-
Engineering (FSE). ACM, 2015, pp. 793– 804. Petsios, T., Tang, A., Stolfo, S.,
Keromytis, A. D., & Jana, S. (2017, May). NEZHA:
Efficient Domain-Independent Differential...
- Athanasios; Alrawi, Omar; Valakuzhy, Kevin; Lever, Charles; Burbage, Paul;
Keromytis,
Angelos D.; Monrose, Fabian; Antonakakis,
Manos (2023). "Beyond The Gates:...
-
administered for most of its
duration by Hugh Daniel. John
Ioannidis and
Angelos Keromytis started the
codebase while outside the
United States prior to
autumn 1997...
-
Kalyvopoulos A.
Kostis Antonis Dalgas Giorgos Theologitis (Katsaros)
Stelios Keromytis Giorgos Mouflouzelis Giorgos Kavouaras Odysseas Moshonas Note: Sometimes...
-
Retrieved 9
March 2016. Cova, Marco; Leita, Corrado; Thonnard, Olivier;
Keromytis, Angelos; Dacier, Marc (2009). Gone Rogue: An
Analysis of
Rogue Security...
- 1
November 2016. De Raadt, Theo; Hallqvist, Niklas; Grabowski, Artur;
Keromytis,
Angelos D.; Provos,
Niels (6 June 1999).
Cryptography in OpenBSD: An...
- 2722. doi:10.1016/j.csda.2008.10.015. Locasto,
Michael E.; Wang, Ke;
Keromytis,
Angeles D.; Salvatore, J.
Stolfo (2005). "FLIPS:
Hybrid Adaptive Intrusion...
- Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis;
Keromytis,
Angelos D. (2014-08-18). "Detection and
analysis of
eavesdropping in...
- 1007/978-3-030-02744-5_28, ISBN 978-3-030-02743-8,
retrieved 2020-10-07
Keromytis,
Angelos D. (2007), "Characterizing
Software Self-Healing Systems", in...
- Return-oriented
programming without returns. In
Proceedings of CCS 2010, A.
Keromytis and V. Shmatikov, Eds. ACM Press, 559–572 Onarlioglu, K., Bilge, L., Lanzi...