ITE - ΙΝΣΤΙΤΟΥΤΟ ΠΛΗΡΟΦΟΡΙΚΗΣ
ITE - ΙΝΣΤΙΤΟΥΤΟ ΠΛΗΡΟΦΟΡΙΚΗΣ
|  Publications of (DiSCS)  |  Conferences

Publications

Publications of (DiSCS)

Conferences (224)

Papers in Proceedings (full-paper reviewed)

  1. Pachilakis, M, Papadopoulos, P., Laoutaris, N., Markatos, E.P., & Kourtellis, N. (2022). YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy. ACM SIGMETRICS, Mumbai, India, June 2022. (pdf).
  2. Marchioro, T., Giaretta, L., Markatos, E.P., & Girdzijauskas, Š. (2022).  Federated Naive Bayes under Differential Privacy19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
  3. Kazlouski, A., Marchioro, T., & Markatos, E.P. (2022).  What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
  4. Anastasiadi, E., Athanasopoulos, E., & Markatos, E.P. (2022). The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. 19th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2022. (pdf).
  5. Gkolemi, M., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2022). YouTubers Not madeForKids: Detecting Channels Sharing Inappropriate Videos Targeting Children. 14th ACM Web Science Conference 2022 (WebSci 2022), Barcelona, Spain, July 2022. (pdf).
  6. Papadogiannakis, E., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2022). Leveraging Google’s Publisher-Specific IDs to Detect Website Administration. ACM Web Conference 2022, Virtual Event, Lyon France, April 2022. (pdf).
  7. Pantelakis, G., Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2022). Measuring the (Over) use of Service Workers for In-Page Push Advertising Purposes . International Conference on Passive and Active Network Measurement (PAM 2022), Online, March 2022 (pp. 426-438). (pdf).
  8. Karagounis, D., Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2021). A Hardware Implementation of BitSurfing for Communication without Packet CreationProceedings of the Eight Annual ACM International Conference on Nanoscale Computing and Communication, Online, Semptember 2021.
  9. Deyannis , D., Karnikis, D., Vasiliadis, G., & Ioannidis, S. (2021). Andromeda: Enabling Secure Enclaves for the Android Ecosystem. Proceedings of the International Conference on Information Security, Online, November 2021. (pdf).
  10. Diamantaris, M., Moustakas, S., Sun, L., Ioannidis, S., & Polakis, I. (2021). This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data ExfiltrationProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021.
  11. Hatzivasilis, G., & al,  (2021). The THREAT-ARREST Cyber Range Platform2021 IEEE International Conference on Cyber Security and Resilience (CSR), Online, July 2021.
  12. Marchioro, T., Kazlouski, A., & Markatos, E.P. (2021). User Identification from Time Series of Fitness Data18th International Conference on Security and Cryptography (SECRYPT 2021), Online, July 2021.
  13. Chalkiadakis, M., Kornilakis, A., Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2021). The Rise and Fall of Fake News sites: A Traffic Analysis. Proceedings of the 13th ACM Web Science Conference (WebSci 2021), Online, June 2021 (pp. 168-177). (pdf).
  14. Giaretta, L., Savvidis, I., Marchioro, T., Girdzijauskas, Š., Pallis, G., Dikaiakos D., M., & Markatos, E.P. (2021). PDS^2: A user-centered decentralized marketplace for privacy preserving data processing. Proceedings of the 37th International Conference on Data Engineering Workshops (ICDEW), Online, April 2021 (pp. 92-99). (pdf).
  15. Papadogiannakis, E., Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2021). User tracking in the post-cookie era: How websites bypass gdpr consent to track users. Proceedings of the 30th Web Conference 2021, Online, April 2021. (pdf).
  16. Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2021). I still See You! Inferring Fitness Data from Encrypted Traffic of Wearables14th International Joint Conference on Biomedical Engineering Systems and Technologies HEALTHINF , Vienna, Austria, February 2021 (pp. 369-376).
  17. Humphries, G., Nordvik, R., Manifavas, H., Cobley, P., & Sorell, M. (2021). Law Enforcement educational challenges for mobile forensics. Proceedings of the 1st DFRWS APAC Conference on Digital Forensics, Online, January 2021. (pdf).
  18. Bajovic, D., Bakhtiarnia, A., Bravos, G., Brutti, A., Burkhardt, F., Cauchi, D., Chazapis, A., Cianco, C., Dall’Asen, N., Delic, V., Dimou, Ch., Djokic, D., Escobar-Molero, A., Esterle, L., Eyben, F., Farella, E., Festi, Th., Geromitsos, A., Giakoumakis, G., Hatzivasilis, G., Ioannidis, S., Iosifidis, A., Kallipolitou, Th., Kalogiannis, G., Kiousi, A., Kopanaki, D., Marazakis, M., Markopoulou, S., Muscat, A., Paissan, F., Pariente Lobo, T., Pavlovic, D., Raptis, Th.P., Ricci, E., Saez, B., Sahito, F., Scerri, K., Schuller, B., Simic, N., Spanoudakis, G., Tomasi, A., Triantafyllopoulos, A., Valerio, L., Villazán, J., Wang, Y., Xuereb, A., & Zammit, J. (2021). MARVEL: Multimodal Extreme Scale Data Analytics for Smart Cities Environments. Novi Sad, Serbia, 20-22 Sept. (pp. 143-147). IEEE.
  19. Maglaras, L., Drivas, G., Chouliaras, N., Boiten, E., Lambrinoudakis, C., & Ioannidis, S. (2020). Cybersecurity in the Era of Digital Transformation: The case of Greece2020 International Conference on Internet of Things and Intelligent Applications (ITIA), Zhenjiang, China , November 2020.
  20. Drakonakis, K., Ioannidis, S., & Polakis, I. (2020). The cookie hunter: Automated black-box auditing for web authentication and authorization flaws2020 ACM SIGSAC Conference on Computer and Communications Security, Online, October 2020.
  21. Chalkiadakis, N., Deyannis , D., Karnikis, D., Vasiliadis, G., & Ioannidis, S. (2020). The Million Dollar Handshake: Secure and Attested Communications in the Cloud2020 IEEE 13th International Conference on Cloud Computing (CLOUD), Online, October 2020.
  22. Cucurull, J., Tselios, C., Rueda, C., Folch, N., Copty, F., Igbaria, R., Athanatos, M., Krithinakis, A., Ioannidis, S., Francisco-Ruiz, J., & Barrientos, P. (2020). Integration of an online voting solution with the SMESEC security framework2020 IEEE International Systems Conference (SysCon), Online, August 2020.
  23. Korniotakis, J., Papadopoulos, P., & Markatos, E.P. (2020). Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing ModesIn Proceedings of the1 7th International Conference on Security and Cryptography (SECRYPT 2020), Online, July 2020.
  24. Giakoumakis, G., Papadogiannaki, E., Vasiliadis, G., & Ioannidis, S. (2020). Pythia: Scheduling of concurrent network packet processing applications on heterogeneous devices2020 6th IEEE Conference on Network Softwarization (NetSoft), Online, June 2020.
  25. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2020). Mobility-aware Beam Steering in Metasurface-based Programmable Wireless EnvironmentsICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Online, April 2020.
  26. Deyannis , D., Papadogiannaki, E., Kalivianakis, G., Vasiliadis, G., & Ioannidis, S. (2020). Trustav: Practical and privacy preserving malware analysis in the cloud (CODASPY '21)Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, Online, March 2020.
