A new wireless communication paradigm through software-controlled metasurfaces C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz IEEE communications magazine 56 (9), 162-169, 2018 | 1156 | 2018 |
Implementing a distributed firewall S Ioannidis, AD Keromytis, SM Bellovin, JM Smith Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 1004 | 2000 |
Gnort: High performance network intrusion detection using graphics processors G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis International Conference on Recent Advances in Intrusion Detection, 116-134, 2008 | 470 | 2008 |
Rage against the Virtual Machine: Hindering Dynamic Analysis of Android Malware T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis Proceedings of the Seventh European Workshop on System Security (EuroSec), 6, 2014 | 340 | 2014 |
A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks D Antonakaki, P Fragopoulou, S Ioannidis Expert systems with applications 164, 114006, 2021 | 272 | 2021 |
Toward intelligent metasurfaces: the progress from globally tunable metasurfaces to software‐defined metasurfaces with an embedded network of controllers O Tsilipakos, AC Tasolamprou, A Pitilakis, F Liu, X Wang, MS Mirmoosa, ... Advanced optical materials 8 (17), 2000783, 2020 | 197 | 2020 |
Regular expression matching on graphics hardware for intrusion detection G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis International Conference on Recent Advances in Intrusion Detection, 265-283, 2009 | 195 | 2009 |
Face/off: Preventing privacy leakage from photos in social networks P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis Proceedings of the 22nd ACM SIGSAC Conference on computer and communications …, 2015 | 194 | 2015 |
MIDeA: a multi-parallel intrusion detection architecture G Vasiliadis, M Polychronakis, S Ioannidis Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 192 | 2011 |
Detecting social network profile cloning G Kontaxis, I Polakis, S Ioannidis, EP Markatos 2011 IEEE international conference on pervasive computing and communications …, 2011 | 183 | 2011 |
Review of security and privacy for the Internet of Medical Things (IoMT) G Hatzivasilis, O Soultatos, S Ioannidis, C Verikoukis, G Demetriou, ... 2019 15th international conference on distributed computing in sensor …, 2019 | 172 | 2019 |
Two-factor authentication: is the world ready? Quantifying 2FA adoption T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis Proceedings of the eighth european workshop on system security, 1-7, 2015 | 153 | 2015 |
we. b: The web of short URLs D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ... Proceedings of the 20th international conference on World Wide Web, 715-724, 2011 | 151 | 2011 |
HCFI: Hardware-enforced Control Flow Integrity N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis 6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2016 | 145 | 2016 |
Using any surface to realize a new paradigm for wireless communications C Liaskos, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz Communications of the ACM 61 (11), 30-33, 2018 | 135 | 2018 |
A survey on encrypted network traffic analysis applications, techniques, and countermeasures E Papadogiannaki, S Ioannidis ACM Computing Surveys (CSUR) 54 (6), 1-35, 2021 | 125 | 2021 |
Realizing wireless communication through software-defined hypersurface environments C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz 2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018 | 119 | 2018 |
Antisocial networks: Turning a social network into a botnet E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ... International Conference on Information Security, 146-160, 2008 | 116 | 2008 |
A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime A Goldsteen, M Moffie, T Bandyszak, X Mohammadi, Nazila Gol, Chen, ... 1st International Workshop on Requirements for Self-Adaptive and Cyber …, 2015 | 112 | 2015 |
A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz Ad Hoc Networks 87, 1-16, 2019 | 110 | 2019 |