Angelos

Results: 194



#Item
1HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:27
2ἀρετή student online philosophy journal Dezember 2014, Nº 2 ANGELOS SCHOINAS The Aristotelean Concept of Habituation - A Psychological Approach

ἀρετή student online philosophy journal Dezember 2014, Nº 2 ANGELOS SCHOINAS The Aristotelean Concept of Habituation - A Psychological Approach

Add to Reading List

Source URL: www.philosophie.unibe.ch

Language: English - Date: 2015-03-24 11:14:14
    3Ice, ice maybe? Angelos Michaelides1 1 Thomas Young Centre, Department of Physics and Astronomy, University College London, UK

    Ice, ice maybe? Angelos Michaelides1 1 Thomas Young Centre, Department of Physics and Astronomy, University College London, UK

    Add to Reading List

    Source URL: conferences.au.dk

    Language: English - Date: 2018-03-09 04:47:43
      4Bypassing clang’s SafeStack for Fun and Profit Enes Göktaş, Angelos Economopoulos, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos

      Bypassing clang’s SafeStack for Fun and Profit Enes Göktaş, Angelos Economopoulos, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2018-05-11 13:27:48
        5HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

        HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-04-03 15:58:27
          61 Distributed Trust John Ioannidis, AT&T Labs – Research Angelos D. Keromytis, Columbia University  CONTENTS

          1 Distributed Trust John Ioannidis, AT&T Labs – Research Angelos D. Keromytis, Columbia University CONTENTS

          Add to Reading List

          Source URL: www.cs.columbia.edu

          Language: English - Date: 2005-01-21 17:53:06
            7Developing a Benchmark Suite for Semantic Web Data from Existing Workflows Antonis Troumpoukis1 , Angelos Charalambidis1 , Giannis Mouchakis1 , Stasinos Konstantopoulos1 , Ronald Siebes2 , Victor de Boer2 , Stian Soiland

            Developing a Benchmark Suite for Semantic Web Data from Existing Workflows Antonis Troumpoukis1 , Angelos Charalambidis1 , Giannis Mouchakis1 , Stasinos Konstantopoulos1 , Ronald Siebes2 , Victor de Boer2 , Stian Soiland

            Add to Reading List

            Source URL: ceur-ws.org

            Language: English - Date: 2016-09-06 06:55:28
              8DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Mansoor Alicherry Angelos D. Keromytis Department of Computer Science, Columbia University in the City of New York

              DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Mansoor Alicherry Angelos D. Keromytis Department of Computer Science, Columbia University in the City of New York

              Add to Reading List

              Source URL: www.cs.columbia.edu

              - Date: 2009-03-19 11:59:22
                9(IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke

                (IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke

                Add to Reading List

                Source URL: www.ics.forth.gr

                - Date: 2012-03-22 09:28:00