Kostas Anagnostakis
Kostas Anagnostakis
Verified email at
Cited by
Cited by
Paranoid android: versatile protection for smartphones
G Portokalidis, P Homburg, K Anagnostakis, H Bos
Proceedings of the 26th annual computer security applications conference …, 2010
Systems and methods for detecting and inhibiting attacks using honeypots
S Sidiroglou, AD Keromytis, KG Anagnostakis
US Patent 7,904,959, 2011
Defending against hitlist worms using network address space randomization
S Antonatos, P Akritidis, EP Markatos, KG Anagnostakis
Proceedings of the 2005 ACM workshop on Rapid malcode, 30-40, 2005
Detecting targeted attacks using shadow honeypots
KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ...
Generating realistic workloads for network intrusion detection systems
S Antonatos, KG Anagnostakis, EP Markatos
Proceedings of the 4th International Workshop on Software and Performance …, 2004
Exchange-based incentive mechanisms for peer-to-peer file sharing
KG Anagnostakis, MB Greenwald
24th International Conference on Distributed Computing Systems, 2004 …, 2004
Network–level polymorphic shellcode detection using emulation
M Polychronakis, KG Anagnostakis, EP Markatos
International Conference on Detection of Intrusions and Malware, and …, 2006
Emulation-based detection of non-self-contained polymorphic shellcode
M Polychronakis, KG Anagnostakis, EP Markatos
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
Stride: Polymorphic sled detection through instruction sequence analysis
P Akritidis, EP Markatos, M Polychronakis, K Anagnostakis
Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005
cing: Measuring network-internal delays using only existing infrastructure
KG Anagnostakis, M Greenwald, RS Ryger
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
E 2 xB: A Domain-Specific String Matching Algorithm for Intrusion Detection
KG Anagnostakis, S Antonatos, EP Markatos, M Polychronakis
Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003
Exclusion-based signature matching for intrusion detection
EP Markatos, S Antonatos, M Polychronakis, KG Anagnostakis
Proceedings of the IASTED International Conference on Communications and …, 2002
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
Comprehensive shellcode detection using runtime heuristics
M Polychronakis, KG Anagnostakis, EP Markatos
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks
A Vasilakos, C Ricudis, K Anagnostakis, W Pedryca, A Pitsillides
1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World …, 1998
Efficient packet monitoring for network management
KG Anagnostakis, S Ioannidis, S Miltchev, M Greenwald, JM Smith, ...
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
A cooperative immunization system for an untrusting internet
KG Anagnostakis, MB Greenwald, S Ioannidis, AD Keromytis, D Li
The 11th IEEE International Conference on Networks, 2003. ICON2003., 403-408, 2003
Puppetnets: Misusing web browsers as a distributed attack infrastructure
VT Lam, S Antonatos, P Akritidis, KG Anagnostakis
Proceedings of the 13th ACM conference on Computer and communications …, 2006
An active splitter architecture for intrusion detection and prevention
K Xinidis, I Charitakis, S Antonatos, KG Anagnostakis, EP Markatos
IEEE Transactions on Dependable and Secure Computing 3 (1), 31-44, 2006
Performance analysis of content matching intrusion detection systems
S Antonatos, KG Anagnostakis, EP Markatos, M Polychronakis
2004 International Symposium on Applications and the Internet. Proceedings …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20