, I., & Ioannidis, S. (2014). Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware ArchitecturesProceedings of the 10th ACM/IEEE Symposium on Architecture for Networking and Communications Systems (ANCS), Los Angeles, CA, USA, October 2014.
  85. Panagiotakis, C., Papadakis, H., & Fragopoulou, P. (2014). FlowPro: A flow propagation method for single community detectionIEEE 11th Consumer Communications and Networking Conference (CCNC 2014), Las Vegas, NV, USA, 10-13 Jan (pp. 17-22). IEEE.
  86. Deyannis , D., Koromilas, L., Vasiliadis, G., Athanasopoulos, E., & Ioannidis, S. (2014). Flying Memcache: Lessons Learned from Different Acceleration StrategiesProceedings of the 26th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), Paris, France, October, 2014.
  87. Vasiliadis, G., Koromilas, L., Polychronakis, M., & Ioannidis, S. (2014). GASPP: A GPU-Accelerated Stateful Packet Processing FrameworkIn Proceedings of the 2014 USENIX Annual Technical Conference (ATC)., Philadelphia, PA, USA, June 2014.
  88. Göktaş, E., Athanasopoulos, E., Bos, H., & Portokalidis, G. (2014). Out Of Control: Overcoming Control-Flow IntegrityIn Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, USA, May 2014.
  89. Vasiliadis, G., Athanasopoulos, E., Polychronakis, M., & Ioannidis, S. (2014). PixelVault: Using GPUs for securing cryptographic operationsProceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 2014.
  90. Stroggylos, K, Mitropoulos, D, Tzermias, Z., Papadopoulos, P., Rafailidis, F, Spinellis, D, Ioannidis, S., & Katsaros, P (2014). Securing Legacy Code with the TRACER PlatformIn Proceedings of the 18th Panhellenic Conference on Informatics (PCI 2014), Athens, Greece, October 2014.
  91. Antonakaki, D., Polakis, I., Athanasopoulos, E., Fragopoulou, P., & Ioannidis, S. (2014). Think before RT: An Experimental Study of Abusing Twitter TrendsSocial Informatics: 6th International Conference, Socinfo 2014, Lecture Notes in Computer Science , Barcelona, Spain, November 11-13 (vol. 8852, pp. 402-413). Springer.
  92. Zarras, A., Papadogiannakis, A., Gaw­lik, R., & Holz, Th. (2014). Au­to­ma­ted Ge­ne­ra­ti­on of Mo­dels for Fast and Pre­cise De­tec­tion of HTTP-Ba­sed Mal­wa­reIn Proceedings of the 12th An­nual Con­fe­rence on Pri­va­cy, Se­cu­ri­ty and Trust (PST), To­ron­to, Ca­na­da, July 2014.
  93. Polakis, I., Ilia, P., Maggi, F, Lancini, M, Kontaxis, G., Zanero, S., Ioannidis, S., & Keromytis, A.D. (2014). Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication . Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Arizona, USA, November 2014. (pdf).
  94. Tzermias, Z., Prevelakis, V., & Ioannidis, S. (2014). Privacy Risks from Public Data Sources. In Proceedings of the 29th IFIP International Information Security and Privacy Conference (SEC), , Marrakech, Morocco, June 2014. (pdf).
  95. Stroggylos, K, Mitropoulos, D, Tzermias, Z., Papadopoulos, P., Rafailidis, F, Spinellis, D, Ioannidis, S., & Katsaros, P (2014). TRACER: A Platform for Securing Legacy CodeIn Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, June 2014.
  96. Papadogiannakis, A., Loutsis, L., Papaefstathiou, V., & Ioannidis, S. (2013). ASIST: Architectural Support for Instruction Set RandomizationIn Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany , November 2013. (pdf).
  97. Panagiotakis, C., Papadakis, H., Grinias, E., Komodakis, N., Fragopoulou, P., & Tziritas, G. (2013). Interactive Image Segmentation via Graph Clustering and Synthetic Coordinates ModelingComputer Analysis of Images and Patterns : 15th International Conference, CAIP 2013, Lecture Notes in Computer Science , York, UK, August 27-29 (vol. 8047, pp. 589-596). Springer.
  98. Andriotis, P, Tzermias Zacharias, Z., Mparmpaki, A, Ioannidis, S., & Oikonomou, G. (2013). Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone DataIn International Journal of Digital Crime and Forensics (IJDCF), IGI Global, 2013 (vol. 5, pp. 34-54).
  99. Polakis, I., Volanis, S., Athanasopoulos, E., & Markatos, E.P. (2013). The man who was there: Validating check-ins in location-based servicesIn Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
  100. Panagiotakis, C., & Fragopoulou, P. (2013). Voting Clustering and Key Points SelectionComputer Analysis of Images and Patterns : 15th International Conference, CAIP 2013, Lecture Notes in Computer Science ,  York, UK, August 27-29 (vol. 8047, pp. 441-448). Springer.
  101. Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, Th., & Markatos, E.P. (2013). k-subscription: Privacy-preserving Microblogging Browsing through ObfuscationIn Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
  102. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2013). Rise of the Planet of the Apps: A Systematic Study of the Mobile App EcosystemIn Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
  103. Kondaxis, G., Athanasopoulos, E., Portokalidis, G., & Keromytis, A.D. (2013). SAuth: Protecting User Accounts from Password Database LeaksIn Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany , November 2013.
  104. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2013). Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed NetworksIn Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
  105. Gessiou, E., Volanis, S., Athanasopoulos, E., Markatos, E.P., & Ioannidis, S. (2012). Digging up social structures from documents on the webIn Proceedings of IEEE 2012 Communication and Information System Security Symposium (Globecom CISS), Anaheim, CA, USA, December 2012.
  106. Polakis, I., Lancini, M, Kondaxis, G., Maggi, F, Ioannidis, S., Keromytis, A. D., & Zanero, S. (2012). All your face are belong to us: Breaking Facebook¢s Social Authentication. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December . (pdf).
  107. Athanasopoulos, E., Kemerlis, V. P., Polychronakis, M., & Markatos, E.P. (2012). ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS'12), Singapore, June 2012. (pdf).
  108. Kontaxis, G., Polychronakis, M., Keromytis, A. D., & Markatos, E.P. (2012). Privacy-Preserving Social PluginsIn Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, August 2012.
  109. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2012). Tolerating Overload Attacks Against Packet Capturing SystemsIn Proceedings of the USENIX Annual Technical Conference (ATC)(available from usenix website ), Boston, MA, USA, June 2012. (pdf).
  110. Gessiou, E., Pappas, V., Athanasopoulos, E., Keromytis, A.D., & Ioannidis, S. (2012). Towards a Universal Data Provenance Framework using Dynamic Instrumentation. In Proceedings of the 27th IFIP International Information Security and Privacy Conference (IFIP SEC), Heraklion, Crete, Greece, June 2012. (pdf).
  111. Antoniades, D., Kontaxis, G., Athanasopoulos, E., Ioannidis, S., Markatos, E.P., & Karagiannis, Th. (2011).  we.b: The Web of Short URLsIn Proceedings of the 20th International World Wide Web Conference (WWW), Hyderabad, India, March 2011. (pdf).
  112. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2011). MIDeA: A Multi-Parallel Intrusion Detection ArchitectureIn Proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 2011. (pdf).
  113. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2011). Parallelization and Characterization of Pattern Matching using GPUs In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC), Austin, TX, USA, November 2011. (pdf).
  114. Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2011). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On PlatformsIn Proceedings of the 14th Information Security Conference (ISC), Xi'an, China, October 2011. (pdf).
  115. Markatos, E.P., Petsas, T., Polakis, I.S., & Antonatos, S. (2010). A systematic characterization of IM threats using honeypots. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 2010), Feb 2010. (pdf).
  116. Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). An architecture for enforcing JavaScript randomization in web2.0 applicationsShort paper in Proceedings of the 13th Information Security Conference (ISC 2010), Boca Raton, FL, USA, 25 October 2010 through 28 October 2010 (vol. 6531 LNCS, pp. 203-209). (03029743; 9783642181771 (ISBN)), (pdf).
  117. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2010). Comprehensive shellcode detection using runtime heuristicsProceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, (pp. 287-296). New York, NY, USA: ACM (978-1-4503-0133-6), (pdf).
  118. Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2010). D(e|i)aling with VoIP: Robust prevention of DIAL attacksIn Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece, September 20-22 (vol. 6345, pp. 663-678). (03029743; 3642154964 (ISBN); 9783642154966 (ISBN)), (pdf).
  119. Kontaxis, G., Polakis, I., & Markatos, E.P. (2010). Experiences and observations from the NoAH infrastructure6th European Conference on Computer Network Defense, EC2ND 2010, Berlin, October 28-29 (pp. 11-18). (9780769543116 (ISBN)), (pdf).
  120. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2010). GPU-assisted malware. 5th International Conference on Malicious and Unwanted Software, Malware 2010, Nancy, October 19-20 (pp. 1-6). (9781424493555 (ISBN)), (pdf).
  121. Vasiliadis, G., & Ioannidis, S. (2010). GrAVity: A massively parallel antivirus engine. In Proceedings of the 13th International Symposium On Recent Advances In Intrusion Detection (RAID), Ottawa, Canada, September 15-17 (vol. 6307 LNCS, pp. 79-96). (03029743; 3642155111 (ISBN); 9783642155116 (ISBN)), (pdf).
  122. Antoniades, D., Markatos, E.P., & Dovrolis, C. (2010). MOR: monitoring and measurements through the onion router. Proceedings of the 11th international conference on Passive and active measurement, Zurich, Switzerland, (pp. 131-140). Berlin, Heidelberg: Springer-Verlag (3-642-12333-3, 978-3-642-12333-7), (pdf).
  123. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). RRDtrace: Long-term raw network traffic recording using fixed-size storage. 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010, Miami Beach, FL, August 17-19 (pp. 101-110). (9780769541976 (ISBN)), (pdf).
  124. Danilatou, V., & Ioannidis, S. (2010). Security and Privacy Architectures for Biomedical Cloud Computing. In Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine, Corfu, Greece, November. (pdf).
  125. Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.P., & Karagiannis, Th. (2010). xJS: practical XSS prevention for web application development. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps), Boston, MA, USA, (pp. 13). Berkeley, CA, USA: USENIX Association (pdf).
  126. Antonatos, S., Locasto, M., Sidiroglou, S., Keromytis, A.D., & Markatos, E.P. (2009). Defending against next generation through network/endpoint collaboration and interactionProceedings of the 3rd European Conference on Computer Network Defense , (pp. 131-141).
  127. Antonatos, S., & Vu, Q. (2009). Harnessing the power of P2P systems for fast attack signature validation. In Proceedings of the 3rd International Conference on Network and System Security (NSS 2009), Gold Coast, Australia, 19-21 October (pp. 107-114).
  128. Chin, W.Y., Markatos, E.P., Antonatos, S., & Ioannidis, S. (2009). HoneyLab: Large-scale honeypot deployment and resource sharing. 2009 3rd International Conference on Network and System Security, NSS 2009, Gold Coast, QLD, 19 October 2009 through 21 October 2009 (pp. 381-388). (9780769538389 (ISBN)), (pdf).
  129. Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2009). Imbuing unstructured P2P systems with non-intrusive topology awareness. In Proceedings of the 9th International Conference on Peer-to-Peer Computing., Seattle, USA, 91-1 September (pp. 51-60). (pdf).
  130. Antoniades, D., Markatos, E.P., & Dovrolis, C. (2009). One-click hosting services: a file-sharing hideout. IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, Chicago, Illinois, USA, (pp. 223-234). New York, NY, USA: ACM (978-1-60558-771-4), (pdf).
  131. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). Real-world Polymorphic Attack Detection. In Proceedings of the 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA), Athens, Greece, June. (pdf).
  132. Friedl, A., Ubik, S., Kapravelos, A., Polychronakis, M., & Markatos, E.P. (2009). Realistic passive packet loss measurement for high-speed networks. 1st International Workshop on Traffic Monitoring and Analysis, TMA 2009, Aachen, 11 May 2009 through 11 May 2009 (vol. 5537 LNCS, pp. 1-7). (03029743; 9783642016448 (ISBN)), (pdf).
  133. Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E.P., & Ioannidis, S. (2009). Regular Expression Matching on Graphics Hardware for Intrusion Detection. Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25 (pp. 265-283). (pdf).
  134. Athanasopoulos, E., Krithinakis, A., Kopidakis, G., Maxwell, G., Poustie, A., Manning, B., Webb, R., Koyabe, M., & Cairano-Gilfedder, C.D. (2009). WISDOM: Security-aware fibres. 2nd European Workshop on System Security, EUROSEC '09, Nuremberg, 31 March 2009 through 31 March 2009 (pp. 22-27). (9781605584720 (ISBN)), (pdf).
  135. Forestiero, A., Mastroianni, C., Papadakis, H., Fragopoulou, P., Tretola, G., & Zimeo, E. (2008). A Scalable Architecture for Discovery and Composition in P2P Service Networks. In Proceedings of the CoreGRID Integration Workshop, Heraklion, Crete, Greece, July (pp. 97-108). USA: Springer (pdf).
  136. Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., & Markatos, E.P. (2008). Antisocial networks: Turning a social network into a botnet. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 146-160). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
  137. Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2008). Compromising anonymity using packet spinning. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 161-174). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
  138. Smaragdakis, G., Lekakis, V., Laoutaris, N., Bestavros, A., Byers, J.W., & Roussopoulos, M. (2008). EGOIST: Overlay routing using selfish neighbor selection. 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08, Madrid, 9 December 2008 through 12 December 2008. (9781605582108 (ISBN)), (pdf).
  139. Bos, H., & Markatos, E.P. (2008). European Conference on Computer Systems: Preface. 1st European Workshop on System Security, EUROSEC '08, Glasgow, 31 March 2008 through 31 March 2008. Association for Computing Machinery (9781605581194 (ISBN)).
  140. Politopoulos, P.I., Markatos, E.P., & Ioannidis, S. (2008). Evaluation of compression of remote network monitoring data streams. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, Brazil, 7 April 2008 through 11 April 2008 (pp. 109-115). (9781424420674 (ISBN)), (pdf).
  141. Bos, H., Ioannidis, S., Jonsson, E., Kirda, E., & Kruegel, Ch. (2008). Future Threats to Future Trust. In Proceedings of the Future of Trust in Computing Conference, Berlin, Germany, July 2008 (pp. 49-54). (pdf).
  142. Polychronakis, M., Mavrommatis, P., & Provos, N. (2008). Ghost turns zombie: exploring the life cycle of web-based malware. LEET '08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California, April (pp. 1-8). Berkeley, CA, USA: USENIX Association (pdf).
  143. Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., & Ioannidis, S. (2008). Gnort: High performance network intrusion detection using graphics processors. Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings, Cambridge, MA, USA, 15 September 2008 through 17 September 2008 (vol. 5230 LNCS, pp. 116-134). (03029743; 354087402X (ISBN); 9783540874027 (ISBN)), (pdf).
  144. Antonatos, S., Athanatos, M., Kondaxis, G., Velegrakis, J., Hatzibodozis, N., Ioannidis, S., & Markatos, E.P. (2008). Honey@home: A new approach to large-scale threat monitoring. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008, Amsterdam, 21 April 2008 through 22 April 2008 (pp. 3-16). (9780769533476 (ISBN)), (pdf).
  145. Antoniades, D., Trimintzios, P., Polychronakis, M., Ubik, S., Papadogiannakis, A., & Smotlacha, V.R. (2008). LOBSTER: a European platform for passive network traffic monitoring. TridentCom '08: Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities, Innsbruck, Austria, (pp. 1-10). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; ICST, Brussels, Belgium, Belgium: ICST (978-963-9799-24-0), (pdf).
  146. Antoniades, D., Polychronakis, M., Nikiforakis, N., Markatos, E.P., & Mitsos, Y. (2008). Monitoring three National Research Networks for eight weeks: Observations and implications. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 153-156). (9781424420674 (ISBN)), (pdf).
  147. Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2008). On the Anonymization and Deanonymization of Netflow Traffic. In Proceedings of FloCon 2008, Savannah, Georgia, USA, January. (pdf).
  148. Williams, P., Rosenthal, D.S.H., Roussopoulos, M., & Georgis, S. (2008). Predicting archival life of removable hard disk drives. Archiving 2008, Bern, 24 June 2008 through 27 June 2008 (pp. 188-192). (9780892082773 (ISBN)), (pdf).
  149. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2008). Real-world polymorphic attack detection using network-level emulation. CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research, Oak Ridge, Tennessee, (pp. 1-3). New York, NY, USA: ACM (978-1-60558-098-2), (pdf).
  150. Smaragdakis, G., Laoutaris, N., Michiardi, P., Roussopoulos, M., Byers, J.W., & Bestavros, A. (2008). Swarming on optimized graphs for n-way broadcast. In Proceedings of IEEE INFOCOM, April 2008. (pdf).