  27. Hatzivasilis, G., & Et, al. (2019). Secure Semantic Interoperability for IoT Applications with Linked Data2019 IEEE Global Communications Conference (GLOBECOM), December 2019 (pp. 1-6).
  28. Paschalides, D., Kornilakis, A., Christodoulou, C., Andreou, R., Pallis, G., Dikaiakos, M., & Markatos, E.P. (2019). Check-It: A Plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web. IEEE/WIC/ACM International Conference on Web Intelligence, Thessaloniki, Greece, October 2019 (pp. 298-302).
  29. Pachilakis, M, Papadopoulos, P., Markatos, E.P., & Kourtellis, N. (2019). No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem. Proceedings of the 19th Internet Measurements Conference 2019 (IMC'19), Amsterdam, Netherlands, October 2019. (pdf).
  30. Liaskos, C. K., Pyrialakos, G. G, Pitilakis, A., Abadal, S., Tsioliaridou, N. A., Tasolamprou, A., Tsilipakos, O., Kantartzis, N. , Ioannidis, S., Alarcón, E., Cabellos-Aparicio, A., Kafesaki, M. , Pitsillides, A., Kossifos, K., Georgiou, J., & Akyildiz, I. (2019). ABSense: Sensing Electromagnetic Waves on Metasurfaces via Ambient Compilation of Full AbsorptionProceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication (NANOCOM '19), Dublin, Irelan, September 25 - 27, Article No.: 14 (pp. 1-6). ACM.
  31. Solomos, K., Ilia, P., Ioannidis, S., & Kourtellis, N. (2019). Talon: An Automated Framework for Cross-Device Tracking Detection. Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China, September 2019. (pdf).
  32. Papadopoulos, P., Ilia, P., & Markatos, E.P. (2019). Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking. Proceedings of 22nd Information Security Conference (ISC), New York, USA, September 2019. (pdf).
  33. Chatzimpyrros, M., Solomos, K., & Ioannidis, S. (2019). You Shall Not Register! Detecting Privacy Leaks Across Registration FormsIOSec/MSTEC/FINSEC@ ESORICS, September 2019.
  34. Tasolamprou, A., Pitilakis, A., Tsilipakos, O., Liaskos, C. K., Tsioliaridou, N. A., Liu, F., Wang, X., Mirmoosa, M., Kossifos, K., Georgiou, J., Pitsillides, A., Kantartzis, N. , Manessis, D., Ioannidis, S., Kenanakis, G., Deligeorgis, G. , Economou, N.T., Tretyakov, S., & Soukoulis, C. , Kafesaki, M.  (2019). The Software-Defined Metasurfaces Concept and Electromagnetic Aspects. Proceedings of the 10th International Conference on Metamaterials, Photonic Crystals and Plasmonics (META19), Lisbon, Portugal, July 2019.
  35. Arapakis, I., & Et, al. (2019). Towards specification of a software architecture for cross-sectoral big data applications2019 IEEE World Congress on Services (SERVICES), July 2019.
  36. Tzagkarakis, Ch., Petroulakis, N.E., & Ioannidis, S. (2019). Botnet Attack Detection at the IoT Edge Based on Sparse RepresentationGlobal IoT Summit (GIoTS 2019), Aarhus, Denmark, 17-21 June. IEEE.
  37. Marcantoni, F., Diamantaris, M., Ioannidis, S., & Polakis, I. (2019). A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks. In Proceedings of The World Wide Web Conference, San Francisco, USA, May 2019. (pdf).
  38. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2019). Cookie synchronization: Everything you always wanted to know but were afraid to ask. Proceedings of the 28th International Conference on World Wide Web, San Fransisco, USA, May 2019. (pdf).
  39. Hatzivasilis, G., Soultatos, O., Ioannidis, S., Verikoukis, C., Demetriou, G., & Tsatsoulis, C. (2019). Review of security and privacy for the Internet of Medical Things (IoMT)2019 15th international conference on distributed computing in sensor systems (DCOSS), May 2019.
  40. Hatzivasilis, G., Christodoulakis, N., Tzagkarakis, Ch., Ioannidis, S., Demetriou, G., Fysarakis, K., & Panayiotou, M. (2019). The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), May 2019.
  41. Kritikos, K., Papoutsakis, M., Ioannidis, S., & Magoutis, K. (2019). Towards configurable cloud application security2019 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), May 2019.
  42. Hatzivasilis, G., Soultatos, O., Chatziadam, P., Fysarakis, K., Askoxylakis, I., Ioannidis, S., Alaxandris, G., Katos, V., & Spanoudakis, G. (2019). WARDOG: Awareness detection watchbog for Botnet infection on the host deviceIEEE Transactions on Sustainable Computing, May 2019.
  43. Diamantaris, M., Papadopoulos, E. P. , Markatos, E.P., Ioannidis, S., & Polakis, I. (2019). REAPER: Real-time App Analysis for Augmenting the Android Permission System. Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), Dallas, TX, USA, March 2019. (pdf).
  44. Papadopoulos, P., Ilia, P., Polychronakis, M., Markatos, E.P., Ioannidis, S., & Vasiliadis, G. (2019). Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. Proceedings of the the Network and Distributed System Security Symposium (NDSS '19), San Diego, USA, February 2019. website, (pdf).
  45. Drakonakis, K., Ilia, P., Ioannidis, S., & Polakis, I. (2019). Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. In Proceedings of the Network and Distributed System Security Symposium (NDSS) , San Diego, CA, February 2019. (pdf).
  46. Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). Where’s Wally? How to Privately Discover your Friends on the Internet. In proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018), Songdo, Incheon, Korea, June 2018. (pdf).
  47. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). The Cost of Digital Advertisement: Comparing User and Advertiser Views. Proceedings of the 27th International World Wide Web Conference (WWW 2018), Lyon, France, April 2018. (pdf).
  48. Tsirantonakis, G., Ilia, P., Ioannidis, S., Athanasopoulos, E., & Polychronakis, M. (2018). A Large-scale Analysis of Content Modification by Open HTTP Proxies.. Proceedings of the Network and Distributed System Security Symposium (NDSS '18), San Diego, USA, February 2018. (pdf).
  49. Vasiliadis, G., Jakovetic, D., Spais, I., & Ioannidis, S. (2018). I-BiDaaS: Industrial-Driven Big Data as a Self-service SolutionEuropean Conference on Service-Oriented and Cloud Computing, September 2018. Springer, Cham.
  50. Liaskos, C. K., Nie, S., Tsioliaridou, N. A., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2018). Realizing Wireless Communication Through Software-Defined HyperSurface EnvironmentsIEEE 19th International Symposium on 'A World of Wireless, Mobile and Multimedia Networks' (WoWMoM 2018), Chania, Greece, 12-15 June. IEEE (pdf).
  51. Pitilakis, A., Tasolamprou, A., Liaskos, C. K., Liu, F., Tsilipakos, O., Wang, X., Mirmoosa, M., Kossifos, K., Georgiou, J., Pitsillides, A., Kantartzis, N. , Ioannidis, S., Economou, E., Kafesaki, M. , Tretyakov, S., & Soukoulis, C.  (2018). Software-Defined Metasurface Paradigm: Concept, Challenges, Prospects12th International Congress on Artificial Materials for Novel Wave Phenomena (Metamaterials 2018), Espoo, Finland, 27 Aug.-1 Sept. (pp. 483-485). IEEE (pdf).
