Angelos Stavrou
Orcid: 0000-0001-9888-0592Affiliations:
- Virginia Tech, VA, USA
- George Mason University, Fairfax, Virginia, USA (former)
According to our database1,
Angelos Stavrou
authored at least 186 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Sensors, April, 2024
Sensors, March, 2024
J. Comput. Secur., 2024
ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer.
CoRR, 2024
CoRR, 2024
Comput. Networks, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IFIP Networking Conference, 2024
Proceedings of the IFIP Networking Conference, 2024
GREEN: Precise Geolocation in Metaverse using Reinforcement Learning-Enabled Sensor Placement.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024
RADIO: Reinforcement Learning-Aided Deployment of Wi-Fi Routers in 5G Networks for Indoor Drone Orchestrating.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method.
Proceedings of the Information Security - 27th International Conference, 2024
5G-WAVE: A Core Network Framework with Decentralized Authorization for Network Slices.
Proceedings of the IEEE INFOCOM 2024, 2024
5GPS: 5G Femtocell Placement Strategies for Ultra-Precise Indoor Localization in the Metaverse.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
RAPID: Reinforcement Learning-Aided Femtocell Placement for Indoor Drone Localization.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Mobile Devices' Low Charge, High CPU Load, Number of Sensors, and OS Features Delay Sensor Data Readings.
Proceedings of the International Conference on Computer, 2024
2023
OFDRA: Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs.
IEEE J. Sel. Areas Commun., December, 2023
iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement.
IEEE Internet Things J., August, 2023
IEEE Trans. Veh. Technol., May, 2023
A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes.
CoRR, 2023
Computer, 2023
Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Proceedings of the Silicon Valley Cybersecurity Conference, 2023
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
IEEE Trans. Cloud Comput., 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the IEEE Latin-American Conference on Communications, 2022
Proceedings of the IEEE Latin-American Conference on Communications, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Secur. Priv., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 13th European Workshop on Systems Security, 2020
2019
2018
J. Syst. Softw., 2018
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks.
Proceedings of the 27th USENIX Security Symposium, 2018
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance<sup>*</sup>.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Proceedings of the Computer Security, 2018
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
ACM Trans. Web, 2017
Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems.
J. Interconnect. Networks, 2017
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks.
CoRR, 2017
Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
CoRR, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Your data in your hands: Privacy-preserving user behavior models for context computation.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Proceedings of the 12th IEEE/ACM International Workshop on Software Engineering for Science, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Commun. Surv. Tutorials, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service.
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Wirel. Pers. Commun., 2013
ACM Trans. Internet Techn., 2013
Soc. Netw. Anal. Min., 2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 5th International Conference on Cyber Conflict, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012
A whitebox approach for automated security testing of Android applications on the cloud.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
CoRR, 2011
Commun. ACM, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the ENTERprise Information Systems - International Conference, 2011
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011
2010
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems.
Mach. Learn., 2010
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.
Proceedings of the Computer Security, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
IEEE Commun. Mag., 2009
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the New Security Paradigms Workshop 2006, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
WebSOS: an overlay-based system for protecting web servers from denial of service attacks.
Comput. Networks, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
SIGMETRICS Perform. Evaluation Rev., 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002