His primary areas of investigation include Computer security, Intrusion detection system, The Internet, Real-time computing and Embedded system. His Computer security study combines topics from a wide range of disciplines, such as Document exchange and Instrumentation. The concepts of his Intrusion detection system study are interwoven with issues in Traffic mix and String searching algorithm.
He usually deals with The Internet and limits it to topics linked to Network address and Vulnerability, Internet Protocol and Traffic analysis. His Real-time computing study incorporates themes from Shellcode, False positive paradox and Heuristic. His research investigates the link between Embedded system and topics such as Ethernet that cross with problems in Demand paging, Flat memory model and Thrashing.
His scientific interests lie mostly in Computer security, The Internet, Computer network, World Wide Web and Intrusion detection system. His Computer security research is multidisciplinary, incorporating elements of Software deployment and Server. His work on The Internet is being expanded to include thematically relevant topics such as Network address.
His Computer network study typically links adjacent topics like Distributed computing. His research investigates the connection with World Wide Web and areas like Internet privacy which intersect with concerns in Personally identifiable information and Phishing. His Intrusion detection system study also includes fields such as
The Internet, Computer security, Internet privacy, World Wide Web and Advertising are his primary areas of study. When carried out as part of a general The Internet research project, his work on Voice over IP is frequently linked to work in Business process discovery, therefore connecting diverse disciplines of study. His study of Code is a part of Computer security.
The study incorporates disciplines such as Wearable technology, Fitness Trackers, Anonymity, Synchronization and Variety in addition to Internet privacy. His World Wide Web research focuses on Pipeline and how it relates to Computing Methodologies and Information extraction. His Advertising research focuses on subjects like Header, which are linked to Implementation.
His primary scientific interests are in Advertising, The Internet, World Wide Web, Same-origin policy and User identifier. His Advertising research includes themes of Mobile device and Web traffic. His work deals with themes such as User experience design and Web mining, which intersect with The Internet.
His End user study in the realm of World Wide Web connects with subjects such as Reaper. His study on Same-origin policy is mostly dedicated to connecting different topics, such as Information sharing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Gnort: High Performance Network Intrusion Detection Using Graphics Processors
Giorgos Vasiliadis;Spiros Antonatos;Michalis Polychronakis;Evangelos P. Markatos.
recent advances in intrusion detection (2008)
Gnort: High Performance Network Intrusion Detection Using Graphics Processors
Giorgos Vasiliadis;Spiros Antonatos;Michalis Polychronakis;Evangelos P. Markatos.
recent advances in intrusion detection (2008)
Defending against hitlist worms using network address space randomization
S. Antonatos;P. Akritidis;E. P. Markatos;K. G. Anagnostakis.
Computer Networks (2007)
Defending against hitlist worms using network address space randomization
S. Antonatos;P. Akritidis;E. P. Markatos;K. G. Anagnostakis.
Computer Networks (2007)
Detecting targeted attacks using shadow honeypots
K. G. Anagnostakis;S. Sidiroglou;P. Akritidis;K. Xinidis.
usenix security symposium (2005)
Detecting targeted attacks using shadow honeypots
K. G. Anagnostakis;S. Sidiroglou;P. Akritidis;K. Xinidis.
usenix security symposium (2005)
Using processor affinity in loop scheduling on shared-memory multiprocessors
E.P. Markatos;T.J. LeBlanc.
IEEE Transactions on Parallel and Distributed Systems (1994)
Using processor affinity in loop scheduling on shared-memory multiprocessors
E.P. Markatos;T.J. LeBlanc.
IEEE Transactions on Parallel and Distributed Systems (1994)
First-class user-level threads
Brian D. Marsh;Michael L. Scott;Thomas J. LeBlanc;Evangelos P. Markatos.
symposium on operating systems principles (1991)
First-class user-level threads
Brian D. Marsh;Michael L. Scott;Thomas J. LeBlanc;Evangelos P. Markatos.
symposium on operating systems principles (1991)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Stony Brook University
Technical University of Crete
Vrije Universiteit Amsterdam
Microsoft (United States)
Georgia Institute of Technology
Northeastern University
Boston University
Chalmers University of Technology
Northeastern University
Georgia Institute of Technology
Centre national de la recherche scientifique, CNRS
Brandeis University
University of St Andrews
Necker-Enfants Malades Hospital
University of Bordeaux
Heidelberg University
University of Alberta
National Academies of Sciences, Engineering, and Medicine
Nara Institute of Science and Technology
Johns Hopkins University
Royal Brisbane and Women's Hospital
University of Alabama at Birmingham
University of Cincinnati
National Institute for Astrophysics
University of Trento
Space Telescope Science Institute