  52. Papadopoulos, P., Kourtellis, N., Rodriguez , P., & Laoutaris, N. (2017). If you are not paying for it, you are the product: How much do advertisers pay to reach you?. Proceedings of the 17th Internet Measurements Conference 2017 (IMC'17), London, UK, November 2017. (pdf).
  53. Tsioliaridou, N. A., Liaskos, C. K., Pitsillides, A., & Ioannidis, S. (2017). A Novel Protocol for Network-Controlled Metasurfaces.Proceedings of the 4nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), September 2017. Washington, DC, USA (pdf).
  54. Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E.P., & Ioannidis, S. (2017). No Sugar but all the Taste! Memory Encryption without Architectural Support. Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017), Oslo, Norway, September 2017. (pdf).
  55. Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2017). The Socket Store: An App Model for the Application-Network Interaction. Proceedings of the 22nd IEEE Symposium on Computers and Communication (ISCC 2017), Heraklion, Crete, Greece, July 2017. (pdf).
  56. Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2017). CCSP: a Compressed Certificate Status Protocol. Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '17), Atlanta, GA, USA, May 2017. (pdf).
  57. Papadopoulos, E. P. , Diamantaris, M., Papadopoulos, P., Petsas, T., Ioannidis, S., & Markatos, E.P. (2017). The Long-Standing Privacy Debate: Mobile Websites Vs Mobile Apps. Proceedings of the 26th International World Wide Web Conference, (WWW 2017), Perth, Western Australia, April 2017. (pdf).
  58. Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S. (2017). SAMPAC: Socially-Aware collaborative Multi-Party Access Control. Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), Scottsdale, USA, March 2017. (pdf).
  59. Koryzis, D., Svolopoulos, V., & Spiliotopoulos, D. (2017). Implementing Digital Parliament Innovative Concepts for Citizens and Policy Makers4th International Conference, HCIBGO 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14 (pp. 154-170). Springer (978-3-319-58480-5).
  60. Koromilas, L., Vasiliadis, G., Athanasopoulos, E., & Ioannidis, S. (2016). GRIM: Leveraging GPUs for Kernel Integrity Monitoring. Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), France, Paris, September 2016. (pdf).
  61. Papadopoulos, P., Athanasopoulos, E., Kosta, E., Siganos, G., Keromytis, A.D., & Markatos, E.P. (2016). Provable Network Activity for Protecting Users against False Accusation. Proceedings of the 10th International Conference on Information Security Theory and Practice (WISTP'2016) , Heraklion, Crete, Greece, September 2016. (pdf).
  62. Tsioliaridou, N. A., Liaskos, C. K., Dedu, E., & Ioannidis, S. (2016). Stateless Linear-path Routing for 3D Nanonetworks. Proceedings of the 3nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), New York City, New York, USA, September 2016. (pdf).
  63. Antonakaki, D., Spiliotopoulos, D., Samaras, C., Ioannidis, S., & Fragopoulou, P. (2016). Investigating the Complete Corpus of Referendum and Elections Tweets. Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2016), San Francisco, CA, USA, August 2016. (pdf).
  64. Spiliotopoulos, D., Antonakaki, D., Ioannidis, S., & Fragopoulou, P. (2016). Usability Evaluation of Accessible Complex Graphs. Proceedings of the 15th International Conference on Computers Helping People with Special Needs, Linz, Austria, July 2016. (pdf).
  65. Koryzis, D., Samaras, C., Makri, E., Svolopoulos, V., & Spiliotopoulos, D. (2016). Visual Cue Streams for Multimodal Dialogue Interaction. Proceedings of the 7th International Conference on Applied Human Factors and Ergonomics, Orlando, FL, USA, July 2016. (pdf).
  66. Koryzis, D., Svolopoulos, V., & Spiliotopoulos, D. (2016). Metalogue: A Multimodal Learning Journey. Proceedings of the 9th ACM International Conference on Pervasive Technologies Related to Assistive Environments, New York, NY, USA, June 2016. (pdf).
  67. Spiliotopoulos, D., Antonakaki, D., Ioannidis, S., & Fragopoulou, P. (2016). Motivation Effect of Social Media Posts about Well-being and Healthy Living. Proceedings of the 9th ACM International Conference on Pervasive Technologies Related to Assistive Environments. ACM, New York, NY, USA, June 2016. (pdf).
  68. Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., & Kantartzis, N. , Pitsillides, A. (2016). A Deployable Routing System for Nanonetworks. In proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia , May 2016. (pdf).
  69. Tsioliaridou, N. A., Liaskos, C. K., Pachis, L. , Ioannidis, S., & Pitsillides, A. (2016). N3: Addressing and Routing in 3D Nanonetworks. IEEE International Conference on Telecommunications (ICT), Thessaloniki, Greece, May 2016. (pdf).
  70. Christoulakis, N., Christou, G., Athanasopoulos, E., & Ioannidis, S. (2016). HCFI: Hardware-enforced Control-Flow Integrity. In proceedings of the 6th ACM Conference on Data and Applications Security and Privacy (CODASPY), New Orleans, LA, US , March 2016. (Oustanding Paper Award).
  71. Haller, I., Göktaş, E., Athanasopoulos, E., Portokalidis, G., & Bos, H. (2015). ShrinkWrap: VTable protection without loose endsIn proceedings of the 31st Annual Computer Security Applications Conference (ACSAC) , Los Angeles, CA, US, December, 2015.
  72. Ilia, P., Polakis, I., Athanasopoulos, E., & Maggi, F, Ioannidis, S. (2015). Face/Off: Preventing Privacy Leakage From Photos in Social Networks. Proceedings of the 22nd ACM/SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA, November 2015. (pdf).
  73. Tsioliaridou, N. A., Liaskos, C. K., Ioannidis, S., & Pitsillides, A. (2015). CORONA: A Coordinate and Routing system for Nanonetworks. Proceedings of the 2nd ACM International Conference on Nanoscale Computing and Communication (ACM NANOCOM), Boston, Massachusetts, USA, September 2015. (pdf).
  74. Ladakis, E, Vasiliadis, G., Polychronakis, M., Ioannidis, S., & Portokalidis, G. (2015). GPU-Disasm: A GPU-based x86 DisassemblerIn proceedings of the 18th Information Security Conference (ISC), Trondheim, Norway, September 2015.
  75. Moffie, M., Goldsteen, A., Chen, W., Weyer, T., Ioannidis, S., & Kalogiros, C. (2015). Trust and Trustworthiness Maintenance: From Architecture to Evaluation. Proceedings of the 8th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, September 2015.
  76. Samaras, C., Tsioliaridou, N. A., Liaskos, C. K., Spiliotopoulos, D., & Ioannidis, S. (2015). Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering . Proceedings of the 8th International Conference on Trust & Trustworthy Computing (TRUST 2015), Crete, Heraklion, Greece, August 2015. (pdf).
  77. Polakis, I., Diamantaris, M., Petsas, T., & Maggi, F, Ioannidis, S. (2015). Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.In proceedings of the 12th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2015), Milano, Italy, July, 2015.
  78. Zarras, A., Papadogiannakis, A., Ioannidis, S., & Holz, Th. (2015). Revealing the Relationship Network Behind Link Spam. In Proceedings of the 13th Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 2015. (pdf).
  79. Athanasakis , M., Athanasopoulos, E., Polychronakis, M., Portokalidis, G., & Ioannidis, S. (2015). The Devil is in the Constants: Bypassing Defenses in Browser JIT EnginesProceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015), San Diego, CA, US, February 2015.