  151. Theocharides, A., Antoniades, D., Polychronakis, M., Athanasopoulos, E., & Markatos, E.P. (2008). Topnet: A Network-aware top(1)LISA; Proceedings of the 22nd Large Installation System Administration Conference, {LISA} 2008, November 9-14, 2008, San Diego, {CA {USA}, San Diego, California, September (pp. 145-157). USENIX Association (978-1-931971-63-8), (pdf).
  152. Nikiforakis, N., Antoniades, D., Markatos, E.P., Ioannidis, S., & Øslebø, A. (2008). When AppMon met Stager. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 157-160). (9781424420674 (ISBN)), (pdf).
  153. Krithinakis, A., Stroetmann, L., Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2008). WSIM: A Software Platform to Simulate All-Optical Security Operations. Computer Network Defense, 2008. EC2ND 2008. European Conference on, Dublin, Ireland, Decembe (pp. 41-47). (pdf).
  154. Nikiforakis, N., Makridakis, A., Athanasopoulos, E., & Markatos, E.P. (2007). Alice, what did you do last time? Fighting Phishing Using Past Activity Tests. Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND '07); LNEE (Lecture Notes on Electrical Engineering), Heraklion, Greece, 4-5 October. Springer (978-0-387-85554-7), (pdf).
  155. Papadakis, H., Trunfio, P., Talia, D., & Fragopoulou, P. (2007). Design and implementation of a hybrid P2P-based grid resource discovery system. In Proceedings of the CoreGRID Workshop on Grid Programming Model, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments, Heraklion, Crete, Greece, Springer (pdf).
  156. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Emulation-based detection of non-self-contained polymorphic shellcode. 10th Symposium on Recent Advances in Intrusion Detection, RAID 2007, Gold Coast, Australia, 5 September 2007 through 7 September 2007 (vol. 4637 LNCS, pp. 87-106). (03029743; 9783540743194 (ISBN)), (pdf).
  157. Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2007). Flexible and high-performance anonymization of Netflow records using anontool. 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, Nice, 17 September 2007 through 21 September 2007 (pp. 33-38). (1424409756 (ISBN); 9781424409754 (ISBN)), (pdf).
  158. Athanasopoulos, E., Roussopoulos, M., Anagnostakis, K.G., & Markatos, E.P. (2007). GAS: Overloading a file sharing network as an anonymizing system. 2nd International Workshop on Security, IWSEC 2007, Nara, 29 October 2007 through 31 October 2007 (vol. 4752 LNCS, pp. 365-379). (03029743; 9783540756507 (ISBN)), (pdf).
  159. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@home: a new approach to large-scale threat monitoring. WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode, Alexandria, Virginia, USA, (pp. 38-45). New York, NY, USA: ACM (978-1-59593-886-2), (pdf).
  160. Papadogiannakis, A., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2007). Improving the performance of passive network monitoring applications using locality buffering. 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS '07, Istanbul, 24 October 2007 through 26 October 2007 (pp. 151-157). (9781424418541 (ISBN)), (pdf).
  161. Andreozzi, S., Ciuffoletti, A., Ghiselli, A., Antoniades, D., Polychronakis, M., Markatos, E.P., & Trimintzios, P. (2007). On the Integration of Passive and Active Network Monitoring in Grid Systems. Integrated Research in GRID Computing. Workshop 2005 (Selected Papers), Pisa, Italy, November 28–30 (pp. 147-161). USA: Springer (978-0-387-47656-8 (Print) 978-0-387-47658-2 (Online)), (pdf).
  162. Koukis, D., Antonatos, S., Antoniades, D., Markatos, E.P., & Trimintzios, P. (2006). A generic anonymization framework for network traffic. 2006 IEEE International Conference on Communications, ICC 2006, Istanbul, 11 July 2006 through 15 July 2006 (vol. 5, pp. 2302-2309). (05361486; 1424403553 (ISBN); 9781424403554 (ISBN)), (pdf).
  163. Antoniades, D., Polychronakis, M., Antonatos, S., Markatos, E.P., Ubik, S., & Øslebø, A. (2006). Appmon: An Application for Accurate per Application Network Traffic Characterisation. In IST Broadband Europe 2006 Conference, Geneva, Switzerland, December. (pdf).
  164. Ciuffoletti, A., & Polychronakis, M. (2006). Architecture of a Network Monitoring Element. Workshops: CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics, Revised Selected Papers, Dresden, Germany, August 29-September 1 (pp. 5-14). (pdf).
  165. Ciuffoletti, A., & Polychronakis, M. (2006). Architecture of a network monitoring element. 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2006, Manchester, 26 June 2006 through 28 June 2006 (pp. 220-221). (15244547; 0769526233 (ISBN); 9780769526232 (ISBN)), (pdf).
  166. Antoniades, D., Athanatos, M., Papadogiannakis, A., Markatos, E.P., & Dovrolis, C. (2006). Available bandwidth measurement as simple as running wget. In Proceedings of the Passive and Active Measurement Conference (PAM2006), Adelaide, Australia, March. (pdf).
  167. Popov, K., Papadakis, H., Fragopoulou, P., & Vlassov, V. (2006). Building Scalable Self-Organizing Grid Services Using P2P Technologies. In Proceedings of the 3rd CoreGrid Integration Workshop, Krakow, Poland, 19-20 October.
  168. Trimintzios, P., Polychronakis, M., Papadogiannakis, A., Foukarakis, M., Markatos, E.P., & Øslebø, A. (2006). DiMAPI: An application programming interface for distributed network monitoring. 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, BC, 3 April 2006 through 7 April 2006 (pp. 382-393). (1424401429 (ISBN); 9781424401420 (ISBN)), (pdf).
  169. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2006). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. In Proceedings of the 3nd CoreGRID Integration Workshop, Krakow Poland.
  170. Athanasopoulos, E., & Antonatos, S. (2006). Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS '06), Heraklion, Crete, Greece, October 19-21 (pp. 97-108). (pdf).
  171. Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2006). Grid Reliability: A Study of Failures on the EGEE Infrastructure. Proceedings of the 3rd CoreGRID Integration Workshop, Krakow, Poland, 19-20 October (pp. 165-176). (pdf).
  172. Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets. 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, Singapore, 6 June 2006 through 9 June 2006 (vol. 3989 LNCS, pp. 130-145). (03029743; 3540347038 (ISBN); 9783540347033 (ISBN)), (pdf).
  173. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation. Berlin, Germany, July 13-14 (pp. 54-73). (pdf).
  174. Koukis, D., Antonatos, S., & Anagnostakis, K.G. (2006). On the Privacy Risks of Publishing Anonymized IP Network Traces. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS '06), Heraklion, Crete, Greece, October 19-21 (pp. 22-32). (pdf).
  175. Papadogiannakis, A., Kapravelos, A., Polychronakis, M., Markatos, E.P., & Ciuffoletti, A. (2006). Passive end-to-end packet loss estimation for GRID traffic monitoring. CoreGRID Integration Workshop 2006, Krakow, Poland, October 19-20. Krakow: CYFRONET AG (83-915141-6-1), (pdf).
  176. Lam, V.T., Antonatos, S., Akritidis, P., & Anagnostakis, K.G. (2006). Puppetnets: misusing web browsers as a distributed attack infrastructure. CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, Virginia, USA, (pp. 221-234). New York, NY, USA: ACM (1-59593-518-5), (pdf).
  177. Antonatos, S., & Anagnostakis, K.G. (2006). TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. In Proceedings of the 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21 (pp. 12-21). (pdf).
  178. Papadakis, H., Fragopoulou, P., Athanasopoulos, E., Dikaiakos, M., & Markatos, E.P. (2005). A Feedback-based Approach to Reduce Duplicate Messages. In Proceedings of the 2nd CoreGrid Integration Workshop, Lisbon, Portugal, November. (pdf).
  179. Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2005). Defending against hitlist worms using network address space randomization. WORM '05 - 2005 ACM Workshop on Rapid Malcode, Farfax, VA, 11 November 2005 through 11 November 2005 (pp. 30-40). (1595932291 (ISBN)), (pdf).
  180. Xinidis, K., Anagnostakis, K.G., & Markatos, E.P. (2005). Design and Implementation of a High-Performance Network Intrusion Prevention System. IFIP TC11 20th International Information Security Conference, Chiba, Japan, May 30 – June 1 (pp. 359-374). (pdf).
  181. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow HoneypotsProceedings of the 14th {USENIX} Security Symposium, August. USENIX (pdf).
  182. Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Efficient content-based detection of zero-day worms. Communications, 2005. ICC 2005. 2005 IEEE International Conference on Communications (ICC 2005), Seoul, Korea, 16-20 May (vol. 2, pp. 837-843). (pdf).
  183. Andreozzi, S., Antoniades, D., Ciuffoletti, A., Ghiselli, A., Markatos, E.P., Polychronakis, M., & Trimintzios, P. (2005). Issues about the Integration of Passive and Active Monitoring for Grid NetworksCoreGRID Integration Workshop 2005, Nov. Pisa (pdf).
  184. Trunfio, P., Talia, D., Fragopoulou, P., Papadakis, H., Mordacchini, M., Pennanen, M., Popov, K., Vlassov, V., & Haridi, S. (2005). Peer-to-Peer Models for Resource Discovery on Grids. In Proceedings of the 2nd CoreGrid Integration Workshop, Lisbon, Portugal, January.
  185. Antonatos, S., Polychronakis, M., Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC, Chiba, Japan, May 30 - June 1 (pp. 393-408). (pdf).
  186. Akritidis, P., Markatos, E.P., Polychronakis, M., & Anagnostakis, K.G. (2005). STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis. Chiba, Japan, May 30 – June 1 (pp. 375-391). (pdf).
  187. Polychronakis, M., Markatos, E.P., Anagnostakis, K.G., & Øslebø, A. (2004). Design of an application programming interface for IP network monitoring. 2004 IEEE/IFIP Network Operations and Management Symposium: Managing Next Generation Convergence Networks and Services, NOMS 2004, Seoul, 1 April 2004 through 1 April 2004 (pp. 483-496). (pdf).
  188. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2004). Generating Realistic Workloads for Network Intrusion Detection Systems. Proceedings of the Fourth International Workshop on Software and Performance (WOSP2004), January 2004. (pdf).
  189. Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2004). Performance Analysis of Content Matching Intrusion Detection Systems. Proceedings of the International Symposium on Applications and the Internet (SAINT2004), January 2004. (pdf).
  190. Markatos, E.P., Ji R Novotn, Y., Polychronakis, M., Smotlacha, V.R., & Ubik, S. (2004). SCAMPI - A Scaleable Monitoring Platform for the InternetIn Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004), Budapest, Hungary, 22-23 March. (pdf).
  191. Luque, E., Castaños, J.G., Markatos, E.P., & Perego, R. (2004). Topic 3: Scheduling and Load Balancing. Pisa, Italy, August 31- September 3 (pp. 220-221).
  192. Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Trafc Splitter Architecture for Intrusion Detection. Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Orlando Florida, October 2003 (pp. 238-240). (pdf).
  193. Charitakis, I., Pnevmatikatos, D., Markatos, E.P., & Anagnostakis, K.G. (2003). Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, Vienna, Austria, September 2003 (pp. 226-239). (pdf).
  194. Lalis, S. (2003). Discovery in a Dynamically Composable Personal System. Proceedings of the Tenth International Conference on Human-Computer Interaction; Universal access in HCI : inclusive design in the information society, Crete, Greece, June 22-27 (vol. 4, pp. 429-433).
  195. Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2003). E2xB: A domain–specific string matching algorithm for intrusion detection. Proceedings of the 18th IFIP International Information Security Conference (SEC2003), May 2003. (pdf).
  196. Karypidis, A., & Lalis, S. (2003). Harnessing the potential of mobile personal data repositories. In Proceedings Hawaii International Conference on System Sciences (HICSS-36), Hawaii, January 6-9 (pp. 10 pp.).
  197. Coppens, J., Van den Berghe, S., Bos, H., Markatos, E.P., De Turck, F., Oslebo, A., & Ubik, S. (2003). SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Proceedings of the Workshop on End-to-End Monitoring Techniques and Services (E2EMON), September 2003. (pdf).
  198. Karypidis, A., & Lalis, S. (2003). The tangible file system. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCSW '03), Rhode Island, USA, May 19-22 (pp. 268-273).
  199. Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002). Exclusion-based Signature Matching for Intrusion Detection. Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN), Cambridge, USA, November 2002 (pp. 146-152). (pdf).
  200. Markatos, E.P. (2002). Speeding-up TCP/IP: Faster Processors are not Enough. In Proceedings of the 21st IEEE International Performance, Computing, and Communications Conference (IPCCC 2002), April 2002 (pp. 341-345). (pdf).
  201. Markatos, E.P. (2002). Tracing a large-scale Peer to Peer System:an hour in the life of Gnutella. In Proceedings of the CCGrid 2002: the second IEEE International Symposium on Cluster Computing and the Grid, May 2002 (pp. 65-74). (pdf).
  202. Kakarontzas, G., & Lalis, S. (2001). A market-based protocol with leasing support for globally distributed computing. 15-18 May (pp. 562-567).
  203. Houstis, C.E., & Lalis, S. (2001). ARION: A scalable architecture for a digital library of scientific collections. Nicosia, Cyprus, 8-10 November.
  204. Gialama, E.M., Markatos, E.P., Sevaslidou, J.E., Serpanos, D.N., Asimakopoulou, X.A., & Kotsovinos, E.N. (2001). DIVISOR: DIstributed VIdeo Server fOr stReaming. In the Proceedings of the 5th WSES/IEEE WORLD MULTICONFERENCE ON Circuits, Systems, Communications and Computers (CSCC 2001), July 2001 (pp. 4531-4536). (pdf).
  205. Lalis, S., & Karypidis, A. (2000). An open market-based architecture for distributed computing. Cancun, Mexico, May.
  206. Markatos, E.P. (2000). On Caching Search Engine Query Results. In the Proceedings of the 5th International Web Caching and Content Delivery Workshop, May 2000. (pdf).
  207. Kapidakis, S. (1999). Issues in the Development and Operation of a Digital Library. ECDL '99: Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries, (pp. 363-382). London, UK: Springer-Verlag (3-540-66558-7).
  208. Markatos, E.P., Katevenis, M.G.H., Pnevmatikatos, D., & Flouris, M.D. (1999). Secondary Storage Management for Web Proxies. In Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS99), Co-Sponsored by IEEE Computer Society, Technical Committee on the Internet., (pp. 93-104). (pdf).
  209. Anastasiadi, A., Kapidakis, S., Nikolaou, Ch., & Sairamesh, J. (1998). A computational economy for dynamic load balancing and data replication. ICE '98: Proceedings of the first international conference on Information and computation economies, Charleston, South Carolina, United States, (pp. 166-180). New York, NY, USA: ACM (1-58113-076-7).
  210. Kapidakis, S., Terzis, S., & Sairamesh, J. (1998). A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries. ECDL '98: Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries, (pp. 95-114). London, UK: Springer-Verlag (3-540-65101-2).
  211. Markatos, E.P., & Chronaki, C. (1998). A Top-10 Approach to Prefetching the Web. In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
  212. Papathanasiou, A E., & Markatos, E.P. (1998). Lightweight Transactions on Networks of Workstations. In International Conference on Distributed Computing Systems (ICDCS 1998), Amsterdam, May 1998. (pdf).
  213. Ioannidis, S., Markatos, E.P., & Sevaslidou, J.E. (1998). On Using Network Memory to Improve the Performance of TransactionBased Systems.  In Proceedings of 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, USA, July 1998. (pdf).
  214. Papadakis, N., Markatos, E.P., & Papathanasiou, A E. (1998). Palantir: A Visualization Tool for the World Wide Web.  In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
  215. Toraki, K., & Kapidakis, S. (1998). The Technical Chamber of Greece Digital Library: The Vision of a Special Organisation to Save and Disseminate Its Information Work Through the Network. ECDL '98: Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries, (pp. 691-692). London, UK: Springer-Verlag (3-540-65101-2).
  216. Nikolaou, Ch., Marazakis, M., Papadakis, D., & Yeorgiannakis, Y. (1997). Towards a Common Infrastructure for Large-Scale Distributed Applications. Research and Advanced Technology for Digital Libraries, Pisa, Italy, September 1–3 (vol. 1324, pp. 173-??). (0302-9743).
  217. Markatos, E.P., & Dramitinos, G. (1996). Implementation of a Reliable Remote Memory Pager. In the proceedings of the USENIX  Technical Conference, San Diego, Ca, January 22-26. (pdf).
  218. Kapidakis, S., & Mavronicolas, M. (1995). Load balancing networks. PODC '95: Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing, Ottowa, Ontario, Canada, (pp. 275). New York, NY, USA: ACM (0-89791-710-3).
  219. Marazakis, M., & Nikolaou, Ch. (1995). Towards adaptive scheduling of tasks in transactional workflows. Proceedings of the 1995 Winter Simulation Conference, WSC '95, Arlington, VA, USA, 3 December 1995 through 6 December 1995 (pp. 604-611). Piscataway, NJ, United States: IEEE (02750708).
  220. Markatos, E.P., & Chronaki, C. (1994). Using reference counters in Update Based Coherent Memory. In PARLE '94 Parallel ARchitectures and Languages Europe, Athens, Greece (pdf).
  221. Markatos, E.P. (1993).  How Architecture Evolution influences the Scheduling Discipline in Shared-Memory Multiprocessors. In PARCO 93, Grenoble, France (pdf).

