Angelos Stavrou

Orcid: 0000-0001-9888-0592

Affiliations:
  • Virginia Tech, VA, USA
  • George Mason University, Fairfax, Virginia, USA (former)


According to our database1, Angelos Stavrou authored at least 187 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing Your Airspace: Detection of Drones Trespassing Protected Areas.
Sensors, April, 2024

OPTILOD: Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones.
Sensors, March, 2024

A multiview clustering framework for detecting deceptive reviews.
J. Comput. Secur., 2024

ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer.
CoRR, 2024

Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning.
CoRR, 2024

All in one: Improving GPS accuracy and security via crowdsourcing.
Comput. Networks, 2024

Harnessing Isochrons of Nonlinear Oscillators for High-Precision Ranging.
Proceedings of the IEEE International Conference on Communications, 2024

CARTA: Coordinated Arrangement of Receivers for Target Acquisition.
Proceedings of the IFIP Networking Conference, 2024

Isochrons in Photonic Oscillators: A Paradigm Shift in Positioning.
Proceedings of the IFIP Networking Conference, 2024

GREEN: Precise Geolocation in Metaverse using Reinforcement Learning-Enabled Sensor Placement.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

RADIO: Reinforcement Learning-Aided Deployment of Wi-Fi Routers in 5G Networks for Indoor Drone Orchestrating.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method.
Proceedings of the Information Security - 27th International Conference, 2024

An Exploration of Fuzzing for Discovering Use-After-Free Vulnerabilities.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

5G-WAVE: A Core Network Framework with Decentralized Authorization for Network Slices.
Proceedings of the IEEE INFOCOM 2024, 2024

5GPS: 5G Femtocell Placement Strategies for Ultra-Precise Indoor Localization in the Metaverse.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

RAPID: Reinforcement Learning-Aided Femtocell Placement for Indoor Drone Localization.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Towards Shielding 5G Control Plane Functions.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Mobile Devices' Low Charge, High CPU Load, Number of Sensors, and OS Features Delay Sensor Data Readings.
Proceedings of the International Conference on Computer, 2024

2023
OFDRA: Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs.
IEEE J. Sel. Areas Commun., December, 2023

iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement.
IEEE Internet Things J., August, 2023

PILOT: High-Precision Indoor Localization for Autonomous Drones.
IEEE Trans. Veh. Technol., May, 2023

A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes.
CoRR, 2023

Revisiting the Spaceborne Illuminators of Opportunity for Airborne Object Tracking.
Computer, 2023

Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

EGO-6: Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

Vehicular Teamwork for Better Positioning.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Securing 5G OpenRAN with a Scalable Authorization Framework for xApps.
Proceedings of the IEEE INFOCOM 2023, 2023

Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Demystifying 5G Traffic Patterns with an Indoor RAN Measurement Campaign.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Understanding the Security Implication of Aborting Virtual Machine Live Migration.
IEEE Trans. Cloud Comput., 2022

Characterization of AES Implementations on Microprocessor-based IoT Devices.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Scaling Network Slices with a 5G Testbed: A Resource Consumption Study.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

RAIL: Robust Acoustic Indoor Localization for Drones.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Streaming and Unbalanced PSI from Function Secret Sharing.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

SPIN: Sensor Placement for Indoor Navigation of Drones.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

GPS Spoofing Detection by Leveraging 5G Positioning Capabilities.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End 5G Testbed.
Proceedings of the IEEE Global Communications Conference, 2022

Detecting and Measuring Misconfigured Manifests in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Certificate Transparency in Google Chrome: Past, Present, and Future.
IEEE Secur. Priv., 2021

DEFInit: An Analysis of Exposed Android Init Routines.
Proceedings of the 30th USENIX Security Symposium, 2021

Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Distributed Ledger Technologies.
IEEE Internet Comput., 2020

Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

21 Years of Distributed Denial-of Service: Current State of Affairs.
Computer, 2020

21 Years of Distributed Denial-of-Service: A Call to Action.
Computer, 2020

FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

Microservices made attack-resilient using unsupervised service fissioning.
Proceedings of the 13th European Workshop on Systems Security, 2020

