DDoS in the IoT: Mirai and other botnets C Kolias, G Kambourakis, A Stavrou, J Voas Computer 50 (7), 80-84, 2017 | 2209 | 2017 |
Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset C Kolias, G Kambourakis, A Stavrou, S Gritzalis IEEE Communications Surveys & Tutorials 18 (1), 184-208, 2015 | 570 | 2015 |
Malicious PDF detection using metadata and structural features C Smutz, A Stavrou Proceedings of the 28th annual computer security applications conference …, 2012 | 372 | 2012 |
Malware detector A Stavrou, S Jajodia, A Ghosh, R Martin, C Andrianakis US Patent 8,935,773, 2015 | 327 | 2015 |
Distributed Sensor for Detecting Malicious Software A Ghosh, Y Huang, J Wang, A Stavrou US Patent App. 12/558,841, 2010 | 300 | 2010 |
Casting out demons: Sanitizing training data for anomaly sensors GF Cretu, A Stavrou, ME Locasto, SJ Stolfo, AD Keromytis 2008 IEEE Symposium on Security and Privacy (sp 2008), 81-95, 2008 | 292 | 2008 |
Hypercheck: A hardware-assistedintegrity monitor F Zhang, J Wang, K Sun, A Stavrou IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2013 | 286 | 2013 |
The mirai botnet and the iot zombie armies G Kambourakis, C Kolias, A Stavrou MILCOM 2017-2017 IEEE military communications conference (MILCOM), 267-272, 2017 | 268 | 2017 |
Using graphic turing tests to counter automated ddos attacks against web servers WG Morein, A Stavrou, DL Cook, AD Keromytis, V Misra, D Rubenstein Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 230 | 2003 |
On the infeasibility of modeling polymorphic shellcode Y Song, ME Locasto, A Stavrou, AD Keromytis, SJ Stolfo Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 203 | 2007 |
Methods, media and systems for responding to a denial of service attack A Stavrou, AD Keromytis, J Nieh, V Misra, D Rubenstein US Patent 8,549,646, 2013 | 172 | 2013 |
A whitebox approach for automated security testing of Android applications on the cloud R Mahmood, N Esfahani, T Kacem, N Mirzaei, S Malek, A Stavrou 2012 7th International Workshop on Automation of Software Test (AST), 22-28, 2012 | 171 | 2012 |
Learning Internet-of-Things security" hands-on" C Kolias, A Stavrou, J Voas, I Bojanova, R Kuhn IEEE Security & Privacy 14 (1), 37-46, 2016 | 168 | 2016 |
Catch me if you can: A cloud-enabled DDoS defense Q Jia, H Wang, D Fleck, F Li, A Stavrou, W Powell 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 158 | 2014 |
Motag: Moving target defense against internet denial of service attacks Q Jia, K Sun, A Stavrou 2013 22nd International Conference on Computer Communication and Networks …, 2013 | 153 | 2013 |
SQLProb: a proxy-based architecture towards preventing SQL injection attacks A Liu, Y Yuan, D Wijesekera, A Stavrou Proceedings of the 2009 ACM symposium on Applied Computing, 2054-2061, 2009 | 152 | 2009 |
Exploiting smart-phone usb connectivity for fun and profit Z Wang, A Stavrou Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 146 | 2010 |
A moving target DDoS defense mechanism H Wang, Q Jia, D Fleck, W Powell, F Li, A Stavrou Computer Communications 46, 10-21, 2014 | 142 | 2014 |
Universal multi-factor authentication using graphical passwords AP Sabzevar, A Stavrou 2008 IEEE international conference on signal image technology and internet …, 2008 | 141 | 2008 |
A study of malcode-bearing documents WJ Li, S Stolfo, A Stavrou, E Androulaki, AD Keromytis Detection of Intrusions and Malware, and Vulnerability Assessment: 4th …, 2007 | 125 | 2007 |