Poster presentations (abstract reviewed)

  1. Degkleri, E., Chariton, A. A. , Ilia, P., Papadopoulos, P., & Markatos, E.P. (2016). Leveraging DNS for timely SSL Certificate Revocation. In 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016), Linz, Austria, September 2016. (pdf).

Poster presentations (full-text reviewed)

  1. Tsilipakos, O., Pitilakis, A., Tasolamprou, A., Liaskos, C. K., Tsiolaridou1, A., Liu, F., Mirmoosa, M., Wang, X., Kossifos, K., Georgiou, J., Pitsillides, A., Kantartzis, N. , Manessis, D., Ioannidis, S., Kenanakis, G., Deligeorgis, G. , Economou, E., Soukoulis, C. , Tretyakov, S., & Kafesaki, M.  (2019). Software-Defined Metasurfaces: The VISORSURF Project Approach13th International Congress on Artificial Materials for Novel Wave Phenomena–Metamaterials 2019,  Rome, Italy, September 2019.
  2. Papadakis, H., Panagiotakis, C., & Fragopoulou, P. (2013). A distributed algorithm for community detection in large graphsIEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013), Niagara Falls, ON, Canada, 25-28 Aug.. IEEE.

Workshops (54)

Papers in Proceedings (full-paper reviewed)