  80. Spiliotopoulos, D., Dalianis, A., & Koryzis, D. (2015). Speech Enabled Ontology Graph Navigation and Editing9th International Conference, UAHCI 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7 (pp. 487-494). Springer ( 978-3-319-20677-6).
  81. Göktaş, E., Athanasopoulos, E., Polychronakis, M., Bos, H., & Portokalidis, G. (2014). Size Does Matter - Why Using Gadget Chain Length to Prevent Code-reuse Attacks is HardProceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 2014.
  82. Lindorfer, M, Volanis, S., Sisto, A, Neugschwandtner, M, Athanasopoulos, E., Maggi, F, Platzer, C, Zanero, S., & Ioannidis, S. (2014). AndRadar: Fast Discovery of Android Applications in Alternative MarketsIn Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), London, UK, July 2014.
  83. Panagiotakis, C., Papadakis, H., & Fragopoulou, P. (2014). CoViFlowPro: a community visualization method based on a flow propagation algorithm8th International Conference on Bioinspired Information and Communications Technologies (BICT 2014), Boston, Massachusetts, December 01 - 03 (pp. 267-270 ). ACM.
  84. Koromilas, L., Vasiliadis, G., Manousakis, I., & Ioannidis, S. (2014). Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware ArchitecturesProceedings of the 10th ACM/IEEE Symposium on Architecture for Networking and Communications Systems (ANCS), Los Angeles, CA, USA, October 2014.
  85. Panagiotakis, C., Papadakis, H., & Fragopoulou, P. (2014). FlowPro: A flow propagation method for single community detectionIEEE 11th Consumer Communications and Networking Conference (CCNC 2014), Las Vegas, NV, USA, 10-13 Jan (pp. 17-22). IEEE.
  86. Deyannis , D., Koromilas, L., Vasiliadis, G., Athanasopoulos, E., & Ioannidis, S. (2014). Flying Memcache: Lessons Learned from Different Acceleration StrategiesProceedings of the 26th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), Paris, France, October, 2014.
  87. Vasiliadis, G., Koromilas, L., Polychronakis, M., & Ioannidis, S. (2014). GASPP: A GPU-Accelerated Stateful Packet Processing FrameworkIn Proceedings of the 2014 USENIX Annual Technical Conference (ATC)., Philadelphia, PA, USA, June 2014.
  88. Göktaş, E., Athanasopoulos, E., Bos, H., & Portokalidis, G. (2014). Out Of Control: Overcoming Control-Flow IntegrityIn Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, USA, May 2014.
  89. Vasiliadis, G., Athanasopoulos, E., Polychronakis, M., & Ioannidis, S. (2014). PixelVault: Using GPUs for securing cryptographic operationsProceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 2014.
  90. Stroggylos, K, Mitropoulos, D, Tzermias, Z., Papadopoulos, P., Rafailidis, F, Spinellis, D, Ioannidis, S., & Katsaros, P (2014). Securing Legacy Code with the TRACER PlatformIn Proceedings of the 18th Panhellenic Conference on Informatics (PCI 2014), Athens, Greece, October 2014.
  91. Antonakaki, D., Polakis, I., Athanasopoulos, E., Fragopoulou, P., & Ioannidis, S. (2014). Think before RT: An Experimental Study of Abusing Twitter TrendsSocial Informatics: 6th International Conference, Socinfo 2014, Lecture Notes in Computer Science , Barcelona, Spain, November 11-13 (vol. 8852, pp. 402-413). Springer.
  92. Zarras, A., Papadogiannakis, A., Gaw­lik, R., & Holz, Th. (2014). Au­to­ma­ted Ge­ne­ra­ti­on of Mo­dels for Fast and Pre­cise De­tec­tion of HTTP-Ba­sed Mal­wa­reIn Proceedings of the 12th An­nual Con­fe­rence on Pri­va­cy, Se­cu­ri­ty and Trust (PST), To­ron­to, Ca­na­da, July 2014.
  93. Polakis, I., Ilia, P., Maggi, F, Lancini, M, Kontaxis, G., Zanero, S., Ioannidis, S., & Keromytis, A.D. (2014). Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication . Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Arizona, USA, November 2014. (pdf).
  94. Tzermias, Z., Prevelakis, V., & Ioannidis, S. (2014). Privacy Risks from Public Data Sources. In Proceedings of the 29th IFIP International Information Security and Privacy Conference (SEC), , Marrakech, Morocco, June 2014. (pdf).
  95. Stroggylos, K, Mitropoulos, D, Tzermias, Z., Papadopoulos, P., Rafailidis, F, Spinellis, D, Ioannidis, S., & Katsaros, P (2014). TRACER: A Platform for Securing Legacy CodeIn Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, June 2014.
  96. Papadogiannakis, A., Loutsis, L., Papaefstathiou, V., & Ioannidis, S. (2013). ASIST: Architectural Support for Instruction Set RandomizationIn Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany , November 2013. (pdf).
  97. Panagiotakis, C., Papadakis, H., Grinias, E., Komodakis, N., Fragopoulou, P., & Tziritas, G. (2013). Interactive Image Segmentation via Graph Clustering and Synthetic Coordinates ModelingComputer Analysis of Images and Patterns : 15th International Conference, CAIP 2013, Lecture Notes in Computer Science , York, UK, August 27-29 (vol. 8047, pp. 589-596). Springer.
  98. Andriotis, P, Tzermias Zacharias, Z., Mparmpaki, A, Ioannidis, S., & Oikonomou, G. (2013). Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone DataIn International Journal of Digital Crime and Forensics (IJDCF), IGI Global, 2013 (vol. 5, pp. 34-54).
  99. Polakis, I., Volanis, S., Athanasopoulos, E., & Markatos, E.P. (2013). The man who was there: Validating check-ins in location-based servicesIn Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
  100. Panagiotakis, C., & Fragopoulou, P. (2013). Voting Clustering and Key Points SelectionComputer Analysis of Images and Patterns : 15th International Conference, CAIP 2013, Lecture Notes in Computer Science ,  York, UK, August 27-29 (vol. 8047, pp. 441-448). Springer.
  101. Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, Th., & Markatos, E.P. (2013). k-subscription: Privacy-preserving Microblogging Browsing through ObfuscationIn Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
  102. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2013). Rise of the Planet of the Apps: A Systematic Study of the Mobile App EcosystemIn Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
  103. Kondaxis, G., Athanasopoulos, E., Portokalidis, G., & Keromytis, A.D. (2013). SAuth: Protecting User Accounts from Password Database LeaksIn Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany , November 2013.
  104. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2013). Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed NetworksIn Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
  105. Gessiou, E., Volanis, S., Athanasopoulos, E., Markatos, E.P., & Ioannidis, S. (2012). Digging up social structures from documents on the webIn Proceedings of IEEE 2012 Communication and Information System Security Symposium (Globecom CISS), Anaheim, CA, USA, December 2012.
  106. Polakis, I., Lancini, M, Kondaxis, G., Maggi, F, Ioannidis, S., Keromytis, A. D., & Zanero, S. (2012). All your face are belong to us: Breaking Facebook¢s Social Authentication. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December . (pdf).
  107. Athanasopoulos, E., Kemerlis, V. P., Polychronakis, M., & Markatos, E.P. (2012). ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS'12), Singapore, June 2012. (pdf).
  108. Kontaxis, G., Polychronakis, M., Keromytis, A. D., & Markatos, E.P. (2012). Privacy-Preserving Social PluginsIn Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, August 2012.