2019
20 Years of DDoS: a Call to Action.
CoRR, 2019

2018
Towards Transparent Debugging.
IEEE Trans. Dependable Secur. Comput., 2018

On early detection of application-level resource exhaustion and starvation.
J. Syst. Softw., 2018

Cybertrust in the IoT Age.
Computer, 2018

End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks.
Proceedings of the 27th USENIX Security Symposium, 2018

An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance<sup>*</sup>.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace.
Proceedings of the Computer Security, 2018

Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service.
ACM Trans. Web, 2017

Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems.
J. Interconnect. Networks, 2017

Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks.
CoRR, 2017

Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
CoRR, 2017

Verified Time.
Computer, 2017

DDoS in the IoT: Mirai and Other Botnets.
Computer, 2017

Practical and Accurate Runtime Application Protection Against DoS Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Your data in your hands: Privacy-preserving user behavior models for context computation.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Pairing continuous authentication with proactive platform hardening.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

The Mirai botnet and the IoT Zombie Armies.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Advancing Open Science with Version Control and Blockchains.
Proceedings of the 12th IEEE/ACM International Workshop on Software Engineering for Science, 2017

E-Android: A New Energy Profiling Tool for Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Breaking BLE Beacons For Fun But Mostly Profit.
Proceedings of the 10th European Workshop on Systems Security, 2017

Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Detecting ROP with Statistical Learning of Program Characteristics.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

CCSW'17: 2017 ACM Cloud Computing Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Strict Virtual Call Integrity Checking for C++ Binaries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Learning Internet-of-Things Security "Hands-On".
IEEE Secur. Priv., 2016

Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Commun. Surv. Tutorials, 2016

On the Move: Evading Distributed Denial-of-Service Attacks.
Computer, 2016

Authentication Feature and Model Selection using Penalty Algorithms.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Securely Making "Things" Right.
Computer, 2015

E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service.
Proceedings of the 24th International Conference on World Wide Web, 2015

Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Privacy Risk Assessment on Online Photos.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Preventing Exploits in Microsoft Office Documents Through Content Randomization.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Targeted DoS on android: how to disable android in 10 seconds or less.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

On the DNS Deployment of Modern Web Services.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Analysis of content copyright infringement in mobile application markets.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

TrustLogin: Securing Password-Login on Commodity Operating Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
HyperCheck: A Hardware-AssistedIntegrity Monitor.
IEEE Trans. Dependable Secur. Comput., 2014

A moving target DDoS defense mechanism.
Comput. Commun., 2014

transAD: An Anomaly Detection Network Intrusion Sensor for the Web.
Proceedings of the Information Security - 17th International Conference, 2014

A Framework to Secure Peripherals at Runtime.
Proceedings of the Computer Security - ESORICS 2014, 2014

Click Fraud Detection on the Advertiser Side.
Proceedings of the Computer Security - ESORICS 2014, 2014

Detecting Malicious Javascript in PDF through Document Instrumentation.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Catch Me If You Can: A Cloud-Enabled DDoS Defense.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Activity Spoofing and Its Defense in Android Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications.
Wirel. Pers. Commun., 2013

Providing Users' Anonymity in Mobile Hybrid Networks.
ACM Trans. Internet Techn., 2013

Improving network response times using social information.
Soc. Netw. Anal. Min., 2013

Programming on Android: Best Practices for Security and Reliability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Behavioral Analysis of Android Applications Using Automated Instrumentation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Forced-Path Execution for Android Applications on x86 Platforms.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

HIDEINSIDE - A novel randomized & encrypted antiforensic information hiding.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

MOTAG: Moving Target Defense against Internet Denial of Service Attacks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

SPECTRE: A dependable introspection framework via System Management Mode.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Towards a Cyber Conflict Taxonomy.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
DoubleGuard: Detecting Intrusions in Multitier Web Applications.
IEEE Trans. Dependable Secur. Comput., 2012

Building Security into Off-the-Shelf Smartphones.
Computer, 2012

Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Attestation & Authentication for USB Communications.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Mobile Application and Device Power Usage Measurements.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

A Framework for Automated Security Testing of Android Applications on the Cloud.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Analysis of Android Applications' Permissions.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Malware Characterization Using Behavioral Components.
Proceedings of the Computer Network Security, 2012

Exposing Security Risks for Commercial Mobile Devices.
Proceedings of the Computer Network Security, 2012

