Conferences
Conference Publications
A first look at the misuse and abuse of the IPv4 Transfer Market Vasileios Giotsas, Ioana Livadariu and Petros Gigis Proc. of PAM, 2020 | |
Profiling IoT-based Botnet Traffic using DNS Owen Dwyer, Angelos Marnerides, Vasileios Giotsas and Troy Mursch Proc. of Globecomm, 2020 | |
Honeypots for Automatic Network-Level Industrial Control System Security Sam Maesschalck, Vasileios Giotsas, Benjamin Green and Nicholas Races Proc. of Eurosys Doctoral workshop, 2020 | |
HoneyPlant: A Distributed Hybrid Honeypot System for ICS Security Sam Maesschalck, Vasileios Giotsas, Benjamin Green and Nicholas Race Proc. of Annual UK System Research Challenges Workshop, 2020 | |
(How Much) Does a Private WAN Improve Cloud Performance? Todd W Arnold, Ege Gurmericliler, Arpit Gupta, Matt Calder, Georgia Essig, Vasileios Giotsas and Ethan Katz-Bassett Proc. of IEEE INFOCOM, 2019 | |
BGP: Rethinking BGP programmability Nicholas Hart, Charalampos Rotsos, Vasileios Giotsas, Nicholas Race and David Hutchison Proc. of NOMS, 2019 | |
Identifying infected energy systems in the wild Angelos Marnerides, Vasileios Giotsas and Troy Mursch Proc. Of e-energy, 2019 | |
Stable and Practical AS Relationship Inference with ProbLink Yuchen Jin, Colin Scott, Amogh Dhamdhere, Vasileios Giotsas, Arvind Krishnamurthy and Scott Shenker Proc. of NSDI, 2019 | |
Deep-learning based precoding techniques for next-generation video compression Aaron Chadha, Eirina Bourtsoulatze, Vasileios Giotsas, Yiannis Andreopoulos and Sergio Grce Proc. of IBC, 2019 | |
FUJITSU White Paper: Cyber Threat Lab Angelos Marnerides, Daniel Prince, John Couzins, Ryan Mills, Vasileios Giotsas, Paul McEvatt, David Markham and Catherine Irvine | |
O Peer, Where Art Thou?: Uncovering Remote Peering Interconnections at IXPs Georgios Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas Dimitropoulos and Vasileios Giotsas Proc. of IMC, 2018 | |
CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection Vasileios Giotsas Proc. of ANRW, 2018 | |
Inferring BGP blackholing activity in the Internet Vasileios Giotsas, Georgios Smaragdakis, Christoph Dietzel, Philipp Richter, Anja Feldmann and Arthur Berger Proc. of IMC, 2017 | |
Detecting peering infrastructure outages in the wild Vasileios Giotsas, Christoph Dietzel, Georgios Smaragdakis, Anja Feldmann, Arthur Berger and Emile Aben Proc. of SiGCOMM, 2017 | |
BGPStream: A software framework for live and historical BGP data analysis Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas and Alberto Dainotti Proc. of IMC, 2016 | |
Cloud instance management and resource prediction for computation-as-a-service platforms Joseph Doyle, Vasileios Giotsas, Mohammad Ashraful Anam and Yiannis Andreopoulos Proc. of IC2E, 2016 | |
Query processing for the internet-of-things: Coupling of device energy consumption and cloud infrastructure billing Francesco Renna, Joseph Doyle, Yiannis Andreopoulos and Vasileios Giotsas Proc. of IoTDI, 2016 | |
Periscope: Unifying looking glass querying Vasileios Giotsas, Amogh Dhamdhere, K. C. Claffy Proc. of PAM, 2016 | |
Mapping peering interconnections to a facility Vasileios Giotsas, Georgios Smaragdakis, Bradley Huffaker, Matthew Luckie and K. C. Claffy Proc. of CoNEXT, 2015 | |
Perceptual video quality estimation by regression with myopic experts Vasileios Giotsas, Nikos Deligiannis, Pam Fisher and Yiannis Andreopoulos Proc. of QoMEx, 2015 | |
IPv6 AS relationships, cliques, and congruence Vasileios Giotsas, Matthew Luckie, Bradley Huffaker and Kc Claffy Proc. of PAM, 2015 | |
Video Clarity: High Speed Data Mining for Video Pam Fisher, Abbas Alhabib, Vasileios Giotsas and I. Andreopoulos Proc. of IBC, 2015 | |
Inferring complex AS relationships Vasileios Giotsas, Matthew Luckie, Bradley Huffaker and Kc Claffy Proc. of IMC, 2014 | |
AS relationships, customer cones, and validation Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileios Giotsas, Kc Claffy Proc. of IMC, 2013 | |
Improving the discovery of IXP peering links through passive BGP measurements Vasileios Giotsas and Shi Zhou Proc. of infocom, 2013 | |
Inferring multilateral peering Vasileios Giotsas, Shi Zhou, Matthew Luckie and Kc Claffy Proc. of CoNEXT, 2013 | |
Towards utilizing Tcpcrypt in mobile healthcare applications Stefanos A. Nikolidakis, Vasileios Giotsas, Emmanouil Georgakakis, Dimitrios D. Vergados and Christos Douligeris Proc. of MobiHealth, 2012 | |
Valley-free violation in Internet routing: analysis based on BGP Community data Vasileios Giotsas and Shi Zhou Proc. of ICC, 2012 | |
Detecting and assessing the hybrid IPv4/IPv6 as relationships Vasileios Giotsas and Shi Zhou Proc. of SIGCOMM, 2011 | |
Inferring Internet AS Relationships Based on BGP Routing Policies Vasileios Giotsas and Shi Zhou | |
A secure ubiquitous healthcare system based on IMS and the HL7 standards Stefanos A. Nikolidakis, Emmanouil Georgakakis, Vasileios Giotsas, Dimitrios D. Vergados and Christos Douligeris Proc. of Petra, 2010 | |
A mobile healthcare system using IMS and the HL7 framework Stefanos Nikolidakis, Vasileios Giotsas, Dimitrios Vergados and Christos Douligeris Proc. of ANCS, 2009 | |
A novel power-efficient middleware scheme for sensor grid applications Nikolaos I. Miridakis, Vasileios Giotsas, Dimitrios D. Vergados and Christos Douligeris Proc. of QShine, 2009 |