Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ioannidis, Sotiris
add a person with the name Ioannidis, Sotiris
 

Other publications of authors with the same name

Understanding the behavior of malicious applications in social networks., , , , , and . IEEE Network, 24 (5): 14-19 (2010)GPU-assisted malware., , and . Int. J. Inf. Sec., 14 (3): 289-297 (2015)Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications., , , , , and . I. J. Network Security, 4 (1): 69-80 (2007)Secure and Flexible Global File Sharing., , , , , and . USENIX Annual Technical Conference, FREENIX Track, page 165-178. USENIX, (2003)Distributed Privacy-Preserving Policy Reconciliation., , and . ICC, page 1342-1349. IEEE, (2007)Flying Memcache: Lessons Learned from Different Acceleration Strategies., , , , and . SBAC-PAD, page 25-32. IEEE Computer Society, (2014)The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines., , , , and . NDSS, The Internet Society, (2015)A deployable routing system for nanonetworks., , , , and . ICC, page 1-6. IEEE, (2016)A cooperative immunization system for an untrusting Internet., , , , and . ICON, page 403-408. IEEE, (2003)Investigating the complete corpus of referendum and elections tweets., , , , and . ASONAM, page 100-105. IEEE Computer Society, (2016)