Panayiotis Mavrommatis
Panayiotis Mavrommatis
Geverifieerd e-mailadres voor google.com - Homepage
Geciteerd door
Geciteerd door
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
The Ghost in the Browser: Analysis of Web-based Malware.
N Provos, D McNamee, P Mavrommatis, K Wang, N Modadugu
HotBots 7, 4-4, 2007
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Intrusive software management
N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ...
US Patent App. 12/041,309, 2009
Identifying known and unknown peer-to-peer traffic
F Constantinou, P Mavrommatis
Fifth IEEE International Symposium on Network Computing and Applications …, 2006
Cybercrime 2.0: when the cloud turns dark
N Provos, MA Rajab, P Mavrommatis
Communications of the ACM 52 (4), 42-47, 2009
Ghost turns zombie: Exploring the life cycle of web-based malware
M Polychronakis, P Mavrommatis, N Provos
Trends and lessons from three years fighting malicious extensions
N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 579-593, 2015
Detecting an intrusive landing page
N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ...
US Patent 8,019,700, 2011
CAMP: Content-agnostic malware protection
MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos
The nocebo effect on the web: an analysis of fake anti-virus distribution
MA Rajab, L Ballard, P Marvrommatis, N Provos, X Zhao
Trends in circumventing web-malware detection
M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ...
Google, Google Technical Report 168, 2011
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software.
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
USENIX Security Symposium, 721-739, 2016
All your iframes point to us
NPP Mavrommatis, M Monrose
USENIX security symposium, 1-16, 2008
Protecting users from undesirable content
MG Morrissey, R Cannings, JB Gruver, A Ghosh, JB Larimer, AD Stadler, ...
US Patent App. 13/633,093, 2014
Email-based worm propagation properties
P Gopalan, K Jamieson, P Mavrommatis
US Patent App. 11/387,087, 2007
Automated implementation of complex distributed algorithms specified in the IOA language
C Georgiou, N Lynch, P Mavrommatis, JA Tauber
International Journal on Software Tools for Technology Transfer 11, 153-171, 2009
Exploit-based worm propagation mitigation
P Gopalan, K Jamieson, P Mavrommatis
US Patent 8,006,306, 2011
Detecting pirated applications
A Bhatia, MG Kang, MI Sharif, N Provos, P Mavrommatis, S Bandhakavi
US Patent 8,875,303, 2014
Intrusive software management
Y Zhou, N Provos, CW Bavor, EL Davis Jr, M Palatucci, KP Nigam, ...
US Patent 8,515,896, 2013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20