  1. Papadopoulos, P., & Pachilakis, M, Chariton, A. A. , Markatos, E.P. (2022). OUTOPIA: Private User Discovery on the Internet. In proceedings of the 15th European Workshop on Systems Security (EuroSec 2022), Rennes, France, April 2022. (pdf).
  2. Saeed, T., Aziz, B., Pitsillides, A., Vassiliou, Y., Taghvaee, H., Abadal, S., Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Emoyon-Iredia, E., & Lestas, M. (2021). On the Use of Programmable Metasurfaces in Vehicular Networks2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, Semptember 2021.
  3. Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2021). Do partner apps offer the same level of privacy protection? The case of wearable applications.. Proceedings of the 7th Workshop on Sensing Systems and Applications using Wrist Worn Smart Devices (WristSense), Kassel, Germany, March 2021.
  4. Papadogiannaki, E., Deyannis , D., & Ioannidis, S. (2020). Head (er) Hunter: Fast Intrusion Detection using Packet Metadata Signatures2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Online, September 2020.
  5. Mathioudakis, F., Liaskos, C. K., Tsioliaridou, N. A., Nie, S., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2020). Advanced Physical-layer Security as an App in Programmable Wireless Environments2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Online, May 2020.
  6. Deyannis , D., Karnikis, D., Vasiliadis, G., & Ioannidis, S. (2020). An enclave assisted snapshot-based kernel integrity monitor3rd ACM International Workshop on Edge Systems, Analytics and Networking (EdgeSys '20), Online, April 2020.
  7. Hatzivasilis, G., Chatziadam, P., Petroulakis, N.E., Ioannidis, S., Mangini, M., Kloukinas, Ch., Yautsiukhin, A., Antoniou, M., Katehakis, D.G., & Panayiotou, M. (2019). Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Healthcare OrganizationsProceedings of 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, September 11-13. DOI: 10.1109/CAMAD.2019.8858165, S2CID: 204232044.
  8. Solomos, K., Ilia, P., Ioannidis, S., & Kourtellis, N. (2019). Automated Measurements of Cross-Device Tracking. International Workshop on Information and Operational Technology Security Systems (IOSec 2018), Heraklion, Crete, Greece, September 2019. (pdf).
  9. Soultatos, O., Papoutsakis, M., Fysarakis, K., Hatzivasilis, G., Michalodimitrakis, M, Spanoudakis, G., & Ioannidis, S. (2019). Pattern-driven security, privacy, dependability and interoperability management of IoT environments2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), September 2019.
  10. Kritikos, K., Papoutsakis, M., Ioannidis, S., & Magoutis, K. (2019). Towards Configurable Vulnerability Assessment in the Cloud2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), September 2019.
  11. Lampropoulos, K., Georgakakos, G., & Ioannidis, S. (2019). Using blockchains to enable big data analysis of private information2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), September 2019.
  12. Liaskos, C. K., Tsioliaridou, N. A., Nie, S., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2019). An Interpretable Neural Network for Configuring Programmable Wireless EnvironmentsProceedings of the International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2019, Cannes, France, July 2019.
  13. Liaskos, C. K., Tsioliaridou, N. A., Pitilakis, A., Pirialakos, G. , Tsilipakos, O., Tasolamprou, A., Kantartzis, N. , Ioannidis, S., Kafesaki, M. , Pitsillides, A., & Akyildiz, I. (2019).  Joint Compressed Sensing and Manipulation of Wireless Emissions with Intelligent SurfacesProceedings of the International Workshop on IoT Applications and Industry 4.0 (IoTI4 2019), Santorini Island, Greece, May 2019.
  14. Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2019). Organizing Network Management Logic with Circular Economy PrinciplesProceedings of the 1st International Workshop on Smart Circular Economy (SmaCE 2019), Santorini Island, Greece, May 2019.
  15. Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2019). Is Privacy possible without Anonymity? The case for microblogging services. In proceedings of the 12th European Workshop on Systems Security (EuroSec), Dresden, Germany, March 2019. (pdf).
  16. Tzagarakis, G., Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). 0pass: Zero-storage Password Management Based on Password Reminders. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
  17. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
  18. Tsioliaridou, N. A., Liaskos, C. K., & Ioannidis, S. (2018). BitSurfing: Wireless Communications with Outsourced Symbol GenerationIEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2018), Barcelona, Spain, 17-19 Sept.. IEEE (pdf).
  19. Kornilakis, A., Papadopoulos, P., & Markatos, E.P. (2018). Incognitus: Privacy-Preserving User Interests in Online Social NetworksProceedings of the International Workshop on Information and Operational Technology Security Systems (IOSec 2018), Heraklion, Crete, Greece, September 2018.
  20. Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2018). Towards a Circular Economy via Intelligent MetamaterialsIEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2018), Barcelona, Spain, 17-19 Sept.. IEEE (pdf).
  21. Deyannis , D., Tsirbas, R., Vasiliadis, G., Montella, R., Kosta, S., & Ioannidis, S. (2018). Enabling GPU-assisted Antivirus Protection on Android Devices through Edge Offloading1st International Workshop on Edge Systems, Analytics and Networking, June 2018.
  22. Papoutsakis, M., Kritikos, K., Magoutis, K., & Ioannidis, S. (2018). Towards Model-Driven Application Security across Clouds5th Workshop on CrossCloud Infrastructures & Platforms, April 2018.
  23. Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2016). DCSP: Performant Certificate Revocation a DNS-based approach. Proceedings of the 9th European Workshop on Systems Security (EuroSec), London, UK, April 2016. (pdf).
  24. Papadopoulos, P., Petsas, T., Christou, G., & Vasiliadis, G. (2015). MAD: A Middleware Framework for Multi-Step Attack Detection . Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), Kyoto, Japan, November 2015. (pdf).
  25. Polakis, I., Ilia, P., Tzermias, Z., Ioannidis, S., & Fragopoulou, P. (2015). Social Forensics: Searching for Needles in Digital Haystacks4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), Kyoto, Japan, 5-5 Nov. (pp. 54-66). IEEE.
  26. Petsas, T., Voyatzis, G, Athanasopoulos, E., Polychronakis, M., & Ioannidis, S. (2014). Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android MalwareIn Proceedings of the 7th European Workshop on System Security (EuroSec), Amsterdam, The Netherlands, April 2014.
  27. Chinis, G., Pratikakis , P., Athanasopoulos, E., & Ioannidis, S. (2013). Practical Information Flow for Legacy Web ApplicationsIn Proceedings of the International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS), co-located with ECOOP, Montpellier, France, July 2013.
  28. Ladakis, E, Koromilas, L., Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2013). You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger In Proceedings of the 6th European Workshop on System Security (EuroSec), Prague, Czech Republic, April. (pdf).
  29. Kontaxis, G., Antoniades, D., Polakis, I., & Markatos, E.P. (2011). An Empirical Study on the Security of Cross-Domain Policies in Rich Internet ApplicationsIn Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
  30. Polakis, I., Kontaxis, G., & Ioannidis, S. (2011). CAPTCHuring Automated (Smart)Phone AttacksIn Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, The Netherlands, July 2011. (pdf).
  31. Sfakianakis, A., Athanasopoulos, E., & Ioannidis, S. (2011). CensMon: A Web Censorship Monitor. In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 2011. (pdf).
  32. Tzermias, Z., Sykiotakis, G., Polychronakis, M., & Markatos, E.P. (2011). Combining Static and Dynamic Analysis for the Detection of Malicious DocumentsIn Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
  33. Kontaxis, G., Polakis, I., Polychronakis, M., & Markatos, E.P. (2011). dead.drop: URL-based Stealthy MessagingIn Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Gothenburg, Sweden, September 2011. (pdf).
  34. Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos, E.P. (2011). Detecting Social Network Profile CloningIn Workshop Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications, Seattle, WA, USA, March 2011. (pdf).
  35. Gessiou, E., Hieu Vu, Q., & Ioannidis, S. (2011). IRILD: an Information Retrieval based method for Information Leak DetectionIn Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Gothenburg, Sweden, September 2011. (pdf).
  36. Kontaxis, G., Polakis, I., & Ioannidis, S. (2011). Outsourcing Malicious Infrastructure to the CloudIn Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, The Netherlands, July 2011. (pdf).
  37. Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). Hunting Cross-Site Scripting Attacks in the Network. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, California, May 2010. (pdf).
  38. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). Improving the accuracy of network intrusion detection systems under load using selective packet discarding. Proceedings of the Third European Workshop on System Security, Paris, France, (pp. 15-21). New York, NY, USA: ACM (978-1-4503-0059-9), (pdf).
  39. Krithinakis, A., Athanasopoulos, E., & Markatos, E.P. (2010). Isolating javaScript in dynamic code environments. 2010 Workshop on the Analysis and Programming Languages for Web Applications and Cloud Applications, APLWACA 2010, Toronto, ON, June 6 (pp. 45-49). (9781605589138 (ISBN)), (pdf).
  40. Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., & Markatos, E.P. (2010). Using social networks to harvest email addresses9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS '10, Chicago, IL, October 4-8 (pp. 11-20). (15437221; 9781450300964 (ISBN)), (pdf).
  41. Gessiou, E., Labrinidis, A., & Ioannidis, S. (2009). A Greek (privacy) tragedy: the introduction of social security numbers in Greece. WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society, Chicago, Illinois, USA, (pp. 101-104). New York, NY, USA: ACM (978-1-60558-783-7), (pdf).
  42. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). An Empirical Study of Real-world Polymorphic Code Injection Attacks2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET '09), Boston, MA, USA, April. (pdf).
  43. Papadakis, H., Trufino, P., Talia, D., & Fragopoulou, P. (2009). An Experimental Evaluation of the DQ-DHT Algorithm in a Grid Information Service. In Proceedings of the CoreGRID ERCIM Working Group Workshop on Grids, P2P and Service Computing. Held in conjunction With EuroPAR 2009, Delft, The Netherlands, August. (pdf).
  44. Athanasopoulos, E., Pappas, V., & Markatos, E.P. (2009). Code-Injection Attacks in Browsers Supporting Policies. In Proceedings of the Third Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, CA, USA, May. (pdf).
  45. Foukarakis, M., Antoniades, D., & Polychronakis, M. (2009). Deep packet anonymization. EUROSEC '09: Proceedings of the Second European Workshop on System Security, Nuremburg, Germany, March (pp. 16-21). New York, NY, USA: ACM (978-1-60558-472-0), (pdf).
  46. Koromilas, L., Chinis, G., Fundulaki, I., & Ioannidis, S. (2009). Controlling access to XML documents over XML native and relational databases. In Proceedings of the 6th VLDB Workshop on Secure Data Management (SDM), Lyon, France, 28 August 2009 through 28 August 2009 (vol. 5776 LNCS, pp. 122-141). (03029743; 364204218X (ISBN); 9783642042188 (ISBN)), (pdf).
  47. Ciuffoletti, A., Marchetti, Y., Papadogiannakis, A., & Polychronakis, M. (2008). Prototype Implementation of a Demand-Driven Network Monitoring Architecture. CoreGRID Integration Workshop, Heraklion, Crete, Greece, April 2008. (pdf).
  48. Ciuffoletti, A., Papadogiannakis, A., & Polychronakis, M. (2007). Network Monitoring Session Description. In Proceedings of the CoreGRID Workshop on Grid Middleware (in conjunction with ISC '07), Dresden, Germany, June 2007. (pdf).
  49. Markatos, E.P. (1996). Issues in Reliable Network Memory Paging. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
  50. Markatos, E.P. (1996). Using Remote Memory to avoid Disk Thrashing:A Simulation Study. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
  51. Markatos, E.P., & Dramitinos, G. (1995). Adding Flexibility to a Remote Memory Pager.  In Fourth International Workshop on Object Orientation in Operating Systems, IWOOOS 96,  Lund, Sweden, August 1995 (pp. 183-186). (pdf).
  52. Markatos, E.P., Katevenis, M.G.H., Kalokairinos, G., & Serpanos, D.N. (1995). An Efficient Processor-Network Interface for Local Area Multiprocessors. In Proceedings of the SCIzzL Workshop on LocalArea MultiProcessors, Heraklion, Crete, Greece, October 1995 (pp. 23-32). (pdf).

Posters

  1. Papadogiannaki, E., & Ioannidis, S. (2016). An Efficient Scheduling Approach for Concurrent Packet Processing Applications on Heterogeneous Systems. 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016), Linz, Austria, September 2016. (pdf).
  2. Polakis, I., Kontaxis, G., Ioannidis, S., & Markatos, E.P. (2011). Dynamic Monitoring of Dark IP Address SpaceIn Proceedings of the COST TMA International Workshop on Traffic Monitoring and Analysis (TMA), Vienna, Austria, April 2011. (pdf).

Books (15)

Whole Book

  1. Markatos, E.P., & Balzarotti , D. (2013). The Red Book: A Roadmap for Systems Security ResearchThe SysSec Consortium. August 2013.
  2. Kruegel, Ch., Almgren, M., Bos, H., Dimitrov, K., Djambazova, E., Ioannidis, S., Jonsson, E., Kirda, E., & Markatos, E.P. (2010). Forward White Book: Emerging ICT ThreatsThe FORWARD Consortium. January 2010.

Editor

  1. Bos, H., & Markatos, E.P. (2008). Proceedings of the 1st European Workshop on System Security : March 31, 2008, Glascow, United Kingdom.  New York, N.Y.: ACM Press, (ISBN 9781605581194 1605581194).
  2. Leitold, H., & Markatos, E.P. (2006). Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings. Communications and Multimedia Security; Lecture Notes in Computer ScienceVol. 4237 Springer, (ISBN 3-540-47820-5).

Chapters (in book)

  1. Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Nie, S., Pitsillides, A., & Akyildiz, I. (2020). Applications of the Internet of Materials: Programmable Wireless EnvironmentsThe Internet of Materials. December 2020 (pp. 269 - 317).
  2. Tsioliaridou, N. A., Pyrialakos, G. G, Pitilakis, A., Ioannidis, S., & Kantartzis, N. , Liaskos, C. K. (2020). Designing the Internet-of-Materials Interaction SoftwareThe Internet of Materials. December 2020 (pp. 77 - 149).
  3. Pateraki, M., & Et, al. (2020). Biosensors and Internet of Things in smart healthcare applications: challenges and opportunitiesWearable and Implantable Medical Devices. January 2020 (pp. 25 - 53).
  4. Solomos, K., Ilia, P., Ioannidis, S., & Kourtellis, N. (2018). Automated Measurements of Cross-Device Tracking. Information and Operational Technology Security Systems - First International Workshop (IOSec 2018). September 2018 (pdf).
  5. Fragopoulou, P., Papadakis, H., & Panagiotakis, C. (2017). Community Detection Using Synthetic Coordinates and Flow Propagation, Emergence, Complexity and Computation (ECC)Emergent ComputationVol. 24 (pp. 579 - 636), Springer.
  6. Papadakis, H., Trunfio, P., Talia, D., & Fragopoulou, P. (2008). Design and Implementation of a Hybrid P2P-based Grid Resource Discovery System. Making Grids Work.  (pp. 89 - 101), USA: Springer.
  7. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2008). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. Achievements in European Research on grid systems.  (pp. 1 - 12), Springer.
  8. Ciuffoletti, A., Papadogiannakis, A., & Polychronakis, M. (2008). Network Monitoring Session Description.  (pp. 79 - 93), Springer US, (ISBN 978-0-387-78445-8 (Print) 978-0-387-78446-5 (Online)).
  9. Ciuffoletti, A., Marchetti, Y., Papadogiannakis, A., & Polychronakis, M. (2008). Prototype Implementation Of A Demand Driven Network Monitoring Architecture.  (pp. 85 - 96), Springer US, (ISBN 978-0-387-09456-4 (Print) 978-0-387-09457-1 (Online)).
  10. Papadakis, H., Fragopoulou, P., Markatos, E.P., Athanasopoulos, E., Dikaiakos D., M., & Labrinidis, A. (2007). A feedback-based approach to reduce duplicate messages in unstructured peer-to-peer networksIntegrated Research in GRID Computing. January 2007 (pp. 103 - 118), Springer, Boston, MA.
  11. Papadakis, H., Fragopoulou, P., Markatos, E.P., Athanasopoulos, E., Dikaiakos, M., & Labrinidis, A. (2007). A Feedback-based Approach to reduce Duplicate Messages in Unstructured Peer-to-Peer Systems. Integrated research in Grid Computing.  (pp. 103 - 118), Springer,  (pdf).