  109. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2012). Tolerating Overload Attacks Against Packet Capturing SystemsIn Proceedings of the USENIX Annual Technical Conference (ATC)(available from usenix website ), Boston, MA, USA, June 2012. (pdf).
  110. Gessiou, E., Pappas, V., Athanasopoulos, E., Keromytis, A.D., & Ioannidis, S. (2012). Towards a Universal Data Provenance Framework using Dynamic Instrumentation. In Proceedings of the 27th IFIP International Information Security and Privacy Conference (IFIP SEC), Heraklion, Crete, Greece, June 2012. (pdf).
  111. Antoniades, D., Kontaxis, G., Athanasopoulos, E., Ioannidis, S., Markatos, E.P., & Karagiannis, Th. (2011).  we.b: The Web of Short URLsIn Proceedings of the 20th International World Wide Web Conference (WWW), Hyderabad, India, March 2011. (pdf).
  112. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2011). MIDeA: A Multi-Parallel Intrusion Detection ArchitectureIn Proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 2011. (pdf).
  113. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2011). Parallelization and Characterization of Pattern Matching using GPUs In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC), Austin, TX, USA, November 2011. (pdf).
  114. Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2011). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On PlatformsIn Proceedings of the 14th Information Security Conference (ISC), Xi'an, China, October 2011. (pdf).
  115. Markatos, E.P., Petsas, T., Polakis, I.S., & Antonatos, S. (2010). A systematic characterization of IM threats using honeypots. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 2010), Feb 2010. (pdf).
  116. Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). An architecture for enforcing JavaScript randomization in web2.0 applicationsShort paper in Proceedings of the 13th Information Security Conference (ISC 2010), Boca Raton, FL, USA, 25 October 2010 through 28 October 2010 (vol. 6531 LNCS, pp. 203-209). (03029743; 9783642181771 (ISBN)), (pdf).
  117. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2010). Comprehensive shellcode detection using runtime heuristicsProceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, (pp. 287-296). New York, NY, USA: ACM (978-1-4503-0133-6), (pdf).
  118. Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2010). D(e|i)aling with VoIP: Robust prevention of DIAL attacksIn Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece, September 20-22 (vol. 6345, pp. 663-678). (03029743; 3642154964 (ISBN); 9783642154966 (ISBN)), (pdf).
  119. Kontaxis, G., Polakis, I., & Markatos, E.P. (2010). Experiences and observations from the NoAH infrastructure6th European Conference on Computer Network Defense, EC2ND 2010, Berlin, October 28-29 (pp. 11-18). (9780769543116 (ISBN)), (pdf).
  120. Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2010). GPU-assisted malware. 5th International Conference on Malicious and Unwanted Software, Malware 2010, Nancy, October 19-20 (pp. 1-6). (9781424493555 (ISBN)), (pdf).
  121. Vasiliadis, G., & Ioannidis, S. (2010). GrAVity: A massively parallel antivirus engine. In Proceedings of the 13th International Symposium On Recent Advances In Intrusion Detection (RAID), Ottawa, Canada, September 15-17 (vol. 6307 LNCS, pp. 79-96). (03029743; 3642155111 (ISBN); 9783642155116 (ISBN)), (pdf).
  122. Antoniades, D., Markatos, E.P., & Dovrolis, C. (2010). MOR: monitoring and measurements through the onion router. Proceedings of the 11th international conference on Passive and active measurement, Zurich, Switzerland, (pp. 131-140). Berlin, Heidelberg: Springer-Verlag (3-642-12333-3, 978-3-642-12333-7), (pdf).
  123. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). RRDtrace: Long-term raw network traffic recording using fixed-size storage. 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010, Miami Beach, FL, August 17-19 (pp. 101-110). (9780769541976 (ISBN)), (pdf).
  124. Danilatou, V., & Ioannidis, S. (2010). Security and Privacy Architectures for Biomedical Cloud Computing. In Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine, Corfu, Greece, November. (pdf).
  125. Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.P., & Karagiannis, Th. (2010). xJS: practical XSS prevention for web application development. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps), Boston, MA, USA, (pp. 13). Berkeley, CA, USA: USENIX Association (pdf).
  126. Antonatos, S., Locasto, M., Sidiroglou, S., Keromytis, A.D., & Markatos, E.P. (2009). Defending against next generation through network/endpoint collaboration and interactionProceedings of the 3rd European Conference on Computer Network Defense , (pp. 131-141).
  127. Antonatos, S., & Vu, Q. (2009). Harnessing the power of P2P systems for fast attack signature validation. In Proceedings of the 3rd International Conference on Network and System Security (NSS 2009), Gold Coast, Australia, 19-21 October (pp. 107-114).
  128. Chin, W.Y., Markatos, E.P., Antonatos, S., & Ioannidis, S. (2009). HoneyLab: Large-scale honeypot deployment and resource sharing. 2009 3rd International Conference on Network and System Security, NSS 2009, Gold Coast, QLD, 19 October 2009 through 21 October 2009 (pp. 381-388). (9780769538389 (ISBN)), (pdf).
  129. Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2009). Imbuing unstructured P2P systems with non-intrusive topology awareness. In Proceedings of the 9th International Conference on Peer-to-Peer Computing., Seattle, USA, 91-1 September (pp. 51-60). (pdf).
  130. Antoniades, D., Markatos, E.P., & Dovrolis, C. (2009). One-click hosting services: a file-sharing hideout. IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, Chicago, Illinois, USA, (pp. 223-234). New York, NY, USA: ACM (978-1-60558-771-4), (pdf).
  131. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). Real-world Polymorphic Attack Detection. In Proceedings of the 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA), Athens, Greece, June. (pdf).
  132. Friedl, A., Ubik, S., Kapravelos, A., Polychronakis, M., & Markatos, E.P. (2009). Realistic passive packet loss measurement for high-speed networks. 1st International Workshop on Traffic Monitoring and Analysis, TMA 2009, Aachen, 11 May 2009 through 11 May 2009 (vol. 5537 LNCS, pp. 1-7). (03029743; 9783642016448 (ISBN)), (pdf).
  133. Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E.P., & Ioannidis, S. (2009). Regular Expression Matching on Graphics Hardware for Intrusion Detection. Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25 (pp. 265-283). (pdf).
  134. Athanasopoulos, E., Krithinakis, A., Kopidakis, G., Maxwell, G., Poustie, A., Manning, B., Webb, R., Koyabe, M., & Cairano-Gilfedder, C.D. (2009). WISDOM: Security-aware fibres. 2nd European Workshop on System Security, EUROSEC '09, Nuremberg, 31 March 2009 through 31 March 2009 (pp. 22-27). (9781605584720 (ISBN)), (pdf).
  135. Forestiero, A., Mastroianni, C., Papadakis, H., Fragopoulou, P., Tretola, G., & Zimeo, E. (2008). A Scalable Architecture for Discovery and Composition in P2P Service Networks. In Proceedings of the CoreGRID Integration Workshop, Heraklion, Crete, Greece, July (pp. 97-108). USA: Springer (pdf).
  136. Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., & Markatos, E.P. (2008). Antisocial networks: Turning a social network into a botnet. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 146-160). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
  137. Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2008). Compromising anonymity using packet spinning. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 161-174). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
  138. Smaragdakis, G., Lekakis, V., Laoutaris, N., Bestavros, A., Byers, J.W., & Roussopoulos, M. (2008). EGOIST: Overlay routing using selfish neighbor selection. 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08, Madrid, 9 December 2008 through 12 December 2008. (9781605582108 (ISBN)), (pdf).
