Stelios Sidiroglou-Douskos
According to our database1,
Stelios Sidiroglou-Douskos
authored at least 37 papers
between 2003 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Automatic error elimination by horizontal code transfer across multiple applications.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2014
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014
2013
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013
2012
Proceedings of the 2012 ACM workshop on Relaxing synchronization for multicore and manycore scalability, 2012
Proceedings of the 34th International Conference on Software Engineering, 2012
2011
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011
Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems, 2011
2010
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
2009
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009
2007
Proceedings of the Malware Detection, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
2006
Int. J. Inf. Sec., 2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
2005
SIGARCH Comput. Archit. News, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the 2005 USENIX Annual Technical Conference, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003