Periodicals (137)

Journal Articles

  1. Marchioro, T., Kazlouski, A., & Markatos, E.P. (2022). How to Publish Wearables’ Data: Practical Guidelines to Protect User Privacy. Studies in Health Technology and Informatics294, 949-950, (pdf).
  2. Pachilakis, M, Papadopoulos, P., Laoutaris, N., Markatos, E.P., & Kourtellis, N. (2021). YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy. ACM on Measurement and Analysis of Computing Systems5(3), 1-26, (pdf).
  3. Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Pitsillides, A., & Akyildiz, I. (2021). Realizing Ambient Backscatter Communications with Intelligent Surfaces in 6G Wireless SystemsIEEE Wireless Communications, 1-8.
  4. Humphries, G., Nordvik, R., Manifavas, H., Cobley, P., & Sorell, M. (2021). Law Enforcement educational challenges for mobile forensicsForensic Science International: Digital Investigation38.
  5. Paschalides, D., Christodoulou, C., Orphanou, K., Andreou, R., Kornilakis, A., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2021). Check-It: A plugin for detecting fake news on the webOnline Social Networks and Media25.
  6. Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Pitsillides, A., & Akyildiz, I. (2021). Next Generation Connected Materials for Intelligent Energy Propagation in Multiphysics SystemsIEEE Communications Magazine59(8), 100-106.
  7. Fischer-Hübner, S., Alcaraz, C., Ferreira, A., Fernandez-Gago, C., Lopez, J., Markatos, E.P., Islami, L., & Akil, M. (2021). Stakeholder perspectives and requirements on cybersecurity in EuropeJournal of Information Security and Applications61.
  8. Papadogiannaki, E., & Ioannidis, S. (2021). A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and CountermeasuresACM Computing Surveys54(6), 1-35.
  9. Antonakaki, D., Fragopoulou, P., & Ioannidis, S. (2021). A survey of Twitter research: Data model, graph structure, sentiment analysis and attacksExpert Systems with Applications164.
  10. Papadogiannaki, E., & Ioannidis, S. (2021). Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous HardwareSensors21(4).
  11. Smyrlis, M., Somarakis, I., Spanoudakis, G., Hatzivasilis, G., & Ioannidis, S. (2021). CYRA: A Model-Driven CYber Range Assurance PlatformApplied Sciences11(11).
  12. Hatzivasilis, G., Fysarakis, K., Hatzakis, I, Vardakis, G., Papadakis, N., & Spanoudakis, G. (2021). SPD-Safe: Secure Administration of Railway Intelligent Transportation SystemsElectronics10(1).
  13. Hatzivasilis, G., Ioannidis, S., Fysarakis, K., Spanoudakis, G., & Papadakis, N. (2021). The green blockchains of circular economyElectronics10(16).
  14. Papoutsakis, M., Fysarakis, K., Spanoudakis, G., Ioannidis, S., & Koloutsou, K. (2021). Towards a Collection of Security and Privacy PatternsApplied Sciences11(4).
  15. Papoutsakis, M., Fysarakis, K., Spanoudakis, G., Ioannidis, S., & Koloutsou, K. (2021). Towards a Collection of Security and Privacy PatternsApplied Sciences11(4).
  16. Aivazoglou, M., Roussos, A., Margaris, D., Vassilakis, C., Ioannidis, S., Polakis, I., & Spiliotopoulos, D. (2020). A fine-grained social network recommender systemSocial Network Analysis and Mining10(1), 1-18.
  17. Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2020). Do you know who is talking to your wearable smartband?. EFMI-STC 2020 275, 142-146, ( 10.3233/SHTI200711), (pdf).
  18. Christou, G., Vasiliadis, G., Papaefstathiou, V., Papadogiannakis, A., & Ioannidis, S. (2020). On Architectural Support for Instruction Set RandomizationACM Transactions on Architecture and Code Optimization (TACO)17(4), 1-26.
  19. Pachilakis, M, Chariton, A. A. , Papadopoulos, P., Ilia, P., Degkleri, E., & Markatos, E.P. (2020). Design and Implementation of a Compressed Certificate Status ProtocolACM Transactions on Internet Technology20(4), 1-25.
  20. Kokolaki, E., Daskalaki, E., Psaroudaki, K., Christodoulaki, M., & Fragopoulou, P. (2020). Investigating the dynamics of illegal online activity: The power of reporting, dark web, and related legislation. , 48.
  21. Tsilipakos, O., & Et, al. (2020). Toward intelligent metasurfaces: the progress from globally tunable metasurfaces to software‐defined metasurfaces with an embedded network of controllersAdvanced Optical Materials8(17).
  22. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2020). End-to-end wireless path deployment with intelligent surfaces using interpretable neural networksIEEE Transactions on Communications68(11), 6792-6806.
  23. Diamantaris, M., Marcantoni, F., Ioannidis, S., & Polakis, I. (2020). The seven deadly sins of the HTML5 WebAPI: a large-scale study on the risks of mobile sensor-based attacksACM Transactions on Privacy and Security (TOPS)23(4), 1-31.
  24. Miaoudakis, A., Fysarakis, K., Petroulakis, N.E., Alexaki, S., Alexandirs, G., Ioannidis, S., Spanoudakis, G., Katos, V., & Verikoukis, C. (2020). Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of? Looping Smart Assets?IEEE Vehicular Technology Magazine15(3), 20-31.
  25. Paschalides, D., Stephanidis, D., Andreou, A., Orphanou, K., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2020). MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech. ACM Transactions on Internet Technology20(2).
  26. Hatzivasilis, G., Soultatos, O., Ioannidis, S., Spanoudakis, G., Katos, V., & Demetriou, G. (2020). MobileTrust: Secure knowledge integration in VANETsACM Transactions on Cyber-Physical Systems4(3), 1-25.
  27. Hatzivasilis, G., Papadakis, N., Hatzakis, I, Ioannidis, S., & Vardakis, G. (2020). Artificial intelligence-driven composition and security validation of an internet of things ecosystemApplied Sciences10(14).
  28. Drivas, G., Maglaras, L., Janicke, H., & Ioannidis, S. (2020). Assessing Cyber Security Threats and Risks in the Public Sector of GreeceJournal of Information Warfare19(1).
  29. Petroulakis, N.E., & Et, al. (2020). Pattern-driven Security, Privacy, Dependability and Interoperability in IoTSECURITY RISK MANAGEMENT.
  30. Hatzivasilis, G., & Et, al. (2020). Modern aspects of cyber-security training and continuous adaptation of Programmes to traineesApplied Sciences10(16).
  31. Kritikos, K., Magoutis, K., Papoutsakis, M., & Ioannidis, S. (2019). A survey on vulnerability assessment tools and databases for cloud-based web applicationsArray3.
  32. Drivas, G., Maglaras, L., Janicke, H., & Ioannidis, S. (2019). Cybersecurity assessment of the public sector in greeceECCWS 2019 18th European Conference on Cyber Warfare and Security, Academic Conferences and publishing limited.
  33. Hatzivasilis, G., Christodoulakis, N., Tzagkarakis, Ch., Ioannidis, S., Demetriou, G., Fysarakis, K., & Panayiotou, M. (2019). The CE-IoT framework for green ICT organizationsEEE DCOSS.
  34. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2019). A Novel Communication Paradigm for High Capacity and Security via Programmable Indoor Wireless Environments in Next Generation Wireless SystemsAd Hoc Networks87, 1-16, (pdf).
  35. Tasolamprou, A., Pitilakis, A., Abadal, S., Tsilipakos, O., Timoneda, X., Taghvaee, H., Mirmoosa, M., Liu, F., Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Kantartzis, N. , Manessis, D., Georgiou, J., Cabellos-Aparicio, A., Alarcón, E., Pitsillides, A., Akyildiz, I., Tretyakov, S., Economou, E., & Kafesaki, M. , Soukoulis, C.  (2019). Exploration of Intercell Wireless Millimeter-Wave Communication in the Landscape of Intelligent MetasurfacesIEEE Access7, 122931-122948, IEEE.
  36. Liaskos, C. K., Tsioliaridou, N. A., Nie, S., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2019). On the Network-Layer Modeling and Configuration of Programmable Wireless EnvironmentsIEEE/ACM Transactions on Networking27(4), 1696-1713, IEEE.
  37. Antonakaki, D., Ioannidis, S., & Fragopoulou, P. (2018). Utilizing the average node degree to assess the temporal growth rate of TwitterP. Social Network Analysis and Mining (SNAM)8(12).
  38. Liaskos, C. K., & Ioannidis, S. (2018). Network Topology Effects on the Detectability of Crossfire Attacks IEEE Transactions on Information Forensics and Security13(7), 1682-1695, IEEE (pdf).
  39. Liaskos, C. K., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2018). Using any Surface to Realize a New Paradigm for Wireless CommunicationsCommunications of the ACM61(11), 30-33, ACM (pdf).
  40. Abadal, S., Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Pitsillides, A., Pareta, J.S., Alarcón, E., & Cabellos-Aparicio, A. (2017). Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context AnalysisIEEE Access: The Multidisciplinary Open Access Journal IEEE Access5(1), 6225-6235, (pdf).
  41. Antonakaki, D., Spiliotopoulos, D., Samaras, C., Pratikakis , P., Ioannidis, S., & Fragopoulou, P. (2017). Social media analysis during political turbulencePLoS ONE 12(10).
  42. Tsioliaridou, N. A., Liaskos, C. K., Dedu, E., & Ioannidis, S. (2017). Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path Scheme. Nano Communication Networks (Elsevier) Journal12, 63-71, (pdf).
  43. Papadogiannaki, E., Koromilas, L., Vasiliadis, G., & Ioannidis, S. (2017). Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures. IEEE/ACM Transactions on Networking. PP(99), 1-14.
  44. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2017). Measurement, Modeling, and Analysis of the Mobile App Ecosystem. ACM Transactions on on Modeling and Performance Evaluation of Computing Systems (ACM TOPECS)2(2), 1-33.
  45. Abadal, S., Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Pitsillides, A., Pareta, J.S., Alarcón, E., & Cabellos-Aparicio, A. (2017). Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context AnalysisIEEE Access5, 6225-6235, (pdf).
  46. Tsioliaridou, N. A., Liaskos, C. K., Dedu, E., & Ioannidis, S. (2017). Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path SchemeNano Communication Networks (Elsevier)32, 63-71, (pdf).
  47. Papadakis, H., Panagiotakis, C., & Fragopoulou, P. (2017). SCoR: A Synthetic Coordinate based Recommender systemExpert Systems with Applications79, 8-19, Elsevier.
  48. Antonakaki, D., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Fragopoulou, P. (2016). Exploiting abused trending topics to identify spam campaigns in TwitterSocial Network Analysis and Mining6(48), 1-11.
  49. Tsioliaridou, N. A., Liaskos, C. K., Ioannidis, S., & Pitsillides, A. (2016). Lightweight, Self-tuning Data Dissemination for Dense Nanonetworks. Nano Communication Networks (Elsevier) Journal, Special Issue on Electromagnetic Communication in Nano-scale8, 2-15, (pdf).
  50. Tsikoudis, N., Papadogiannakis, A., & Markatos, E.P. (2016). LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System. IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber Security4(1), 142-155.
  51. Tsioliaridou, N. A., Zhang, C., Liaskos, C. K., & Tsaoussidis , V. (2016). On the Fair Handling of TCP Flows. International Journal of Communication Networks and Distributed Systems,  (pdf).
  52. Liaskos, C. K., & Tsioliaridou, N. A. (2016). Service Ratio-Optimal, Content Coherence-Aware Data Push Systems. ACM Transactions on Management Information Systems6(4), 1-23, (pdf).
  53. Liaskos, C. K., Tsioliaridou, N. A., Pitsillides, A., Akyildiz, I., Kantartzis, N. , Lalas, A. , Dimitropoulos, X. , Ioannidis, S., & Kafesaki, M. , Soukoulis, C.  (2015). Design and Development of Software Defined Metamaterials for Nanonetworks. IEEE Circuits and Systems Magazine15(4), 12-25, (pdf).
  54. Tsioliaridou, N. A., Liaskos, C. K., Ioannidis, S., & Pitsillides, A. (2015). Lightweight, Self-tuning Data Dissemination for Nanonetworks. Elsevier NanoCommunication Networks – Special Issue,  (pdf).
  55. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2014). Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. IEEE Journal of Selected Areas in Comunications (JSAC)32(10), 1849-1863.
  56. Papadakis, H., Panagiotakis, C., & Fragopoulou, P. (2014).  Distributed detection of communities in complex networks using synthetic coordinatesJournal of Statistical Mechanics: Theory and Experiment, IOP.
  57. Liaskos, C. K., Tsioliaridou, N. A., Pitsillides, A., Akyildiz, I., Kantartzis, N. , Lalas, A. , Dimitropoulos, X. , Ioannidis, S., & Kafesaki, M. , Soukoulis, C.  (2014). Design and Development of Software Defined Metamaterials for Nanonetworks. IEEE Circuits and Systems Magazine15(4), 12-25, (pdf).
  58. Tsikoudis, N., Papadogiannakis, A., & Markatos, E.P. (2014). LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System.IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber SecurityPP(99), 1-1.
  59. Liaskos, C. K., & Tsioliaridou, N. A. (2014). A Promise of Realizable, Ultra-Scalable Communications at nano-Scale: A multi-Modal nano-Machine ArchitectureIEEE Transactions on Computers, 1-14, IEEE.
  60. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2014). GPU-assisted malwareIn International Journal of Information Security (IJIS).
  61. Liaskos, C. K., & Tsioliaridou, N. A. (2014). Minimal Wireless Broadcast Schedules for Multi-objective PursuitsIEEE Transactions on Vehicular Technology, IEEE.
  62. Liaskos, C. K., & Tsioliaridou, N. A. (2014). Minimal Wireless Broadcast Schedules for Multi-objective PursuitsIn Proceedings of the IEEE Transactions on Vehicular Technology, IEEE.
  63. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2014). Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Deep Packet Inspection: Algorithms, Hardware, and Applications32(10), 1-15, (pdf).
  64. Panagiotakis, C., Papadakis, H., Grinias, E., Komodakis, N., Fragopoulou, P., & Tziritas, G. (2013). Interactive image segmentation based on synthetic graph coordinatesPattern Recognition46(11), 2940-2952, Elsevier.
  65. Papadakis, H., Fragopoulou, P., Markatos, E.P., & Roussopoulos, M. (2013). ITA: Innocuous Topology Awareness for Unstructured P2P NetworksIEEE Transactions on Parallel and Distributed Systems24(8), 1589-1601.
  66. Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2012). Minimizing information disclosure to third parties in social login platformsIn International Journal of Information Security (IJIS)11(5), 321-332.
  67. Papadogiannakis, A., Vasiliadis, G., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2012). Improving the Performance of Passive Network Monitoring Applications with Memory Locality EnhancementsIn Computer Communications Journal (COMCOM)(available from Science Direct)35(1), 129-140, (pdf).
  68. Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2012). ITA: Innocuous Topology Awareness for Unstructured P2P Networks. Transactions on Parallel and Distributed Systems.
  69. Webb, R.P., Dailey, J.M., Manning, R.J., Maxwell, G.D., Poustie, A.J., Lardenois, S., Harmon, R., Harrison, J., Kopidakis, G., Athanasopoulos, E., Krithinakis, A., Doukhan, F., Omar, M., Vaillant, D., Di Nallo, F., Koyabe, M., & Di Cairano-Gilfedder, C. (2011). All-Optical Header Processing in a 42.6 Gb/s Optoelectronic FirewallIn IEEE Journal of Selected Topics in Quantum Electronics. (available from IEEE Xplore) , (99), 1-8.
  70. Makridakis, A., Athanasopoulos, E., Antonatos, S., Antoniades, D., Ioannidis, S., & Markatos, E.P. (2010). Designing malicious applications in social networks. IEEE Network Special Issue on Online Social Networks,  (pdf).
  71. Christodoulaki, M., & Fragopoulou, P. (2010). SafeLine: reporting illegal internet contentIn Information Management & Computer Security. (available from Emerald Insight)18(1), 54-65.
  72. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Polychronakis, M., Keromytis, A.D., & Markatos, E.P. (2010). Shadow Honeypots. In International Journal of Computer and Network Security (IJCNS)2(9), 1-16, (pdf).
  73. Makridakis, A., Athanasopoulos, E., Antonatos, S., Antoniades, D., Ioannidis, S., & Markatos, E.P. (2010). Understanding the behavior of malicious applications in social networksIn IEEE Network. (available from IEEE Xplore) 24(5), 14-19, (08908044).
  74. Goodell, G., Roussopoulos, M., & Bradner, S. (2009). A Directory Service for Perspective Access NetworkIn IEEE/ACM Transactions on Networking, (available from IEEE Xplore) 17(2), 501-514.
  75. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2009). Hash-Based Overlay Partitioning in Unstructured Peer-to-Peer SystemsIn Parallel Processing Letters, (available from World Scientific) 19(1), 57-71, (0129-6264).
  76. Zimeo, E., Troisi, A., Papadakis, H., Fragopoulou, P., Forestiero, A., & Mastroianni, C. (2008). Cooperative self-composition and discovery of grid services in P2P networks. Parallel Process Letters18(3), 329-346, (01296264).
  77. Miltchev, S., Smith, J.M., Prevelakis, V., Keromytis, A.D., & Ioannidis, S. (2008). Decentralized Access Control in Distributed File Systems. In ACM Computing Surveys40(3), (03600300), (pdf).
  78. Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2007). Defending against hitlist worms using network address space randomization. In Computer Networks51(12), 3471-3490, (1389-1286), (pdf).
  79. Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2007). Failure Management in Grids: the Case of the EGEE InfrastructureIn Parallel Processing Letters, (available from World Scientific)17(4), 391-410.
  80. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Network-level polymorphic shellcode detection using emulation. Journal in Computer Virology2(4), 257-274, (pdf).
  81. Trunfio, P., Talia, D., Papadakis, H., Fragopoulou, P., Mordacchini, M., Pennanen, M., Popov, K., Vlassov, V., & Haridi, S. (2007). Peer-to-Peer resource discovery in Grids: Models and systems. Future Generation Computer Systems23(7), 864-878, (0167-739X).
  82. Lam, V.T., Antonatos, S., Akritidis, P., & Anagnostakis, K.G. (2007). Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. In ACM Transactions on Information and System Security (TISSEC),  (pdf).
  83. Xinidis, K., Charitakis, I., Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2006). An active splitter architecture for intrusion detection and prevention. IEEE Trans.Dependable Secure Comput.3(1), 31-44, (15455971), (pdf).
  84. Houstis, C.E., Lalis, S., Pitikakis, M., Vasilakis, G.V., Kritikos, K., & Smardas, A. (2003). A grid service-based infrastructure for accessing scientific collections: The case of the arion system. Int J High Perform Comput Appl17(3), 269-280, (10943420).
  85. Vavalis, M. (2002). Runtime support for collaborative air pollution models. Syst Anal Modell Simul42(11), 1575-1599, (02329298).
  86. Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2002). Web-Conscious Storage Management for Web Proxies In IEEE/ACM Transactions on Networking, (available from IEEE Xplore)10(6), 735-748.
  87. Markatos, E.P. (2001). On Caching Search Engine Query Results. In Computer Communications,Elsevier Science, 137-143, (pdf).
  88. Lalis, S., Papadakis, D., & Marazakis, M. (2000). Decentralized resource acquisition from autonomous markets in a QoS-capable environment. Decis Support Syst28(1), 89-100, Amsterdam, Netherlands: Elsevier Science Publishers B.V. (01679236).
  89. Karvounarakis, G., & Kapidakis, S. (2000). Submission and repository management of digital libraries, using WWW. Comput.Networks34(6), 861-872, Amsterdam, Netherlands: Elsevier Sci B.V. (13891286).
  90. Dramitinos, G., & Markatos, E.P. (1999). Adaptive and Reliable Paging to Remote Main MemoryIn Journal of Parallel and Distributed Computing (available from Science Direct)58(3), 357-388.
  91. Pnevmatikatos, D., Markatos, E.P., Maglis, Gr., & Ioannidis, S. (1999). On Using Network RAM as a non-volatile Buffer In Cluster Computing Journal on Networks, Software, and Applications, Baltzer Science Publishers. (available from Springer Link) 2(4), 295-303.
  92. Ioannidis, S., Papathanasiou, A E., Maglis, Gr., Pnevmatikatos, D., Markatos, E.P., & Sevaslidou, J.E. (1999). On Using Reliable Network RAM in Networks of Workstations In Parallel and Distributed Computing Practices, Special Issue on High Performance Computing on Clusters, Nova Science Publishers, USA, accepted for publication. (available from SCPE).
  93. Flouris, M.D., & Markatos, E.P. (1999). The Network RamDisk: using remote memory on heterogeneous NOWs In Cluster Computing Journal on Networks, Software, and Applications, Baltzer Science Publishers. (available from Springer Link) 2(4), 281-293.
  94. Houstis, C.E., Nikolaou, Ch., & Lalis, S. (1999). Towards a next generation of open scientific data repositories and services. CWI Quarterly12(2), 111-132.
  95. Markatos, E.P., Papathanasiou, A E., & Papadakakis, N. (1999). Visualizing Traffic on the World Wide WebIn WebNet Journal: Internet Technologies, Applications and Issues (available from Ed/ITLib)1(2), 57-65.
  96. Katevenis, M.G.H., Markatos, E.P., Kalokairinos, G., & Dollas, A. (1997). Telegraphos: a substrate for high-performance computing on workstation clustersJournal of Parallel and Distributed Computing43(2), 94-108, (0743-7315).
  97. Houstis, C.E., Kapidakis, S., Markatos, E.P., & Gelenbe, E. (1997). Execution of Compute Intensive Applications into Parallel Machines In Information Sciences, special issue on load balancing in distributed systems, Elsevier Science. (available from Science Direct) 97(1-2), 83-124.
  98. Houstis, C.E., Nikolaou, Ch., Marazakis, M., Patrikalakis, N., Sairamesh, J., & Tomasic, A. (1997). THETIS: Design of a data management and data visualization system for coastal zone management of the Mediterranean sea1. D-Lib Mag.3(11), 18-28, (10829873).
  99. Nikolaou, Ch., Marazakis, M., & Georgiannakis, G.Y. (1997). Transaction routing for distributed OLTP systems: Survey and recent results. Inf.Sci.97(1-2), 45-82, (00200255).
  100. Sairamesh, J., Nikolaou, Ch., & Kapidakis, S. (1996). Architectures for QoS based Retrieval in Digital Libraries. , 7, CEUR-WS.org.
  101. Markatos, E.P. (1996). Main Memory Caching of Web DocumentsIn Computer Networks and ISDN Systems. Also appeared in Proceedings of the Fifth International World Wide Web Conference, Paris, France, May 199628(7-11), 893-906.
  102. Markatos, E.P., & Leblanc, Th.J. (1994). Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors.  In IEEE Transactions on Parallel and Distributed Processing,5(4), 379-400, (pdf).