  139. Bos, H., & Markatos, E.P. (2008). European Conference on Computer Systems: Preface. 1st European Workshop on System Security, EUROSEC '08, Glasgow, 31 March 2008 through 31 March 2008. Association for Computing Machinery (9781605581194 (ISBN)).
  140. Politopoulos, P.I., Markatos, E.P., & Ioannidis, S. (2008). Evaluation of compression of remote network monitoring data streams. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, Brazil, 7 April 2008 through 11 April 2008 (pp. 109-115). (9781424420674 (ISBN)), (pdf).
  141. Bos, H., Ioannidis, S., Jonsson, E., Kirda, E., & Kruegel, Ch. (2008). Future Threats to Future Trust. In Proceedings of the Future of Trust in Computing Conference, Berlin, Germany, July 2008 (pp. 49-54). (pdf).
  142. Polychronakis, M., Mavrommatis, P., & Provos, N. (2008). Ghost turns zombie: exploring the life cycle of web-based malware. LEET '08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California, April (pp. 1-8). Berkeley, CA, USA: USENIX Association (pdf).
  143. Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., & Ioannidis, S. (2008). Gnort: High performance network intrusion detection using graphics processors. Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings, Cambridge, MA, USA, 15 September 2008 through 17 September 2008 (vol. 5230 LNCS, pp. 116-134). (03029743; 354087402X (ISBN); 9783540874027 (ISBN)), (pdf).
  144. Antonatos, S., Athanatos, M., Kondaxis, G., Velegrakis, J., Hatzibodozis, N., Ioannidis, S., & Markatos, E.P. (2008). Honey@home: A new approach to large-scale threat monitoring. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008, Amsterdam, 21 April 2008 through 22 April 2008 (pp. 3-16). (9780769533476 (ISBN)), (pdf).
  145. Antoniades, D., Trimintzios, P., Polychronakis, M., Ubik, S., Papadogiannakis, A., & Smotlacha, V.R. (2008). LOBSTER: a European platform for passive network traffic monitoring. TridentCom '08: Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities, Innsbruck, Austria, (pp. 1-10). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; ICST, Brussels, Belgium, Belgium: ICST (978-963-9799-24-0), (pdf).
  146. Antoniades, D., Polychronakis, M., Nikiforakis, N., Markatos, E.P., & Mitsos, Y. (2008). Monitoring three National Research Networks for eight weeks: Observations and implications. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 153-156). (9781424420674 (ISBN)), (pdf).
  147. Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2008). On the Anonymization and Deanonymization of Netflow Traffic. In Proceedings of FloCon 2008, Savannah, Georgia, USA, January. (pdf).
  148. Williams, P., Rosenthal, D.S.H., Roussopoulos, M., & Georgis, S. (2008). Predicting archival life of removable hard disk drives. Archiving 2008, Bern, 24 June 2008 through 27 June 2008 (pp. 188-192). (9780892082773 (ISBN)), (pdf).
  149. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2008). Real-world polymorphic attack detection using network-level emulation. CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research, Oak Ridge, Tennessee, (pp. 1-3). New York, NY, USA: ACM (978-1-60558-098-2), (pdf).
  150. Smaragdakis, G., Laoutaris, N., Michiardi, P., Roussopoulos, M., Byers, J.W., & Bestavros, A. (2008). Swarming on optimized graphs for n-way broadcast. In Proceedings of IEEE INFOCOM, April 2008. (pdf).
  151. Theocharides, A., Antoniades, D., Polychronakis, M., Athanasopoulos, E., & Markatos, E.P. (2008). Topnet: A Network-aware top(1)LISA; Proceedings of the 22nd Large Installation System Administration Conference, {LISA} 2008, November 9-14, 2008, San Diego, {CA {USA}, San Diego, California, September (pp. 145-157). USENIX Association (978-1-931971-63-8), (pdf).
  152. Nikiforakis, N., Antoniades, D., Markatos, E.P., Ioannidis, S., & Øslebø, A. (2008). When AppMon met Stager. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 157-160). (9781424420674 (ISBN)), (pdf).
  153. Krithinakis, A., Stroetmann, L., Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2008). WSIM: A Software Platform to Simulate All-Optical Security Operations. Computer Network Defense, 2008. EC2ND 2008. European Conference on, Dublin, Ireland, Decembe (pp. 41-47). (pdf).
  154. Nikiforakis, N., Makridakis, A., Athanasopoulos, E., & Markatos, E.P. (2007). Alice, what did you do last time? Fighting Phishing Using Past Activity Tests. Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND '07); LNEE (Lecture Notes on Electrical Engineering), Heraklion, Greece, 4-5 October. Springer (978-0-387-85554-7), (pdf).
  155. Papadakis, H., Trunfio, P., Talia, D., & Fragopoulou, P. (2007). Design and implementation of a hybrid P2P-based grid resource discovery system. In Proceedings of the CoreGRID Workshop on Grid Programming Model, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments, Heraklion, Crete, Greece, Springer (pdf).
  156. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Emulation-based detection of non-self-contained polymorphic shellcode. 10th Symposium on Recent Advances in Intrusion Detection, RAID 2007, Gold Coast, Australia, 5 September 2007 through 7 September 2007 (vol. 4637 LNCS, pp. 87-106). (03029743; 9783540743194 (ISBN)), (pdf).
  157. Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2007). Flexible and high-performance anonymization of Netflow records using anontool. 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, Nice, 17 September 2007 through 21 September 2007 (pp. 33-38). (1424409756 (ISBN); 9781424409754 (ISBN)), (pdf).
  158. Athanasopoulos, E., Roussopoulos, M., Anagnostakis, K.G., & Markatos, E.P. (2007). GAS: Overloading a file sharing network as an anonymizing system. 2nd International Workshop on Security, IWSEC 2007, Nara, 29 October 2007 through 31 October 2007 (vol. 4752 LNCS, pp. 365-379). (03029743; 9783540756507 (ISBN)), (pdf).
  159. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@home: a new approach to large-scale threat monitoring. WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode, Alexandria, Virginia, USA, (pp. 38-45). New York, NY, USA: ACM (978-1-59593-886-2), (pdf).
  160. Papadogiannakis, A., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2007). Improving the performance of passive network monitoring applications using locality buffering. 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS '07, Istanbul, 24 October 2007 through 26 October 2007 (pp. 151-157). (9781424418541 (ISBN)), (pdf).
  161. Andreozzi, S., Ciuffoletti, A., Ghiselli, A., Antoniades, D., Polychronakis, M., Markatos, E.P., & Trimintzios, P. (2007). On the Integration of Passive and Active Network Monitoring in Grid Systems. Integrated Research in GRID Computing. Workshop 2005 (Selected Papers), Pisa, Italy, November 28–30 (pp. 147-161). USA: Springer (978-0-387-47656-8 (Print) 978-0-387-47658-2 (Online)), (pdf).
  162. Koukis, D., Antonatos, S., Antoniades, D., Markatos, E.P., & Trimintzios, P. (2006). A generic anonymization framework for network traffic. 2006 IEEE International Conference on Communications, ICC 2006, Istanbul, 11 July 2006 through 15 July 2006 (vol. 5, pp. 2302-2309). (05361486; 1424403553 (ISBN); 9781424403554 (ISBN)), (pdf).
  163. Antoniades, D., Polychronakis, M., Antonatos, S., Markatos, E.P., Ubik, S., & Øslebø, A. (2006). Appmon: An Application for Accurate per Application Network Traffic Characterisation. In IST Broadband Europe 2006 Conference, Geneva, Switzerland, December. (pdf).
