H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 79 Citations 24,227 322 World Ranking 472 National Ranking 286

Research.com Recognitions

Awards & Achievements

2018 - IEEE Fellow For contributions to network security systems

2017 - ACM Fellow For contributions to the theory and practice of systems and network security

2012 - ACM Distinguished Member

2007 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

His primary scientific interests are in Computer security, Computer network, Denial-of-service attack, Software and Trust management. He regularly links together related areas like Overlay network in his Computer security studies. His work in Network security, Authentication, Active networking, Computer access control and IPsec is related to Computer network.

His Authentication research is multidisciplinary, incorporating perspectives in Server and Network packet. His Active networking study which covers Network element that intersects with Distributed computing. His Software study incorporates themes from Systems architecture, Overhead, Embedded system and Source code.

His most cited work include:

  • Countering code-injection attacks with instruction-set randomization (649 citations)
  • The KeyNote Trust-Management System Version 2 (555 citations)
  • The role of trust management in distributed systems security (489 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Computer network, The Internet, Software and Distributed computing. His biological study spans a wide range of topics, including Denial-of-service attack and Internet privacy. His research in Network packet, Network security, Active networking, IPsec and Authentication are components of Computer network.

His The Internet study frequently links to related topics such as Server. His studies in Software integrate themes in fields like Real-time computing, Overhead, Code and Source code. In his study, which falls under the umbrella issue of Network security policy, Security information and event management is strongly linked to Computer security model.

He most often published in these fields:

  • Computer security (51.41%)
  • Computer network (27.88%)
  • The Internet (12.28%)

What were the highlights of his more recent work (between 2011-2019)?

  • Computer security (51.41%)
  • Internet privacy (7.42%)
  • Software (11.25%)

In recent papers he was focusing on the following fields of study:

Angelos D. Keromytis mostly deals with Computer security, Internet privacy, Software, Exploit and Computer network. His study in the field of Authentication also crosses realms of Service provider. His Internet privacy research incorporates elements of Personalization and Access control.

The various areas that he examines in his Software study include Overhead, Distributed computing, Computer engineering and Source code. His Exploit research is multidisciplinary, relying on both User space, Operating system, Embedded system and Hypervisor. His Computer network research includes themes of Denial-of-service attack and Anonymity.

Between 2011 and 2019, his most popular works were:

  • Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization (286 citations)
  • Transparent ROP exploit mitigation using indirect branch tracing (230 citations)
  • Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud (179 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Angelos D. Keromytis spends much of his time researching Computer security, Software, Internet privacy, Operating system and Server. His Computer security study integrates concerns from other disciplines, such as Pre-play attack and World Wide Web. His work on Fuzz testing as part of general Software research is frequently linked to Computational resource, bridging the gap between disciplines.

His work carried out in the field of Internet privacy brings together such families of science as Data access, Cloud computing, Salt and Access control. His work in Operating system addresses issues such as Embedded system, which are connected to fields such as Overhead and Exploit. His studies deal with areas such as Service, Structure, Denial-of-service attack, Variety and Voice over IP as well as Authentication.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

The KeyNote Trust-Management System Version 2

M. Blaze;J. Feigenbaum;J. Ioannidis;A. Keromytis.
RFC (1999)

1089 Citations

Key note: Trust management for public-key infrastructures

Matt Blaze;J. Pigenbaum;Angelos D. Keromytis.
Lecture Notes in Computer Science (1999)

937 Citations

Implementing a distributed firewall

Sotiris Ioannidis;Angelos D. Keromytis;Steve M. Bellovin;Jonathan M. Smith.
computer and communications security (2000)

860 Citations

Countering code-injection attacks with instruction-set randomization

Gaurav S. Kc;Angelos D. Keromytis;Vassilis Prevelakis.
computer and communications security (2003)

849 Citations

SOS: secure overlay services

Angelos D. Keromytis;Vishal Misra;Dan Rubenstein.
acm special interest group on data communication (2002)

766 Citations

The role of trust management in distributed systems security

Matt Blaze;Joan Feigenbaum;John Ioannidis;Angelos D. Keromytis.
Secure Internet programming (2001)

744 Citations

SQLrand: Preventing SQL Injection Attacks

Stephen W. Boyd;Angelos D. Keromytis.
applied cryptography and network security (2004)

573 Citations

The KeyNote trust management system version2, IETF RFC 2704

Matt Blaze;Joan Feigenbaum;John Ioannidis;Angelos D. Keromytis.
(1999)

570 Citations

The SwitchWare active network architecture

D.S. Alexander;W.A. Arbaugh;M.W. Hicks;P. Kakkar;P. Kakkar.
IEEE Network (1998)

512 Citations

Secure Overlay Services

Angelos D. Keromytis;Vishal Misra;Daniel Stuart Rubenstein.
acm special interest group on data communication (2002)

495 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Angelos D. Keromytis

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 56

Teemu Koponen

Teemu Koponen

DELL (United States)

Publications: 55

Salvatore J. Stolfo

Salvatore J. Stolfo

Columbia University

Publications: 48

Martin Casado

Martin Casado

DELL (United States)

Publications: 40

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 37

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 36

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 35

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 32

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 32

Cristiano Giuffrida

Cristiano Giuffrida

Vrije Universiteit Amsterdam

Publications: 31

Angelos Stavrou

Angelos Stavrou

Virginia Tech

Publications: 29

Bradley E. Marshall

Bradley E. Marshall

Amazon (United States)

Publications: 28

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 26

Martín Abadi

Martín Abadi

University of California, Santa Cruz

Publications: 26

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 26

Something went wrong. Please try again later.