Magazine article

  1. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2018). A New Wireless Communication Paradigm through Software-controlled MetasurfacesIEEE Communications Magazine56(9), 162-169, (pdf).
  2. Christodoulaki, M., & Fragopoulou, P. (2010). SafeLine: reporting illegal internet content. Information Management & Computer Security18(1), 54-65.
  3. Athanasopoulos, E., & Christodoulaki, M. (2010). Think B4 U postThe Economist (Kathimerini)3(74), 58-59.
  4. Ioannidis, S., Markatos, E.P., Kirda, E., & Kruegel, Ch. (2009). Drivers of Emerging and Future Threats in ICT Infrastructures . , 5(3),  http://www.ics.forth.gr/dcs/Activities/forward-enisa-quarterly-2009.3.pdf.
  5. Markatos, E.P., & Anagnostakis, K.G. (2008). NoAH: A European Network of Affined Honeypots for cyber-attack Tracking and Alerting. , (262).
  6. Antonatos, S., Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@Home: Παγιδεύοντας τις επιθέσεις από το διαδίκτυο. The Economist (Kathimerini)9.
  7. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). LOBSTER: Ανίχνευση επιθέσεων στο διαδίκτυο. The Economist (Kathimerini)9.
  8. Markatos, E.P., Anagnostakis, K.G., Antonatos, S., & Polychronakis, M. (2007). Real-time Monitoring and Detection of Cyberattacks. , 3(1),  http://www.ics.forth.gr/_pdf/brochures/noah-lobster-enisa-quarterly-2007.1.pdf.
  9. Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2007). Ανάπτυξη ασφαλών οπτικών δικτύων. The Economist (Kathimerini)9.
  10. Markatos, E.P., Antonatos, S., & Anagnostakis, K.G. (2006). Discovering Hackers, with a honeypot as bait. ,  http://www.ics.forth.gr/_pdf/brochures/naftemporiki_Dec2006.2.pdf.
  11. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2006). Μία Ευρωπαϊκή Πλατφόρμα ανίχνευσης & αναχαίτισης ηλεκτρονικών επιθέσεων στο Διαδίκτυο. The Economist (Kathimerini)4, 89.

ERCIM News

  1. Daskalaki, E., Psaroudaki, K., & Fragopoulou, P. (2018). EL-SIC: Focus on Better and Safer Online Experiences for KidsERCIM NEWS - Special theme: Digital Twins, (115), 52-52, October 2018.
  2. Dikaiakos D., M., Pallis, G., & Markatos, E.P. (2016). Mandola: Monitoring and Detecting Online Hate SpeechERCIM NEWS , (107), 49-50, October 2016.
  3. Markatos, E.P., Versinskiene, E., & Bruze, E. (2016). SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, training, and EducationERCIM NEWS , (106), 48-48, July 2016.
  4. Kalogiros, C., Tountopoulos, V., Ioannidis, S., Keller, S., & Bisson, P. (2015). Operational Trustworthiness Enabling Technologies - The OPTET ProjectERCIM News102, July 2015.
  5. Maggi, F, Zanero, S., & Markatos, E.P. (2015). European Cyber-Security Research and InnovationERCIM NEWS, (100), 43-43, January 2015.
  6. Zanero, S., Ioannidis, S., & Markatos, E.P. (2012). i-Code: Real-Time Malicious Code IdentificationERCIM News90, 19-20, July.
  7. Markatos, E.P., & Bos, H. (2012). SysSec: Managing Theats and Vulnerabilities in the Future InternetERCIM News90, 13-14, July.
  8. Ioannidis, S., Markatos, E.P., & Kruegel, Ch. (2009). On looking FORWARDERCIM News76, January 2009.
  9. Anagnostakis, K.G., & Markatos, E.P. (2005). Towards a European Malware Containment InfrastructureERCIM News63, 16-17, October 2005.
  10. Bilas, A., & Markatos, E.P. (2003). Wearable Systems for Everyday UseERCIM News52, 15-16, January 2003.
  11. Markatos, E.P. (2001). ServerGrids: Available and Scalable Global Computing PlatformsERCIM News45, April 2001.
  12. Markatos, E.P., & Papathanasiou, A E. (1999). Monitoring and Displaying Traffic on the World Wide WebERCIM News37, April 1999.
  13. Houstis, C.E. (1999). THETIS - A Data Management and Visualization System for the Support of Coastal Zone Management in the Mediterranean SeaERCIM News39, October 1999.
  14. Nikolaou, Ch. (1998). EU-NSF Working Group on Intellectual Property Rights (IPR) and Economic IssuesERCIM News32, January 1998.
  15. Markatos, E.P. (1998). TeachWEB - Novel Learning Approaches using the World-Wide WebERCIM News33, April 1998.
  16. Doerr, M., & Fundulaki, I. (1998). The Aquarelle Terminology ServiceERCIM News33, April 1998.
  17. Papadakis, D., Marazakis, M., & Nikolaou, Ch. (1997). Middleware Services to support Electronic CommerceERCIM News30, July 1997.
  18. Markatos, E.P., & Chronaki, C. (1996). Caching, Prefetching and Coherence in the World Wide WebERCIM News25, April 1996.
  19. Sairamesh, J., Kapidakis, S., & Nikolaou, Ch. (1996). Digital Library Research at ICS-FORTHERCIM News27, October 1996.
  20. Nikolaou, Ch. (1996). European Union endorses ERCIM Digital Document InitiativeERCIM News24, January 1996.
  21. Constanta Fanouraki , P., & Tsironis, G. (1996). European Week for Scientific and Technological Culture 1995ERCIM News25, April 1996.
  22. Nikolaou, Ch., Saridakis, T., & Markatos, E.P. (1995). ArrayTracerERCIM News23, April 1995.
  23. Nikolaou, Ch., & Karavassili, M. (1995). First LYDIA Workshop on Load BalancingERCIM News21, April 1995.
  24. Marazakis, M. (1995). TPsim - A Simulator for Transaction Processing SystemsERCIM News23, April 1995.