  164. Ciuffoletti, A., & Polychronakis, M. (2006). Architecture of a Network Monitoring Element. Workshops: CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics, Revised Selected Papers, Dresden, Germany, August 29-September 1 (pp. 5-14). (pdf).
  165. Ciuffoletti, A., & Polychronakis, M. (2006). Architecture of a network monitoring element. 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2006, Manchester, 26 June 2006 through 28 June 2006 (pp. 220-221). (15244547; 0769526233 (ISBN); 9780769526232 (ISBN)), (pdf).
  166. Antoniades, D., Athanatos, M., Papadogiannakis, A., Markatos, E.P., & Dovrolis, C. (2006). Available bandwidth measurement as simple as running wget. In Proceedings of the Passive and Active Measurement Conference (PAM2006), Adelaide, Australia, March. (pdf).
  167. Popov, K., Papadakis, H., Fragopoulou, P., & Vlassov, V. (2006). Building Scalable Self-Organizing Grid Services Using P2P Technologies. In Proceedings of the 3rd CoreGrid Integration Workshop, Krakow, Poland, 19-20 October.
  168. Trimintzios, P., Polychronakis, M., Papadogiannakis, A., Foukarakis, M., Markatos, E.P., & Øslebø, A. (2006). DiMAPI: An application programming interface for distributed network monitoring. 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, BC, 3 April 2006 through 7 April 2006 (pp. 382-393). (1424401429 (ISBN); 9781424401420 (ISBN)), (pdf).
  169. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2006). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. In Proceedings of the 3nd CoreGRID Integration Workshop, Krakow Poland.
  170. Athanasopoulos, E., & Antonatos, S. (2006). Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS '06), Heraklion, Crete, Greece, October 19-21 (pp. 97-108). (pdf).
  171. Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2006). Grid Reliability: A Study of Failures on the EGEE Infrastructure. Proceedings of the 3rd CoreGRID Integration Workshop, Krakow, Poland, 19-20 October (pp. 165-176). (pdf).
  172. Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets. 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, Singapore, 6 June 2006 through 9 June 2006 (vol. 3989 LNCS, pp. 130-145). (03029743; 3540347038 (ISBN); 9783540347033 (ISBN)), (pdf).
  173. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation. Berlin, Germany, July 13-14 (pp. 54-73). (pdf).
  174. Koukis, D., Antonatos, S., & Anagnostakis, K.G. (2006). On the Privacy Risks of Publishing Anonymized IP Network Traces. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS '06), Heraklion, Crete, Greece, October 19-21 (pp. 22-32). (pdf).
  175. Papadogiannakis, A., Kapravelos, A., Polychronakis, M., Markatos, E.P., & Ciuffoletti, A. (2006). Passive end-to-end packet loss estimation for GRID traffic monitoring. CoreGRID Integration Workshop 2006, Krakow, Poland, October 19-20. Krakow: CYFRONET AG (83-915141-6-1), (pdf).
  176. Lam, V.T., Antonatos, S., Akritidis, P., & Anagnostakis, K.G. (2006). Puppetnets: misusing web browsers as a distributed attack infrastructure. CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, Virginia, USA, (pp. 221-234). New York, NY, USA: ACM (1-59593-518-5), (pdf).
  177. Antonatos, S., & Anagnostakis, K.G. (2006). TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. In Proceedings of the 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21 (pp. 12-21). (pdf).
  178. Papadakis, H., Fragopoulou, P., Athanasopoulos, E., Dikaiakos, M., & Markatos, E.P. (2005). A Feedback-based Approach to Reduce Duplicate Messages. In Proceedings of the 2nd CoreGrid Integration Workshop, Lisbon, Portugal, November. (pdf).
  179. Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2005). Defending against hitlist worms using network address space randomization. WORM '05 - 2005 ACM Workshop on Rapid Malcode, Farfax, VA, 11 November 2005 through 11 November 2005 (pp. 30-40). (1595932291 (ISBN)), (pdf).
  180. Xinidis, K., Anagnostakis, K.G., & Markatos, E.P. (2005). Design and Implementation of a High-Performance Network Intrusion Prevention System. IFIP TC11 20th International Information Security Conference, Chiba, Japan, May 30 – June 1 (pp. 359-374). (pdf).
  181. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow HoneypotsProceedings of the 14th {USENIX} Security Symposium, August. USENIX (pdf).
  182. Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Efficient content-based detection of zero-day worms. Communications, 2005. ICC 2005. 2005 IEEE International Conference on Communications (ICC 2005), Seoul, Korea, 16-20 May (vol. 2, pp. 837-843). (pdf).
  183. Andreozzi, S., Antoniades, D., Ciuffoletti, A., Ghiselli, A., Markatos, E.P., Polychronakis, M., & Trimintzios, P. (2005). Issues about the Integration of Passive and Active Monitoring for Grid NetworksCoreGRID Integration Workshop 2005, Nov. Pisa (pdf).
  184. Trunfio, P., Talia, D., Fragopoulou, P., Papadakis, H., Mordacchini, M., Pennanen, M., Popov, K., Vlassov, V., & Haridi, S. (2005). Peer-to-Peer Models for Resource Discovery on Grids. In Proceedings of the 2nd CoreGrid Integration Workshop, Lisbon, Portugal, January.
  185. Antonatos, S., Polychronakis, M., Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC, Chiba, Japan, May 30 - June 1 (pp. 393-408). (pdf).
  186. Akritidis, P., Markatos, E.P., Polychronakis, M., & Anagnostakis, K.G. (2005). STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis. Chiba, Japan, May 30 – June 1 (pp. 375-391). (pdf).
  187. Polychronakis, M., Markatos, E.P., Anagnostakis, K.G., & Øslebø, A. (2004). Design of an application programming interface for IP network monitoring. 2004 IEEE/IFIP Network Operations and Management Symposium: Managing Next Generation Convergence Networks and Services, NOMS 2004, Seoul, 1 April 2004 through 1 April 2004 (pp. 483-496). (pdf).
  188. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2004). Generating Realistic Workloads for Network Intrusion Detection Systems. Proceedings of the Fourth International Workshop on Software and Performance (WOSP2004), January 2004. (pdf).
  189. Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2004). Performance Analysis of Content Matching Intrusion Detection Systems. Proceedings of the International Symposium on Applications and the Internet (SAINT2004), January 2004. (pdf).
  190. Markatos, E.P., Ji R Novotn, Y., Polychronakis, M., Smotlacha, V.R., & Ubik, S. (2004). SCAMPI - A Scaleable Monitoring Platform for the InternetIn Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004), Budapest, Hungary, 22-23 March. (pdf).
  191. Luque, E., Castaños, J.G., Markatos, E.P., & Perego, R. (2004). Topic 3: Scheduling and Load Balancing. Pisa, Italy, August 31- September 3 (pp. 220-221).
  192. Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Trafc Splitter Architecture for Intrusion Detection. Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Orlando Florida, October 2003 (pp. 238-240). (pdf).
  193. Charitakis, I., Pnevmatikatos, D., Markatos, E.P., & Anagnostakis, K.G. (2003). Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, Vienna, Austria, September 2003 (pp. 226-239). (pdf).
  194. Lalis, S. (2003). Discovery in a Dynamically Composable Personal System. Proceedings of the Tenth International Conference on Human-Computer Interaction; Universal access in HCI : inclusive design in the information society, Crete, Greece, June 22-27 (vol. 4, pp. 429-433).
