Follow
Xenia Mountrouidou
Xenia Mountrouidou
Senior Security Researcher, Cyber adAPT
Verified email at cyberadapt.com - Homepage
Title
Cited by
Cited by
Year
Selective packet inspection to detect DoS flooding using software defined networking (SDN)
T Chin, X Mountrouidou, X Li, K Xiong
2015 IEEE 35th international conference on distributed computing systems …, 2015
902015
An SDN-supported collaborative approach for DDoS flooding detection and containment
T Chin, X Mountrouidou, X Li, K Xiong
MILCOM 2015-2015 IEEE Military Communications Conference, 659-664, 2015
532015
Securing the human: a review of literature on broadening diversity in cybersecurity education
X Mountrouidou, D Vosen, C Kari, MQ Azhar, S Bhatia, G Gagne, ...
Proceedings of the Working Group Reports on Innovation and Technology in …, 2019
502019
Not just another Internet of Things taxonomy: A method for validation of taxonomies
X Mountrouidou, B Billings, L Mejia-Ricart
Internet of Things 6, 100049, 2019
252019
Cybersecurity in liberal arts general education curriculum
X Mountrouidou, X Li, Q Burke
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology …, 2018
212018
On the departure process of burst aggregation algorithms in optical burst switching
X Mountrouidou, H Perros
Computer Networks 53 (3), 247-264, 2009
202009
Characterization of the burst aggregation process in optical burst switching
X Mountrouidou, HG Perros
International Conference on Research in Networking, 752-764, 2006
172006
A zero burst loss architecture for star OBS networks
X Mountrouidou, V Puttasubbappa, H Perros
International Conference on Network Control and Engineering for QoS …, 2006
162006
Bandwidth allocation under end‐to‐end percentile delay bounds
B Anjum, H Perros, X Mountrouidou, K Kontovasilis
International Journal of Network Management 21 (6), 536-547, 2011
142011
Spectral clustering technique for classifying network attacks
A Little, X Mountrouidou, D Moseley
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
112016
Performance evaluation of an optical burst switching scheme for grid networks
X Mountrouidou, HG Perros, M Beshai
2nd International Conference on Broadband Networks, 2005., 515-523, 2005
112005
The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity
R Weiss, CW O'Brien, X Mountrouidou, J Mache
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
102017
Adaptive workload shaping for power savings on disk drives
X Mountrouidou, A Riska, E Smirni
Proceedings of the 2nd ACM/SPEC International Conference on Performance …, 2011
102011
IoT metrics and automation for security evaluation
T Setzler, X Mountrouidou
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021
92021
Raising flags: Detecting covert storage channels using relative entropy
JK Chow, X Li, X Mountrouidou
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
92017
Securing the human: Broadening diversity in cybersecurity
M Azhar, S Bhatia, G Gagne, C Kari, J Maguire, X Mountrouidou, L Tudor, ...
Proceedings of the 2019 ACM Conference on Innovation and Technology in …, 2019
82019
Denial of service lab for experiential cybersecurity learning in primarily undergraduate institutions
H Ledford, X Mountrouidou, X Li
Journal of Computing Sciences in Colleges 32 (2), 158-164, 2016
72016
System and method for graphical context drill-down
DA Bell, CL Gussin, P Mountrouidou
US Patent App. 12/862,022, 2012
72012
Saving power without compromising disk drive reliability
X Mountrouidou, A Riska, E Smirni
2011 International Green Computing Conference and Workshops, 1-6, 2011
72011
Memory management for object oriented applications during runtime
PB Benjamin, DN Brauneis Jr, JP Jurkiewicz, RG McDougald, ...
US Patent 8,453,130, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20