Implementing and Optimizing an Encryption Filesystem on Android.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

A whitebox approach for automated security testing of Android applications on the cloud.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012

The MEERKATS Cloud Security Architecture.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Hardware-Assisted Application Integrity Monitor.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

A dependability analysis of hardware-assisted polling integrity checking systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

NetGator: Malware Detection Using Program Interactive Challenges.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Malicious PDF detection using metadata and structural features.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
TCP Modulation Attacks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Overlay-Based DoS Defenses.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

The ephemeral legion: producing an expert cyber-security work force from thin air.
Commun. ACM, 2011

Trading Elephants for Ants: Efficient Post-attack Reconstitution.
Proceedings of the Security and Privacy in Communication Networks, 2011

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Moving Forward, Building an Ethics Community (Panel Statements).
Proceedings of the Financial Cryptography and Data Security, 2011

The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011

Specifying Time-Out Points in Surgical EMRs-Work in Progress.
Proceedings of the ENTERprise Information Systems - International Conference, 2011

Predicting Network Response Times Using Social Information.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems.
Mach. Learn., 2010

Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Scalable Web Object Inspection and Malfease Collection.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

HyperCheck: A Hardware-Assisted Integrity Monitor.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

QoP and QoS Policy Cognizant Module Composition.
Proceedings of the POLICY 2010, 2010

Small World VoIP.
Proceedings of the Mobile Computing, Applications, and Services, 2010

An Adversarial Evaluation of Network Signaling and Control Mechanisms.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

A Virtualization Architecture for In-Depth Kernel Isolation.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.
Proceedings of the Computer Security, 2010

Providing Mobile Users' Anonymity in Hybrid Networks.
Proceedings of the Computer Security, 2010

Exploiting smart-phone USB connectivity for fun and profit.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
The dynamic community of interest and its realization in ZODIAC.
IEEE Commun. Mag., 2009

The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

SQLProb: a proxy-based architecture towards preventing SQL injection attacks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Adaptive Anomaly Detection via Self-calibration and Dynamic Updating.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A<sup>2</sup>M: Access-Assured Mobile Desktop Computing.
Proceedings of the Information Security, 12th International Conference, 2009

Adding Trust to P2P Distribution of Paid Content.
Proceedings of the Information Security, 12th International Conference, 2009

Privacy Preservation over Untrusted Mobile Networks.
Proceedings of the Privacy in Location-Based Applications, 2009

Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

2008
The Hidden Difficulties of Watching and Rebuilding Networks.
IEEE Secur. Priv., 2008

Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Universal Multi-Factor Authentication Using Graphical Passwords.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Identifying Proxy Nodes in a Tor Anonymization Circuit.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

PAR: Payment for Anonymous Routing.
Proceedings of the Privacy Enhancing Technologies, 2008

Return Value Predictability Profiles for Self-healing.
Proceedings of the Advances in Information and Computer Security, 2008

A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Efficiently tracking application interactions using lightweight virtualization.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

Pushback for Overlay Networks: Protecting Against Malicious Insiders.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
From STEM to SEAD: Speculative Execution for Automated Defense.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

A Study of Malcode-Bearing Documents.
Proceedings of the Detection of Intrusions and Malware, 2007

Bridging the Network Reservation Gap Using Overlays.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

On the infeasibility of modeling polymorphic shellcode.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Dark application communities.
Proceedings of the New Security Paradigms Workshop 2006, 2006

W3Bcrypt: Encryption as a Stylesheet.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
WebSOS: an overlay-based system for protecting web servers from denial of service attacks.
Comput. Networks, 2005

MOVE: An End-to-End Solution to Network Denial of Service.
Proceedings of the Network and Distributed System Security Symposium, 2005

<i>gore</i>: Routing-Assisted Defense Against DDoS Attacks.
Proceedings of the Information Security, 8th International Conference, 2005

Countering DoS attacks with stateless multipath overlays.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Content distribution for seamless transmission.
SIGMETRICS Perform. Evaluation Rev., 2004

A Pay-per-Use DoS Protection Mechanism for the Web.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Using graphic turing tests to counter automated DDoS attacks against web servers.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A lightweight, robust P2P system to handle flash crowds.
Comput. Commun. Rev., 2002


  Loading...