Implementing a distributed firewall S Ioannidis, AD Keromytis, SM Bellovin, JM Smith Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 962 | 2000 |
A new wireless communication paradigm through software-controlled metasurfaces C Liaskos, S Nie, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz IEEE Communications Magazine 56 (9), 162-169, 2018 | 865 | 2018 |
Gnort: High performance network intrusion detection using graphics processors G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis International Conference on Recent Advances in Intrusion Detection, 116-134, 2008 | 463 | 2008 |
Rage against the Virtual Machine: Hindering Dynamic Analysis of Android Malware T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis Proceedings of the Seventh European Workshop on System Security (EuroSec), 6, 2014 | 308 | 2014 |
Regular expression matching on graphics hardware for intrusion detection G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis International Conference on Recent Advances in Intrusion Detection, 265-283, 2009 | 189 | 2009 |
MIDeA: a multi-parallel intrusion detection architecture G Vasiliadis, M Polychronakis, S Ioannidis Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 183 | 2011 |
Face/off: Preventing privacy leakage from photos in social networks P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 174 | 2015 |
Detecting social network profile cloning G Kontaxis, I Polakis, S Ioannidis, EP Markatos 2011 IEEE international conference on pervasive computing and communications …, 2011 | 168 | 2011 |
we. b: The web of short URLs D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ... Proceedings of the 20th international conference on World Wide Web, 715-724, 2011 | 146 | 2011 |
A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks D Antonakaki, P Fragopoulou, S Ioannidis Expert Systems with Applications 164, 114006, 2021 | 141 | 2021 |
Toward intelligent metasurfaces: the progress from globally tunable metasurfaces to software‐defined metasurfaces with an embedded network of controllers O Tsilipakos, AC Tasolamprou, A Pitilakis, F Liu, X Wang, MS Mirmoosa, ... Advanced optical materials 8 (17), 2000783, 2020 | 130 | 2020 |
HCFI: Hardware-enforced Control Flow Integrity N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis 6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2016 | 124 | 2016 |
Two-factor authentication: is the world ready? Quantifying 2FA adoption T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis Proceedings of the eighth european workshop on system security, 1-7, 2015 | 124 | 2015 |
Review of security and privacy for the Internet of Medical Things (IoMT) G Hatzivasilis, O Soultatos, S Ioannidis, C Verikoukis, G Demetriou, ... 2019 15th international conference on distributed computing in sensor …, 2019 | 115 | 2019 |
Using any surface to realize a new paradigm for wireless communications C Liaskos, A Tsioliaridou, A Pitsillides, S Ioannidis, I Akyildiz Communications of the ACM 61 (11), 30-33, 2018 | 115 | 2018 |
Antisocial networks: Turning a social network into a botnet E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ... Information Security: 11th International Conference, ISC 2008, Taipei …, 2008 | 112 | 2008 |
Design and development of software defined metamaterials for nanonetworks C Liaskos, A Tsioliaridou, A Pitsillides, IF Akyildiz, NV Kantartzis, AX Lalas, ... IEEE Circuits and Systems Magazine 15 (4), 12-25, 2015 | 99 | 2015 |
GASPP: A GPU-Accelerated Stateful Packet Processing Framework G Vasiliadis, L Koromilas, M Polychronakis, S Ioannidis USENIX Annual Technical Conference, 2014 | 96 | 2014 |
A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime A Goldsteen, M Moffie, T Bandyszak, X Mohammadi, Nazila Gol, Chen, ... 1st International Workshop on Requirements for Self-Adaptive and Cyber …, 2015 | 95 | 2015 |
Sub-operating systems: A new approach to application security S Ioannidis, SM Bellovin, JM Smith Proceedings of the 10th workshop on ACM SIGOPS European workshop, 108-115, 2002 | 95 | 2002 |