71 results on '"Ioannidis, Sotiris"'
Search Results
2. CIPSEC-Enhancing Critical Infrastructure Protection with Innovative Security Framework
3. IntellIoT: Intelligent IoT Environments
4. Big Data Analytics in the Manufacturing Sector: Guidelines and Lessons Learned Through the Centro Ricerche FIAT (CRF) Case
5. Big Data Analytics in the Banking Sector: Guidelines and Lessons Learned from the CaixaBank Case
6. Hard Edges: Hardware-Based Control-Flow Integrity for Embedded Devices
7. Andromeda: Enabling Secure Enclaves for the Android Ecosystem
8. Applications of the Internet of Materials: Programmable Wireless Environments
9. Designing the Internet-of-Materials Interaction Software
10. Preface
11. Introduction
12. List of contributors
13. Biosensors and Internet of Things in smart healthcare applications: challenges and opportunities
14. 7. Pattern-driven Security, Privacy, Dependability and Interoperability in IoT
15. Towards the Insurance of Healthcare Systems
16. I-BiDaaS: Industrial-Driven Big Data as a Self-service Solution
17. You Shall Not Register! Detecting Privacy Leaks Across Registration Forms
18. Automated Measurements of Cross-Device Tracking
19. Security Concerns in Cooperative Intelligent Transportation Systems
20. No Sugar but All the Taste! Memory Encryption Without Architectural Support
21. Usability Evaluation of Accessible Complex Graphs
22. GRIM: Leveraging GPUs for Kernel Integrity Monitoring
23. Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering
24. Think Before RT: An Experimental Study of Abusing Twitter Trends
25. Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software
26. Secure Hardware-Software Architectures for Robust Computing Systems
27. GPU-Disasm: A GPU-Based X86 Disassembler
28. TRACER: A Platform for Securing Legacy Code
29. AndRadar: Fast Discovery of Android Applications in Alternative Markets
30. Privacy Risks from Public Data Sources
31. Chapter 2 - Biosensors and Internet of Things in smart healthcare applications: challenges and opportunities
32. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation
33. Dynamic Monitoring of Dark IP Address Space (Poster)
34. D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
35. GrAVity: A Massively Parallel Antivirus Engine
36. Regular Expression Matching on Graphics Hardware for Intrusion Detection
37. Controlling Access to XML Documents over XML Native and Relational Databases
38. Future Threats to Future Trust
39. Experiences Enhancing Open Source Security in the POSSE Project
40. Preserving TCP Connections Across Host Address Changes
41. Experiences Enhancing Open Source Security in the POSSE Project
42. TAPI: Transactions for Accessing Public Infrastructure
43. Fileteller: Paying and Getting Paid for File Storage
44. Open Packet Monitoring on FLAME: Safety, Performance, and Applications
45. Practical Network Applications on a Lightweight Active Management Environment
46. Scalable Resource Control in Active Networks
47. Compiler and Run-Time Support for Adaptive Load Balancing in Software Distributed Shared Memory Systems
48. GRIM: Leveraging GPUs for Kernel Integrity Monitoring.
49. Gnort: High Performance Network Intrusion Detection Using Graphics Processors
50. Compromising Anonymity Using Packet Spinning
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.