A survey on encrypted network traffic analysis applications, techniques, and countermeasures E Papadogiannaki, S Ioannidis ACM Computing Surveys (CSUR) 54 (6), 1-35, 2021 | 180 | 2021 |
Otter: A scalable high-resolution encrypted traffic identification engine E Papadogiannaki, C Halevidis, P Akritidis, L Koromilas Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 38 | 2018 |
Efficient software packet processing on heterogeneous and asymmetric hardware architectures E Papadogiannaki, L Koromilas, G Vasiliadis, S Ioannidis IEEE/ACM Transactions on Networking 25 (3), 1593-1606, 2017 | 26 | 2017 |
Trustav: Practical and privacy preserving malware analysis in the cloud D Deyannis, E Papadogiannaki, G Kalivianakis, G Vasiliadis, S Ioannidis Proceedings of the tenth ACM conference on data and application security and …, 2020 | 25 | 2020 |
Acceleration of intrusion detection in encrypted network traffic using heterogeneous hardware E Papadogiannaki, S Ioannidis Sensors 21 (4), 1140, 2021 | 23 | 2021 |
Network Intrusion Detection in Encrypted Traffic E Papadogiannaki, G Tsirantonakis, S Ioannidis 2022 IEEE Conference on Dependable and Secure Computing (DSC), 2022 | 20 | 2022 |
Head (er) hunter: Fast intrusion detection using packet metadata signatures E Papadogiannaki, D Deyannis, S Ioannidis 2020 IEEE 25th International Workshop on Computer Aided Modeling and Design …, 2020 | 10 | 2020 |
Encrypted Traffic Analysis P Dimou, J Fajfer, N Müller, E Papadogiannaki, E Rekleitis, F Střasák European Union Agency for Cybersecurity (ENISA), 2019 | 10 | 2019 |
Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting E Papadogiannaki, S Ioannidis 2023 IEEE Symposium on Computers and Communications (ISCC), 764-770, 2023 | 8 | 2023 |
Pythia: Scheduling of concurrent network packet processing applications on heterogeneous devices G Giakoumakis, E Papadogiannaki, G Vasiliadis, S Ioannidis 2020 6th IEEE Conference on Network Softwarization (NetSoft), 145-149, 2020 | 6 | 2020 |
Fingerprinting the Shadows: Unmasking Malicious Servers with Machine Learning-Powered TLS Analysis A Theofanous, E Papadogiannaki, A Shevtsov, S Ioannidis Proceedings of the ACM on Web Conference 2024, 1933-1944, 2024 | 3 | 2024 |
A Reconfigurable IDS Framework for Encrypted and Non-Encrypted Network Data in Supply Chains E Papadogiannaki, G Chrysos, K Georgopoulos, S Ioannidis 2023 International Conference on Engineering and Emerging Technologies …, 2023 | 3 | 2023 |
Scheduling of multiple network packet processing applications using Pythia G Giakoumakis, E Papadogiannaki, G Vasiliadis, S Ioannidis Computer Networks 212, 109006, 2022 | 3 | 2022 |
The diversification and enhancement of an ids scheme for the cybersecurity needs of modern supply chains D Deyannis, E Papadogiannaki, G Chrysos, K Georgopoulos, S Ioannidis Electronics 11 (13), 1944, 2022 | 3 | 2022 |
Pythia: Scheduling of Concurrent Network packet Processing Applications on Heterogeneous Devices [EXTENDED VERSION] G Giakoumakis, E Papadogiannaki, G Vasiliadis, S Ioannidis arXiv preprint arXiv:2201.01584, 2022 | | 2022 |
CyberSure: A Framework for Liability Based Trust G Christou, E Papadogiannaki, M Diamantaris, L Torterolo, P Chatziadam International Workshop on Information and Operational Technology Security …, 2019 | | 2019 |
GPU-accelerated encrypted network traffic inspection (poster) E Papadogiannaki, S Ioannidis ACM Celebration of Women in Computing (womENcourage), 2019 | | 2019 |
An Efficient Scheduling Approach for Concurrent Packet Processing Applications on Heterogeneous Systems (poster) E Papadogiannaki, S Ioannidis ACM Celebration of Women in Computing (womENcourage) 200, 16k, 2016 | | 2016 |