Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Lazaros Koromilas"'
Publikováno v:
ANCS
Heterogeneous and asymmetric computing systems are composed by a set of different processing units, each with its own unique performance and energy characteristics. Still, the majority of current network packet processing frameworks targets only a si
Publikováno v:
IEEE/ACM Transactions on Networking. 25:610-623
Graphics processing units (GPUs) are a powerful platform for building the high-speed network traffic processing applications using low-cost hardware. The existing systems tap the massively parallel architecture of GPUs to speed up certain computation
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783030004699
RAID
RAID
Several security applications rely on monitoring network traffic, which is increasingly becoming encrypted. In this work, we propose a pattern language to describe packet trains for the purpose of fine-grained identification of application-level even
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::da6a3700d40f8d673a61de7ea5593beb
https://doi.org/10.1007/978-3-030-00470-5_15
https://doi.org/10.1007/978-3-030-00470-5_15
Autor:
Paolo Costa, Christos Gkantsidis, Greg O'Shea, Lazaros Koromilas, Hitesh Ballani, Matthew P. Grosvenor, Thomas Karagiannis
Publikováno v:
SIGCOMM
Many network functions executed in modern datacenters, e.g., load balancing, application-level QoS, and congestion control, exhibit three common properties at the data-plane: they need to access and modify state, to perform computations, and to acces
Publikováno v:
Research in Attacks, Intrusions, and Defenses-19th International Symposium, RAID 2016, Proceedings, 9854 LNCS, 3-23
Koromilas, L, Vasiliadis, G, Athanasopoulos, I & Ioannidis, S 2016, GRIM : Leveraging GPUs for Kernel integrity monitoring . in Research in Attacks, Intrusions, and Defenses-19th International Symposium, RAID 2016, Proceedings . vol. 9854 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9854 LNCS, Springer/Verlag, pp. 3-23, 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, Paris, France, 19/09/16 . https://doi.org/10.1007/978-3-319-45719-2_1
Research in Attacks, Intrusions, and Defenses ISBN: 9783319457185
RAID
Koromilas, L, Vasiliadis, G, Athanasopoulos, I & Ioannidis, S 2016, GRIM : Leveraging GPUs for Kernel integrity monitoring . in Research in Attacks, Intrusions, and Defenses-19th International Symposium, RAID 2016, Proceedings . vol. 9854 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9854 LNCS, Springer/Verlag, pp. 3-23, 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, Paris, France, 19/09/16 . https://doi.org/10.1007/978-3-319-45719-2_1
Research in Attacks, Intrusions, and Defenses ISBN: 9783319457185
RAID
Kernel rootkits can exploit an operating system and enable future accessibility and control, despite all recent advances in software protection. A promising defense mechanism against rootkits is Kernel Integrity Monitor (KIM) systems, which inspect t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41d8da48794b4e3145e34888f3c2dc15
https://research.vu.nl/en/publications/655534d8-3d0a-455e-bd11-7351c1f3f7b3
https://research.vu.nl/en/publications/655534d8-3d0a-455e-bd11-7351c1f3f7b3
Autor:
Elias Athanasopoulos, Giorgos Vasiliadis, Lazaros Koromilas, Dimitris Deyannis, Sotiris Ioannidis
Publikováno v:
SBAC-PAD
Distributed key-value and always-in-memory store is employed by large and demanding services, such as Facebook and Amazon. It is apparent that generic implementations of such caches can not meet the needs of every application, therefore further resea
Autor:
Lazaros Koromilas, Kostas Magoutis
Publikováno v:
Distributed Applications and Interoperable Systems ISBN: 9783642213861
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f880e1d697f350f9555cf280f1e36709
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642042188
Secure Data Management
Secure Data Management
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We developed a re-annotation algorithm that computes the XPath query which
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5ff703ac4842b09a06fdc96d88f64aeb
https://doi.org/10.1007/978-3-642-04219-5_8
https://doi.org/10.1007/978-3-642-04219-5_8