|
Τίτλος |
Δημιουργός |
Ημερομηνία |
|
3.
|
Fingerprinting the shadows: unmasking malicious servers with machine learning-powered TLS analysis
|
Θεοφάνους, Ανδρέας Κ.
|
2023-12-01 |
|
4.
|
Full stack protection leveraging user-level enclaves
|
Ντεγιάννης, Δημήτριος Α
|
2023-12-01 |
|
5.
|
Tensor learning for high-dimensional signal acquisition and analysis
|
Αϊδίνη, Αναστασία Ν.
|
2023-07-21 |
|
6.
|
BPHS: a BGP prefix hijacking simulation tool supporting RPKI filtering
|
Επταμηνιτάκης, Γεώργιος Ε.
|
2022-07-29 |
|
7.
|
Multiplatform incremental OTAP strategy for resource-constrained IoT devices
|
Αρακαδάκης, Κωνσταντίνος Ε.
|
2021-11-26 |
|
8.
|
P4Debugger: tracing through network changes with table-version packet tainting
|
Χατζηβασιλείου, Αντώνιος Π.
|
2021-11-26 |
|
9.
|
LuaGuardia: a confidential computing framework for trusted execution environments
|
Καρνίκης, Δημήτριος Ε.
|
2021-03-26 |
|
10.
|
Efficient scheduling of concurrently executed network packet processing applications using heterogeneous hardware
|
Γιακουμάκης, Ιωάννης Μ.
|
2020-11-27 |
|
11.
|
Evaluation of network-aware recommendation systems in realistic settings
|
Καστανάκης, Σάββας Β.
|
2020-07-24 |
|
12.
|
A measurement study of the online header bidding ad-ecosystem
|
Παχυλάκης, Μιχαήλ Γ.
|
2020-03-27 |
|