Talks (32)

Invited Talks

  1. Ioannidis, S. (2012). Challenges and Directions for Security in Networked Systems. 4th EU-Japan Symposium on Next Generation Networks and the Future Internet, Tokyo, January 19.
  2. Ioannidis, S. (2012). Emerging Threats and Actors. At BIC Workshop on the cross domain coordination of International Cooperation and technical themes in Trustworthy ICT and INCO, June, Brussels, Belgium.
  3. Markatos, E.P. (2012). Future Research on Systems Security. At FIA Roadmapping Workshop, June, Brussels, Belgium.
  4. Markatos, E.P. (2012). Managing Threats and Vulnerabilities in the Future Internet. At Joint EDA EC Workshop, October, Brussels, Belgium.
  5. Markatos, E.P. (2012). Managing Threats and Vulnerabilities in the Future Internet. At Cyber Security & Privacy EU Forum 2012, April, Berlin, Germany.
  6. Markatos, E.P. (2012). Privacy-Preserving Social Plugins.  Invited talk at Boston University, June, Boston, MA, USA.
  7. Markatos, E.P. (2012). Privacy-Preserving Social Plugins. Invited talk at University of Miami, June, Miami, FL, USA.
  8. Markatos, E.P. (2012). Real-world Polymorphic Attack Detection. Invited talk at T-Labs, TU-Berlin, April, Berlin, Germany.
  9. Markatos, E.P. (2012). Real-world Polymorphic attack Detection. Invited talk at Imperial College, March, London, United Kingdom.
  10. Markatos, E.P. (2012). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms. Invited talk at Cambridge Systems Workshop, March, Cambridge, United Kingdom.
  11. Ioannidis, S. (2012). Systems Security Research at the Distributed Computing Systems Lab. Invited talk at Chalmers University of Technology, April, Goteborg, Sweden.
  12. Markatos, E.P. (2011). Detecting Polymorphic Cyberattacks. At "Network and Information Security: Research Ideas" workshop. Organized by Trust and Security Unit, DG INFSO, September, Brussels, Belgium.
  13. Markatos, E.P. (2011). Future Research Needs and Trends in Trustworthy ICT. At Information Day on ICT FP7 Call on Trustworthy ICT. Organized by the European Commission, September, Brussels, Belgium.
  14. Ioannidis, S. (2011). Future Threats in Networked Systems. Network and Information Security Ideas Workshop, European Commission, September 22, Brussels.
  15. Markatos, E.P. (2011). Privacy and Social Networks. At "Privacy Protection and ICT: Research Ideas" workshop. Organized by Trust and Security Unit, DG INFSO, September, Brussels, Belgium.
  16. Ioannidis, S. (2011). Privacy-preserving Policies, Protocols and Architectures. International Workshop of Policies for the Future Internet, June, Pisa, Italy.
  17. Markatos, E.P., & Polychronakis, M. (2011). Real-world Polymorphic Attack Detection. Invited talk at University of Cyprus, November, Nicosia, Cyprus.
  18. Markatos, E.P., & Polychronakis, M. (2011). Real-world Polymorphic Attack Detection. At ASPLOS 2012 Program Committee mini-symposium, October, Rochester, NY, USA.
  19. Markatos, E.P. (2011). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. Invited talk at Northeastern University, July, Boston, MA, USA.
  20. Markatos, E.P. (2011). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At Effectsplus clustering meeting, July, Amsterdam, The Netherlands.
  21. Ioannidis, S. (2011). WOMBAT: Worldwide Observatory of Malicious Behaviors and Attack Threats. BIC Building International Collaboration for Trustworthy ICT, Workshop on Systems Security (SysSec), July, Amsterdam, Netherlands.
  22. Ioannidis, S. (2010). Cloud Computing Threats (real and perceived). Free and Open Source Software Workshop, University of Crete, May.
  23. Markatos, E.P. (2010). Collaboration in Systems Security. At Inco-Trust networking session in ICT 2010, September, Brussels, Belgium.
  24. Ioannidis, S. (2010). GPU-Assisted Malware. AIT Workshop on Practical aspects of security (PRACSE), October.
  25. Markatos, E.P. (2010). Managing Threats and Vulnerabilities in the Future Internet. At "WebScienceNet " meeting, December, Patras, Greece.
  26. Markatos, E.P. (2010). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At "Open Doors FORTH-ICS ", October, Heraklion, Greece.
  27. Markatos, E.P. (2010). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At Effectsplus networking session in ICT 2010, September, Brussels, Belgium.
  28. Markatos, E.P. (2010). Threats and Vulnerabilities in the Future Internet: The SysSec project. At Effectsplus 1st technical cluster meeting, March, Brussels, Belgium.
  29. Ioannidis, S. (2009). Web Security. W3C Workshop, Foundation for Research and Technology – Hellas, September.
  30. Ioannidis, S. (2009). Gnort: High Performance Intrusion Detection Using Graphics Processors. AIT Workshop on Practical aspects of security (PRACSE), June.
  31. Ioannidis, S. (2009). Privacy as a System Service. HIDE EU Project Privacy Enhancing Technologies Working Group, London.
  32. Ioannidis, S. (2008). Security and Privacy in a Networked and Mobile World.  FIDIS Interdisciplinary Doctoral Consortium, June.

Technical & Research Reports (89)

ICS-FORTH Technical Reports

  1. Tsioliaridou, N. A., & Ioannidis, S. (2014). Building Software Defined Materials with Nanonetworks.  (2014.TR447_Software_Defined_Materials_Nanonetworks.pdf).
  2. Pratikakis , P., Chinis, G, Athanasopoulos, E., & Ioannidis, S. (2012). Practical Information Flow for Legacy Web Applications.  (2012.TR428_Practical-Information_Flow_for_Legacy_Web_Applications.pdf).
  3. Gessiou, E., Athanasopoulos, E., & Ioannidis, S. (2011). Digging up Social Structures from Documents on the Web.  (2011.TR412_Social_Structures_Documents_on_the_web.pdf).
  4. Gessiou, E., Hieu Vu, Q., & Ioannidis, S. (2011). IRILD: an Information Retrieval based method for Information Leak Detection.  (2011.TR413_IRILD.pdf).
  5. Ligouras, S. (2011). Protecting the Social Graph: Client-side mitigation of Cross-Site Content Forgery attacks. Προστατεύοντας τον Κοινωνικό Γράφο: Αντιμετώπιση Cross-Site Content Forgery επιθέσεων στην πλευρά του χρήστη
  6. Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2009). Digital is Calling the Analog : Robust Prevention of Dial Attacks.  (2009.TR399_Robust_Prevention_Dial_Attacks.pdf).
  7. Athanasopoulos, E., Pappas, V., Ligouras, S., & Markatos, E.P. (2009). JS : Lightweight Cross-Site Scripting Prevention Using Isolation Operators.  (2009.TR400_Lightweight_Cross-Site_Scripting.pdf).
  8. Anagnostakis, K.G., Antonatos, S., & Markatos, E.P. (2006). Honey@home: A New Approach to Large-Scale Threat Monitoring.  (2006.TR378_Large-Scale_Threat_Monitoring.pdf).
  9. Athanasopoulos, E., & Markatos, E.P. (2006). Misusing Unstructured P2P Systems to Perform DoS Attacks:The Network that Never Forgets.  (2006.TR370_Misusing_Unstructured_P2P_Systems.pdf).
  10. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation.  (2006.TR368_Network_Level_Polymorphic_Shellcode_Detection.pdf).
  11. Anagnostakis, K.G., Antonatos, S., Akritidis, P., & Markatos, E.P. (2005). Defending against Hitlist Worms using Network Address Space Randomization.  (2005.TR349_Network_Address_Space_Randomization_Against_Worms.pdf).
  12. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow Honeypots.  (2005.TR348_Targeted_Attacks_Shadow_Honeypots.pdf).
  13. Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2004). A Network-Processor-Based Traffic Splitter for Intrusion Detection.  (2004.TR342_Network_Processor_Traffic_Splitter_Intrusion_Detection.pdf).
  14. Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Traffic Splitter Architecture for Intrusion Detection.  (2003.TR323.Active_Traffic_Splitter.pdf).
  15. Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2002, December 2002). Benchmarking and Design of String Matching Intrusion Detection Systems. Technical Report 315. December 2002.
  16. Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2002, October 2002). E2 XB: A Domain-Specific String Matching Algorithm for Intrusion Detection. Technical Report 311. October 2002.
  17. Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002, October 2002). Exclusion-based signature matching for intrusion detection.  (2002.TR310.String_Matching_for_Intrusion_Detection.pdf).
  18. Portokalidis, G., Markatos, E.P., & Marazakis, M. (2002, October 2002). Study and Bridging of Peer-to-Peer File Sharing Systems.  (2002.TR312.Bridging_Peer-to-Peer_File_Sharing_Systems.pdf).
  19. Markatos, E.P. (2001). Speeding up TCP / IP : Faster Processors are not Enough.  (2001.TR297.SpeedingUp_TCP_IP_faster_processors.ps.gz).
  20. Markatos, E.P. (2001). Tracing a large-scale Peer to Peer System:an hour in the life of Gnutella.  (2001.TR298.Tracing_Peer_to_Peer_System.pdf).
  21. Lalis, S., & Karipidis, A. (2000). An Open Market-Based Architecture for Distributed Computing.  (2000.TR266.OpenMarket_Architecture_Distributed_Computing.ps.gz).
  22. Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2000, October 2000). Web-Conscious Storage Management for Web Proxies.  (2000.TR275.Web_Conscious_Storage_Management_Web_Proxies.pdf).
  23. Mavroidis, I., Tsalapata, H., & Kapidakis, S. (1999). Multilingual Extensions to DIENST.  (1999.TR248.Multilingual_Extensions_to_DIENST.ps.gz).
  24. Kapidakis, S., Alexakos, P., & Tsalapata, H. (1999). Parametarization of DIENST Metadata Search Fields.  (1999.TR249.Parametarization_DIENST_Metadata_Search_Fields.ps.gz).
  25. Houstis, C.E., Lalis, S., & Tsalapata, H. (1999). THETIS: An environmental information system for the support of Coastal Zone management.  (1999.TR256.THETIS_Environmental_Inf_System_Coastal_Zone_Manag.ps.gz).
  26. Kapidakis, S., Sapountzis, G., & Tsalapata, H. (1999). Z39.50 Access to A Dienst Digital Library.  (1999.TR247.Access_to_a_Dienst_Digital_Library.ps.gz).
  27. Lalis, S., Marazakis, M., & Papadakis, D. (1998). Effects on an Asynchronous Resource Allocation Protocol on End-to-End Service Provision.  (1998.TR239.Asynchronous_Resource_Allocation_Protocol.pdf.gz).
  28. Lalis, S., Houstis, C.E., & Christophides, V. (1998). Exploring Knowledge for the Interactive Specification of Scientific Workflows.  (1998.TR229.Interactive_Specification_Scientific_Workflows.ps.gz).
  29. Lalis, S., Nikolaou, Ch., Papadakis, D., & Marazakis, M. (1998). Market-driven Service Allocation in a QoS-capable Environment.  (1998.TR217.Service_Allocation_QoS-capable.Environment.ps.gz).
  30. Pnevmatikatos, D., Markatos, E.P., Magklis, G.I., & Ioannidis, S. (1998). On Using Network RAM as a non-volatile Buffer.  (1998.TR227.NVRAM.ps.gz).
  31. Nikolaou, Ch., & Marazakis, M. (1998). System Infrastructure for Digital Libraries: A Survey and Outlook.  (1998.TR237.System_Infrastructure_for_DLs.ps.gz).
  32. Nikolaou, Ch., Labrinidis, A., Volker, B., Ferguson, D., Artavanis, M., Kloukinas, Ch., & Marazakis, M. (1998). The Impact of Workload Clustering on Transaction Routing.  (1998.TR238.Impact_Workload_Clustering_Trans_Routing.ps.gz).
  33. Houstis, C.E., Nikolaou, Ch., Lalis, S., Kapidakis, S., & Christopides, V. (1998). Towards a next generation of open scientific data repositories and services.  (1998.TR219.Next_Generation_Open_Scientific_Data_Repositories.ps.gz).
  34. Houstis, C.E., Nikolaou, Ch., Marazakis, M., Patrikalakis, N., Pito, R., Sairamesh, J., & Thomasic, A. (1997). Design of a Data Repositories Collection and Data Visualization System for Coastal Zone Management of the Mediterranean Sea.  (1997.TR200.THETIS.ps.gz).
  35. Nikolaou, Ch., Houstis, C.E., Sairamesh, J., & Patrikalakis, N. (1997). Impact of Scientific Advanced Networks for the Transfer of Knowledge and Technology in the Field of Coastal Zones.  (1997.TR188.Impact_Advanced_Networks_Field_Coastal_Zones.ps.gz).
  36. Sairamesh, J., Kapidakis, S., Terzis, S., & Nikolaou, Ch. (1997). Performance Framework for QoS based Searching and Retrieval in Digital Libraries.  (1997.TR204.QoS_Searching_Retrieval_DL.ps.gz).
  37. Terzis, S. (1997). Performance Monitoring in Digital Library Systems.  (1997.TR210.performance_monitoring_DLs.ps.gz).
  38. Marazakis, M., Papadakis, D., & Nikolaou, Ch. (1997). The Aurora Architecture for Developing Network-Centric Applications by Dynamic Composition of Services.  (1997.TR213.AURORA_Developing_Network-Centric_Applications.ps.gz).
  39. Nikolaou, Ch., Marazakis, M., Papadakis, D., Yeorgiannakis, Y., & Sairamesh, J. (1997). Towards a Common Infrastructure for Large-Scale Distributed Applications.  (1997.TR201.Infrastructure_large_scale_distr_application.ps.gz).
  40. Markatos, E.P. (1997). Tracing a large-scale Peer to Peer System: an hour in the life of Gnutella. 
  41. Paragios, N., & Tziritas, G. (1996). Adaptive Detection and Localization of Moving Objects in Image Sequences.  (1996.TR174.Adaptive_Detection_Localization_Moving_Object_Image_Sequences.ps.gz).
  42. Anastasiadi, A., Kapidakis, S., Sairamesh, J., & Nikolaou, Ch. (1996). Economic Models for Resource Allocation and Services in Distributed Information Systems.  (1996.TR166.Economic_Models_for_Resource_Allocation_Serv_Distr_Inform_Systems.ps.gz).
  43. Saridakis, T. (1995). ArrayTracer:A Parallel Performance Analysis Tool.  (1995.TR136.ArrayTracer_Parallel_Performance_Analysis_Tool.ps.gz).
  44. Georgiannakis, G., Houstis, C.E., Kapidakis, S., Karavassili, M., Nikolaou, Ch., Labrinidis, A., Marazakis, M., Markatos, E.P., Mavronicolas, M., Chabridon, S., Gelenbe, E., Born, E., Richter, L., & Riedl, R. (1995). DESCRIPTION OF THE ADAPTIVE RESOURCE MANAGEMENT PROBLEM, COST FUNCTIONS AND PERFORMANCE OBJECTIVES.  (1995.TR130.LYDIA.D1.ps.gz).
  45. Paragios, N., & Tziritas, G. (1995). Detection and location of moving objects using deterministic relaxation algorithms.  (1995.TR155.Detection_movingObjects_using_deterministic_relaxation_algorithms.ps.gz).
  46. Kapidakis, S., & Mavronikolas, M. (1995). Distributed, Low Contention Task Allocation.  (1995.TR133.Distributed_LowContention_TaskAllocation.ps.gz).
  47. Busch, C., & Mavronikolas, M. (1995). Impossibility Results for Threshold Networks.  (1995.TR137.Impossibility_Results_Threshold_Networks.ps.gz).
  48. Patras, I., Alvertos, N., & Tziritas, G. (1995). Joint disparity and motion field estimation in stereoscopic image sequences.  (1995.TR157.Joint_disparity_motionField_estimation_stereoscopic_image_sequences.ps.gz).
  49. Marazakis, M. (1995). Simulation of TP Systems and a Study of Methods for Performance Goal Satisfaction.  (1995.TR140.Simulation_ProcessingSystems_Methods_Performance_GoalSatisfaction.ps.gz).
  50. Marakakis, M., & Nikolaou, Ch. (1995). Towards Adaptive Scheduling of Tasks in Transactional Workflows.  (1995.TR134.WorkflowManagement.WSC95-final.ps.Z).
  51. Chung, J.Y., Ferguson, D., Wang, G., Nikolaou, Ch., & Teng, J. (1994). Goal oriented dynamic buffer pool management for data base systems.  (1994.TR125.Goal_oriented_dynamic_buffer_dbase_syst.ps.gz).
  52. Busch, C., & Mavronikolas, M. (1994). Providing Correctness for Balancing Networks.  (1994.TR126.Providing_Correctness_for_Balancing_Networks.ps.gz).
  53. Markatos, E.P. (1993). How Architecture Evolution Influences the Scheduling Discipline used in Shared-Memory Multiprocessors.  (1993.PARCO93.Architecture_infuence_on_Scheduling.ps.Z).
  54. Hardavellas, N., Karakos, D., & Mavronikolas, M. (1993). Notes on Sorting and Counting Networks.  (1993.TR92.WDAG93.Sorting_Counting_Networks.ps.Z).

