Using social networks to harvest email addresses I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010 | 73 | 2010 |
{NetCheck}: Network Diagnoses from Blackbox Traces Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ... 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014 | 41 | 2014 |
Towards a Universal Data Provenance Framework using Dynamic Instrumentation E Gessiou, V Pappas, E Athanasopoulos, A Keromytis, S Ioannidis Proceedings of the 27th IFIP International Information Security and Privacy …, 2012 | 31 | 2012 |
IRILD: an Information Retrieval based method for Information Leak Detection E Gessiou, QH Vu, S Ioannidis Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), 2011 | 27 | 2011 |
Detecting latent cross-platform api violations J Rasley, E Gessiou, T Ohmann, Y Brun, S Krishnamurthi, J Cappos 2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015 | 6 | 2015 |
Digging up social structures from documents on the web E Gessiou, E Athanasopoulos, S Ioannidis Proceedings of the IEEE Global Communications Conference (GLOBECOM), 2011 | 5 | 2011 |
A Greek (privacy) tragedy: the introduction of social security numbers in Greece E Gessiou, A Labrinidis, S Ioannidis Proceedings of the 8th ACM workshop on Privacy in the electronic society …, 2009 | 5 | 2009 |
Values in Technology E Gessiou, C Richard | | |