D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 80 Citations 24,232 388 World Ranking 635 National Ranking 376

Research.com Recognitions

Awards & Achievements

2018 - IEEE Fellow For contributions to network security systems

2017 - ACM Fellow For contributions to the theory and practice of systems and network security

2012 - ACM Distinguished Member

2007 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

His primary scientific interests are in Computer security, Computer network, Denial-of-service attack, Software and Trust management. He regularly links together related areas like Overlay network in his Computer security studies. His work in Network security, Authentication, Active networking, Computer access control and IPsec is related to Computer network.

His Authentication research is multidisciplinary, incorporating perspectives in Server and Network packet. His Active networking study which covers Network element that intersects with Distributed computing. His Software study incorporates themes from Systems architecture, Overhead, Embedded system and Source code.

His most cited work include:

  • Countering code-injection attacks with instruction-set randomization (649 citations)
  • The KeyNote Trust-Management System Version 2 (555 citations)
  • The role of trust management in distributed systems security (489 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Computer network, The Internet, Software and Distributed computing. His biological study spans a wide range of topics, including Denial-of-service attack and Internet privacy. His research in Network packet, Network security, Active networking, IPsec and Authentication are components of Computer network.

His The Internet study frequently links to related topics such as Server. His studies in Software integrate themes in fields like Real-time computing, Overhead, Code and Source code. In his study, which falls under the umbrella issue of Network security policy, Security information and event management is strongly linked to Computer security model.

He most often published in these fields:

  • Computer security (51.41%)
  • Computer network (27.88%)
  • The Internet (12.28%)

What were the highlights of his more recent work (between 2011-2019)?

  • Computer security (51.41%)
  • Internet privacy (7.42%)
  • Software (11.25%)

In recent papers he was focusing on the following fields of study:

Angelos D. Keromytis mostly deals with Computer security, Internet privacy, Software, Exploit and Computer network. His study in the field of Authentication also crosses realms of Service provider. His Internet privacy research incorporates elements of Personalization and Access control.

The various areas that he examines in his Software study include Overhead, Distributed computing, Computer engineering and Source code. His Exploit research is multidisciplinary, relying on both User space, Operating system, Embedded system and Hypervisor. His Computer network research includes themes of Denial-of-service attack and Anonymity.

Between 2011 and 2019, his most popular works were:

  • Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization (286 citations)
  • Transparent ROP exploit mitigation using indirect branch tracing (230 citations)
  • Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud (179 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Angelos D. Keromytis spends much of his time researching Computer security, Software, Internet privacy, Operating system and Server. His Computer security study integrates concerns from other disciplines, such as Pre-play attack and World Wide Web. His work on Fuzz testing as part of general Software research is frequently linked to Computational resource, bridging the gap between disciplines.

His work carried out in the field of Internet privacy brings together such families of science as Data access, Cloud computing, Salt and Access control. His work in Operating system addresses issues such as Embedded system, which are connected to fields such as Overhead and Exploit. His studies deal with areas such as Service, Structure, Denial-of-service attack, Variety and Voice over IP as well as Authentication.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Key note: Trust management for public-key infrastructures

Matt Blaze;J. Pigenbaum;Angelos D. Keromytis.
Lecture Notes in Computer Science (1999)

970 Citations

Implementing a distributed firewall

Sotiris Ioannidis;Angelos D. Keromytis;Steve M. Bellovin;Jonathan M. Smith.
computer and communications security (2000)

936 Citations

Countering code-injection attacks with instruction-set randomization

Gaurav S. Kc;Angelos D. Keromytis;Vassilis Prevelakis.
computer and communications security (2003)

932 Citations

SOS: secure overlay services

Angelos D. Keromytis;Vishal Misra;Dan Rubenstein.
acm special interest group on data communication (2002)

785 Citations

The role of trust management in distributed systems security

Matt Blaze;Joan Feigenbaum;John Ioannidis;Angelos D. Keromytis.
Secure Internet programming (2001)

764 Citations

The KeyNote Trust-Management System Version 2

M. Blaze;J. Feigenbaum;J. Ioannidis;A. Keromytis.
RFC (1999)

740 Citations

SQLrand: Preventing SQL Injection Attacks

Stephen W. Boyd;Angelos D. Keromytis.
applied cryptography and network security (2004)

624 Citations

The KeyNote trust management system version2, IETF RFC 2704

Matt Blaze;Joan Feigenbaum;John Ioannidis;Angelos D. Keromytis.
(1999)

558 Citations

The SwitchWare active network architecture

D.S. Alexander;W.A. Arbaugh;M.W. Hicks;P. Kakkar;P. Kakkar.
IEEE Network (1998)

532 Citations

Secure Overlay Services

Angelos D. Keromytis;Vishal Misra;Daniel Stuart Rubenstein.
acm special interest group on data communication (2002)

495 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Angelos D. Keromytis

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 56

Teemu Koponen

Teemu Koponen

DELL (United States)

Publications: 55

Salvatore J. Stolfo

Salvatore J. Stolfo

Columbia University

Publications: 48

Martin Casado

Martin Casado

DELL (United States)

Publications: 40

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 37

Peng Liu

Peng Liu

Pennsylvania State University

Publications: 36

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 35

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 32

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 32

Cristiano Giuffrida

Cristiano Giuffrida

Vrije Universiteit Amsterdam

Publications: 31

Angelos Stavrou

Angelos Stavrou

Virginia Tech

Publications: 29

Bradley E. Marshall

Bradley E. Marshall

Amazon (United States)

Publications: 28

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 26

Martín Abadi

Martín Abadi

Google (United States)

Publications: 26

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 26

Jonathan M. Smith

Jonathan M. Smith

University of Pennsylvania

Publications: 25

Trending Scientists

Rolf Niedermeier

Rolf Niedermeier

Technical University of Berlin

Bart Kosko

Bart Kosko

University of Southern California

Andreas G. Andreou

Andreas G. Andreou

Johns Hopkins University

Simon Gächter

Simon Gächter

University of Nottingham

Colin R. McInnes

Colin R. McInnes

University of Glasgow

Omar M. Ramahi

Omar M. Ramahi

University of Waterloo

Ursula Kües

Ursula Kües

University of Göttingen

Albert B. Deisseroth

Albert B. Deisseroth

US Food and Drug Administration

James Wookey

James Wookey

University of Bristol

Yücel Yılmaz

Yücel Yılmaz

Kadir Has University

Shane Byrne

Shane Byrne

University of Arizona

William B. McGill

William B. McGill

University of Northern British Columbia

Rasmus M. Birn

Rasmus M. Birn

University of Wisconsin–Madison

Ruth S. Nussenzweig

Ruth S. Nussenzweig

New York University

Kevin Power

Kevin Power

University of Stirling

Robert O. Wright

Robert O. Wright

Icahn School of Medicine at Mount Sinai

Something went wrong. Please try again later.