|Enabling network security through active DNS datasets|
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
|Practical attacks against graph-based clustering|
Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
|Exposing search and advertisement abuse tactics and infrastructure of technical support scammers|
B Srinivasan, A Kountouras, N Miramirkhani, M Alam, N Nikiforakis, ...
Proceedings of the 2018 World Wide Web Conference, 319-328, 2018
|Understanding the Growth and Security Considerations of ECS|
A Kountouras, P Kintis, A Avgetidis, T Papastergiou, C Lever, ...
|The Privacy Problems Behind RFC 7871|
P Kintis, A Kountouras, D Dagon, M Antonakakis
|Poster: Secure and Scalable Identity Management for the Aviation Industry|
P Kintis, A Kountouras, N Pitropakis, D Dagon, M Antonakakis, C Markou, ...