关注
vassilis prevelakis
vassilis prevelakis
Guest Professor of Computer Security, TU Braunschweig
在 ida.ing.tu-bs.de 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Countering code-injection attacks with instruction-set randomization
GS Kc, AD Keromytis, V Prevelakis
Proceedings of the 10th ACM conference on Computer and communications …, 2003
9872003
The athens affair
V Prevelakis, D Spinellis
Ieee Spectrum 44 (7), 26-33, 2007
1712007
The athens affair
V Prevelakis, D Spinellis
Ieee Spectrum 44 (7), 26-33, 2007
1712007
Sandboxing Applications.
V Prevelakis, D Spinellis
USENIX Annual Technical Conference, FREENIX Track, 119-126, 2001
1552001
On the general applicability of instruction-set randomization
SW Boyd, GS Kc, ME Locasto, AD Keromytis, V Prevelakis
IEEE Transactions on Dependable and Secure Computing 7 (3), 255-270, 2008
852008
Fileteller: Paying and getting paid for file storage
J Ioannidis, S Ioannidis, AD Keromytis, V Prevelakis
Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003
832003
Decentralized access control in distributed file systems
S Miltchev, JM Smith, V Prevelakis, A Keromytis, S Ioannidis
ACM Computing Surveys (CSUR) 40 (3), 1-30, 2008
762008
Dropin security for distributed and portable computing elements
V Prevelakis, A Keromytis
Internet Research 13 (2), 107-115, 2003
672003
Characterizing the'security vulnerability likelihood'of software functions
D DaCosta, C Dahn, S Mancoridis, V Prevelakis
International Conference on Software Maintenance, 2003. ICSM 2003 …, 2003
632003
Secure and flexible global file sharing
S Miltchev, V Prevelakis, S Ioannidis, J Ioannidis, AD Keromytis, JM Smith
432003
A secure station for network monitoring and control
V Prevelakis
Proceedings of 8th USENIX SECURITY Conference, 101-109, 1999
311999
Tapi: Transactions for accessing public infrastructure
M Blaze, J Ioannidis, S Ioannidis, AD Keromytis, P Nikander, V Prevelakis
Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003
242003
SAVTA: A hybrid vehicular threat model: Overview and case study
M Hamad, V Prevelakis
Information 11 (5), 273, 2020
232020
Attack-tree-based Threat Modeling of Medical Implants.
MA Siddiqi, RM Seepers, M Hamad, V Prevelakis, C Strydis
PROOFS, 32-49, 2018
212018
Towards comprehensive threat modeling for vehicles
M Hamad, M Nolte, V Prevelakis
the 1st Workshop on Security and Dependability of Critical Embedded Real …, 2016
212016
Prediction of abnormal temporal behavior in real-time systems
M Hamad, ZAH Hammadeh, S Saidi, V Prevelakis, R Ernst
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 359-367, 2018
202018
A communication framework for distributed access control in microkernel-based systems
M Hamad, J Schlatow, V Prevelakis, R Ernst
12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time …, 2016
202016
Designing an Embedded Firewall/VPN Gateway
V Prevelakis, AD Keromytis
192002
Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System.
M Hamad, M Tsantekidis, V Prevelakis
VEHITS, 148-158, 2019
152019
How to buy a network: Trading of resources in the physical layer
V Prevelakis, A Jukan
IEEE Communications Magazine 44 (12), 94-102, 2006
152006
系统目前无法执行此操作,请稍后再试。
文章 1–20