M.S. Theses

  1. Sfakianakis, A. (2012). CensMon : a web censorship monitor
  2. Koromilas, L. (2012). Implementing an architecture for efficient network traffic processing on modern graphics hardware. 
  3. Chinis, G. (2012). Practical Information Flow for Legacy Web Applications
  4. Petsas, A.  (2012). Rise of the Planet of the Apps:A Systematic Study of the Mobile App Ecosystem. 
  5. Kontaxis, G. (2011). A Lightweight Censorship-resistant Web Access Architecture
  6. Tzermias Zacharias, Z. (2011). Combining Static and Dynamic Analysis for the Detection of Malicious Documents
  7. Zarras, A. (2011). Detecting and Defending Against Fraud in the Underground Economy
  8. Gkesiou, E. (2011). Trawling the Deep Web
  9. Krithinakis, A. (2010). RaJa: Cross-site Scripting Detection and Prevention Using Souirce Randomization. October 2010.
  10. Kapravelos, A. (2010). Robust prevention of DIAL attacks. July 2010.
  11. Makridakis, A. (2009). Antisocial Networks: Turning a Social Network into an Attack Platform . November 2009.
  12. Polakis, I.S. (2009). Exploring honeypot Technologies for malware Collection and Cyber-attack Information Acquisition. November 2009.
  13. Lekakis, V. (2009). Overlay Networks based on Selfish Neighbor Selection. 2009.
  14. Nikiforakis, N. (2009). Parasitic Storage Systems: Free, Reliable and Globally Accesible Gigabytes. 2009.
  15. Pappas, V. (2009). xJS: Fighting Cross-Site Scripting Attacks Using Isolation Operators. 2009.
  16. Vasileiadis, G. (2008). Improving the Performance of Network Intrusion Detection Systems Using Graphics Processors. December 2008.
  17. Antoniadis, D. (2007). Appmon: An Application for Accurate Per-Application Network Traffic Characterization. December 2007.
  18. Papadogiannakis, A. (2007). Improving the Performance of Passive Network Monitoring Applications. December 2007.
  19. Athanatos, E. (2007). Prototype Deployment of the Network of Affined Honeypots Architecture. December 2007.
  20. Athanasopoulos, I. (2007). Using Unstructured Peer-to-Peer Systems as Denial of Service Attack Platforms. May 2007.
  21. Papoutsidis, E. (2006). A Biomedical GRID Infrastructure to Enable High-performing Data Mining and Knowledge Extraction Operations. April 2006.
  22. Koukis, D.V. (2006). A Framework for Network Traffic Anonymization. April 2006.
  23. Akritidis, P. (2005). Detection of Zero-Day Worms. December 2005.
  24. Antonatos, S. (2005). Network Address Space Randomization: A Proactive Defense Against Hitlist Worms. December 2005.
  25. Moschous, E. (2005). Transcoding Techniques for Mobile Web Access using the CC/PP Protocol. December 2005.
  26. Koutsourakis, P. (2004). Segmentation using graph cuts applied to change detection. November 2004.
  27. Lelis, S. (2003). An Agent-based Model of Sites Popularity. 2003.
  28. Zikos, G. (1998). A Wavelet Based Framework for Human Face Detection and Recognition. November 1998.
  29. Kloukinas, Ch. (1997). Ομαδοποίηση "εν πτήσει" Δοσοληψιών σε Ομάδες με Παρόμοια Χαρακτηριστικά Φόρτου Εργασίας . April 1997.

Ph.D. Theses

  1. Papadakis, Ch (2011). Improving Routing in Unstructured Peer-to-Peer Systems
  2. Athanasopoulos, E. (2011). Modern Techniques for the Detection and Prevention of Web2.0 Attacks
  3. Antoniades, D. (2011). Understanding File and Information Sharing Services in Web. 2.0
  4. Antonatos, S. (2009). Defending against known and unknown attacks using a Network of Affined Honeypots. November 2009.
  5. Polychronakis, M. (2009). Generic Detection of code Injection Attacks using network- level Emulation. November 2009.

Other Technical Reports

  1. Tsioliaridou, N. A., Liaskos, C. K., Ioannidis, S., & Dimitropoulos, X. , Pitsillides, A. (2015). Mitigating the broadcast storm in nanonetworks with 16-bits. (Submitted) TR-TNL-IRG-2015-1

Other (23)

Professional

  1. FORTH, ICS (2012). SAFELINE Annual Report. 
  2. FORTH, Safeline (2012). SafeLine: Towards a saferinternet for all!. 20 May, http://www.ics.forth.gr/dcs/Activities/digitalcrete%20may292012.jpg.
  3. FORTH, ICS (2012). Οδηγός Παράνομου Περιεχομένου στο Διαδίκτυο. 
  4. FORTH, ICS (2011). SAFELINE Annual Report. 
  5. Grossman, W. M.  (2011). Sotiris Ioannidis of FORTH-ICS on using GPUs for intrusion detection . 27 January, http://www.theinquirer.net/inquirer/feature/1938790/sotiris-ioannidis-forth-ics-gpus-intrusion-detection.
  6. FORTH, Safeline (2011). What parents should notice about their children. 10 August, http://www.ics.forth.gr/dcs/Activities/Patris_10.08.2011.JPG.
  7. FORTH, ICS (2010). SAFELINE Annual Report. 
  8. FORTH, ICS (2009). SAFELINE Annual Report. 
  9. Markidou, E., & Arevalo-Torres, Y (2008). SafeLine, the Greek Internet Hotline in the fight against cyber Crime.  http://www.ics.forth.gr/_pdf/brochures/Parliament-Safeline.pdf.
  10. Leyden, J. (2008). Facebook app shows botnet risk. September, http://www.theregister.co.uk/2008/09/08/facebot/.
  11. Polychronakis, M., Markatos, E.P., Mitsos, Y., Gajin, S., & Muratovski, G. (2008). Real-world Polymorphic Attack Detection. 4 (2).
  12. FORTH, ICS (2008). SAFELINE Annual Report. 
  13. Markatos, E.P., Ioannidis, S., & Kruegel, Ch. (2008). Tracing the Changing Nature of Cyber-attacks. 4 (4), http://www.ics.forth.gr/_pdf/brochures/forward-enisa-quarterly-2008.4.pdf.
  14. FORTH, ICS (2008). Θέλω να είμαι ασφαλής όταν χρησιμοποιώ το Διαδίκτυο στο Κινητό μου τηλέφωνο.  Δίπτυχο, ενημερωτικό φυλλάδιο.
  15. FORTH, ICS (2007). All you want to know about Optical Firewalls . May, http://www.ics.forth.gr/_pdf/brochures/INSIDE_TECH.pdf.
  16. FORTH, ICS (2007). Monitoring traffic to protect internet users. October, http://www.ics.forth.gr/_pdf/brochures/LOBSTER_eSt_with-source.pdf.
  17. FORTH, ICS (2007). SAFELINE Annual Report. 
  18. Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). On Exploiting a File Sharing System for DDoS Attacks . October, http://www.ics.forth.gr/_pdf/brochures/gnutella-ddos-enisa-quarterly-2006.3.pdf.
  19. FORTH, ICS (2006). SAFELINE Annual Report. 
  20. FORTH, ICS (2005). Electronic "Thieves" on the Internet. August, http://www.ics.forth.gr/_pdf/brochures/tolmi-all_landscape.pdf.
  21. FORTH, ICS (2005). SAFELINE Annual Report. 
  22. FORTH, ICS (2004). Safeline: The first year. 

Other

  1. Goodin, D. (2010). Researchers up evilness ante with GPU-assisted malware. 28 September, http://www.theregister.co.uk/2010/09/28/gpu_assisted_malware/.
Found: 574 publications