  195. Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2003). E2xB: A domain–specific string matching algorithm for intrusion detection. Proceedings of the 18th IFIP International Information Security Conference (SEC2003), May 2003. (pdf).
  196. Karypidis, A., & Lalis, S. (2003). Harnessing the potential of mobile personal data repositories. In Proceedings Hawaii International Conference on System Sciences (HICSS-36), Hawaii, January 6-9 (pp. 10 pp.).
  197. Coppens, J., Van den Berghe, S., Bos, H., Markatos, E.P., De Turck, F., Oslebo, A., & Ubik, S. (2003). SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Proceedings of the Workshop on End-to-End Monitoring Techniques and Services (E2EMON), September 2003. (pdf).
  198. Karypidis, A., & Lalis, S. (2003). The tangible file system. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCSW '03), Rhode Island, USA, May 19-22 (pp. 268-273).
  199. Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002). Exclusion-based Signature Matching for Intrusion Detection. Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN), Cambridge, USA, November 2002 (pp. 146-152). (pdf).
  200. Markatos, E.P. (2002). Speeding-up TCP/IP: Faster Processors are not Enough. In Proceedings of the 21st IEEE International Performance, Computing, and Communications Conference (IPCCC 2002), April 2002 (pp. 341-345). (pdf).
  201. Markatos, E.P. (2002). Tracing a large-scale Peer to Peer System:an hour in the life of Gnutella. In Proceedings of the CCGrid 2002: the second IEEE International Symposium on Cluster Computing and the Grid, May 2002 (pp. 65-74). (pdf).
  202. Kakarontzas, G., & Lalis, S. (2001). A market-based protocol with leasing support for globally distributed computing. 15-18 May (pp. 562-567).
  203. Houstis, C.E., & Lalis, S. (2001). ARION: A scalable architecture for a digital library of scientific collections. Nicosia, Cyprus, 8-10 November.
  204. Gialama, E.M., Markatos, E.P., Sevaslidou, J.E., Serpanos, D.N., Asimakopoulou, X.A., & Kotsovinos, E.N. (2001). DIVISOR: DIstributed VIdeo Server fOr stReaming. In the Proceedings of the 5th WSES/IEEE WORLD MULTICONFERENCE ON Circuits, Systems, Communications and Computers (CSCC 2001), July 2001 (pp. 4531-4536). (pdf).
  205. Lalis, S., & Karypidis, A. (2000). An open market-based architecture for distributed computing. Cancun, Mexico, May.
  206. Markatos, E.P. (2000). On Caching Search Engine Query Results. In the Proceedings of the 5th International Web Caching and Content Delivery Workshop, May 2000. (pdf).
  207. Kapidakis, S. (1999). Issues in the Development and Operation of a Digital Library. ECDL '99: Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries, (pp. 363-382). London, UK: Springer-Verlag (3-540-66558-7).
  208. Markatos, E.P., Katevenis, M.G.H., Pnevmatikatos, D., & Flouris, M.D. (1999). Secondary Storage Management for Web Proxies. In Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS99), Co-Sponsored by IEEE Computer Society, Technical Committee on the Internet., (pp. 93-104). (pdf).
  209. Anastasiadi, A., Kapidakis, S., Nikolaou, Ch., & Sairamesh, J. (1998). A computational economy for dynamic load balancing and data replication. ICE '98: Proceedings of the first international conference on Information and computation economies, Charleston, South Carolina, United States, (pp. 166-180). New York, NY, USA: ACM (1-58113-076-7).
  210. Kapidakis, S., Terzis, S., & Sairamesh, J. (1998). A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries. ECDL '98: Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries, (pp. 95-114). London, UK: Springer-Verlag (3-540-65101-2).
  211. Markatos, E.P., & Chronaki, C. (1998). A Top-10 Approach to Prefetching the Web. In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
  212. Papathanasiou, A E., & Markatos, E.P. (1998). Lightweight Transactions on Networks of Workstations. In International Conference on Distributed Computing Systems (ICDCS 1998), Amsterdam, May 1998. (pdf).
  213. Ioannidis, S., Markatos, E.P., & Sevaslidou, J.E. (1998). On Using Network Memory to Improve the Performance of TransactionBased Systems.  In Proceedings of 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, USA, July 1998. (pdf).
  214. Papadakis, N., Markatos, E.P., & Papathanasiou, A E. (1998). Palantir: A Visualization Tool for the World Wide Web.  In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
  215. Toraki, K., & Kapidakis, S. (1998). The Technical Chamber of Greece Digital Library: The Vision of a Special Organisation to Save and Disseminate Its Information Work Through the Network. ECDL '98: Proceedings of the Second European Conference on Research and Advanced Technology for Digital Libraries, (pp. 691-692). London, UK: Springer-Verlag (3-540-65101-2).
  216. Nikolaou, Ch., Marazakis, M., Papadakis, D., & Yeorgiannakis, Y. (1997). Towards a Common Infrastructure for Large-Scale Distributed Applications. Research and Advanced Technology for Digital Libraries, Pisa, Italy, September 1–3 (vol. 1324, pp. 173-??). (0302-9743).
  217. Markatos, E.P., & Dramitinos, G. (1996). Implementation of a Reliable Remote Memory Pager. In the proceedings of the USENIX  Technical Conference, San Diego, Ca, January 22-26. (pdf).
  218. Kapidakis, S., & Mavronicolas, M. (1995). Load balancing networks. PODC '95: Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing, Ottowa, Ontario, Canada, (pp. 275). New York, NY, USA: ACM (0-89791-710-3).
  219. Marazakis, M., & Nikolaou, Ch. (1995). Towards adaptive scheduling of tasks in transactional workflows. Proceedings of the 1995 Winter Simulation Conference, WSC '95, Arlington, VA, USA, 3 December 1995 through 6 December 1995 (pp. 604-611). Piscataway, NJ, United States: IEEE (02750708).
  220. Markatos, E.P., & Chronaki, C. (1994). Using reference counters in Update Based Coherent Memory. In PARLE '94 Parallel ARchitectures and Languages Europe, Athens, Greece (pdf).
  221. Markatos, E.P. (1993).  How Architecture Evolution influences the Scheduling Discipline in Shared-Memory Multiprocessors. In PARCO 93, Grenoble, France (pdf).

Poster presentations (abstract reviewed)

  1. Degkleri, E., Chariton, A. A. , Ilia, P., Papadopoulos, P., & Markatos, E.P. (2016). Leveraging DNS for timely SSL Certificate Revocation. In 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016), Linz, Austria, September 2016. (pdf).

Poster presentations (full-text reviewed)

  1. Tsilipakos, O., Pitilakis, A., Tasolamprou, A., Liaskos, C. K., Tsiolaridou1, A., Liu, F., Mirmoosa, M., Wang, X., Kossifos, K., Georgiou, J., Pitsillides, A., Kantartzis, N. , Manessis, D., Ioannidis, S., Kenanakis, G., Deligeorgis, G. , Economou, E., Soukoulis, C. , Tretyakov, S., & Kafesaki, M.  (2019). Software-Defined Metasurfaces: The VISORSURF Project Approach13th International Congress on Artificial Materials for Novel Wave Phenomena–Metamaterials 2019,  Rome, Italy, September 2019.
  2. Papadakis, H., Panagiotakis, C., & Fragopoulou, P. (2013). A distributed algorithm for community detection in large graphsIEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013), Niagara Falls, ON, Canada, 25-28 Aug.. IEEE.
Found: 224 publications