Evangelos P. Markatos
Orcid: 0000-0003-3563-7733Affiliations:
- Foundation for Research & Technology - Hellas (FORTH), Heraklion, Greece
- University of Crete, Department of Computer Science, Heraklion, Greece
According to our database1,
Evangelos P. Markatos
authored at least 163 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on ics.forth.gr
On csauthors.net:
Bibliography
2024
CoRR, 2024
Ad Laundering: How Websites Deceive Advertisers into Rendering Ads Next to Illicit Content.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 25th IEEE International Conference on Mobile Data Management, 2024
2023
The Devil is in the Details: Analyzing the Lucrative Ad Fraud Patterns of the Online Ad Ecosystem.
CoRR, 2023
Who Funds Misinformation? A Systematic Analysis of the Ad-related Profit Routines of Fake News Sites.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
YouTubers Not madeForKids: Detecting Channels Sharing Inappropriate Videos Targeting Children.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022
Proceedings of the Challenges of Trustable AI and Added-Value on Health, 2022
Proceedings of the 12th International Conference on the Internet of Things, 2022
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022
Towards a decentralized infrastructure for data marketplaces: narrowing the gap between academia and industry.
Proceedings of the 1st International Workshop on Data Economy, 2022
2021
Proc. ACM Meas. Anal. Comput. Syst., 2021
Online Soc. Networks Media, 2021
J. Inf. Secur. Appl., 2021
Be Daring to Push your Ads Forward: Measuring the (Over)use of Service Workers for Advertising Purposes.
CoRR, 2021
User Tracking in the Post-cookie Era: How Websites Bypass GDPR Consent to Track Users.
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Do partner apps offer the same level of privacy protection? The case of wearable applications.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
PDS<sup>2</sup>: A user-centered decentralized marketplace for privacy preserving data processing.
Proceedings of the 37th IEEE International Conference on Data Engineering Workshops, 2021
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021
2020
MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech.
ACM Trans. Internet Techn., 2020
ACM Trans. Internet Techn., 2020
Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Integrated Citizen Centered Digital Health and Social Care - Citizens as Data Producers and Service co-Creators, 2020
2019
The coin that never sleeps. The privacy preserving usage of Bitcoin in a longitudinal analysis as a speculative asset.
CoRR, 2019
Proceedings of the World Wide Web Conference, 2019
Check-It: A plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking.
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Internet Measurement Conference, 2019
Proceedings of the 12th European Workshop on Systems Security, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model.
CoRR, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the Information and Operational Technology Security Systems, 2018
Proceedings of the 11th European Workshop on Systems Security, 2018
Proceedings of the 11th European Workshop on Systems Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System.
IEEE Trans. Emerg. Top. Comput., 2016
SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, Training, and Education.
ERCIM News, 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 9th European Workshop on System Security, 2016
2015
2014
IEEE J. Sel. Areas Commun., 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Int. J. Inf. Sec., 2012
ERCIM News, 2012
Improving the performance of passive network monitoring applications with memory locality enhancements.
Comput. Commun., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms.
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
An empirical study on the security of cross-domain policies in rich internet applications.
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
2010
IEEE Netw., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the USENIX Conference on Web Application Development, 2010
Proceedings of the Passive and Active Measurement, 11th International Conference, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the MASCOTS 2010, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Improving the accuracy of network intrusion detection systems under load using selective packet discarding.
Proceedings of the Third European Workshop on System Security, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Parallel Process. Lett., 2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Proceedings P2P 2009, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Traffic Monitoring and Analysis, First International Workshop, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 22nd Large Installation System Administration Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
2007
J. Comput. Virol., 2007
Parallel Process. Lett., 2007
Comput. Networks, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering.
Proceedings of the 15th International Symposium on Modeling, 2007
Proceedings of the Advances in Information and Computer Security, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of IEEE International Conference on Communications, 2006
Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location.
Proceedings of the Achievements in European Research on Grid Systems: CoreGRID Integration Workshop 2006, 2006
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Design and Implementation of a High-Performance Network Intrusion Prevention System.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of IEEE International Conference on Communications, 2005
2004
Proceedings of the Fourth International Workshop on Software and Performance, 2004
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the Euro-Par 2004 Parallel Processing, 2004
2003
E<sup>2</sup>xB: A Domain-Specific String Matching Algorithm for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor.
Proceedings of the Software and Compilers for Embedded Systems, 7th International Workshop, 2003
Proceedings of the Management of Multimedia Networks and Services, 2003
Proceedings of the 11th International Workshop on Modeling, 2003
2002
Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 2002
2001
1999
Parallel Distributed Comput. Pract., 1999
J. Parallel Distributed Comput., 1999
The Remote Enqueue Operation on Networks of Workstations.
Informatica (Slovenia), 1999
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999
1998
PaperFinder: A Tool for Scalable Search of Digital Libraries.
Proceedings of WebNet 98, 1998
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998
Proceedings of the Network-Based Parallel Computing: Communication, 1998
1997
J. Parallel Distributed Comput., 1997
Proceedings of the 3rd IEEE Symposium on High-Performance Computer Architecture (HPCA '97), 1997
Proceedings of the Communication and Architectural Support for Network-Based Parallel Computing, 1997
1996
Implementation of a Reliable Remote Memory Pager.
Proceedings of the USENIX Annual Technical Conference, 1996
Proceedings of the MASCOTS '96, 1996
Telegraphos: High-Performance Networking for Parallel Processing on Workstation Clusters.
Proceedings of the Second International Symposium on High-Performance Computer Architecture, 1996
1994
IEEE Trans. Parallel Distributed Syst., 1994
Proceedings of the PARLE '94: Parallel Architectures and Languages Europe, 1994
Trace-Driven Simulation of Data-Alignment and Ohter Factors Affecting Update and Invalidate Based Coherent Memory.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994
1993
How Architecture Evolution Influences the Scheduling Discipline used in Shared-Memory Multiprocessors.
Proceedings of the Parallel Computing: Trends and Applications, 1993
1992
Proceedings of the Fourth IEEE Symposium on Parallel and Distributed Processing, 1992
Load Balancing vs. Locality Management in Shared-Memory Multiprocessors.
Proceedings of the 1992 International Conference on Parallel Processing, 1992
1991
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991
Proceedings of the Thirteenth ACM Symposium on Operating System Principles, 1991
1989
Comput. Syst., 1989