1![HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer](https://www.pdfsearch.io/img/c8e5c9205a62748b42451c9e44ce73f4.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:27
|
---|
2![ἀρετή student online philosophy journal Dezember 2014, Nº 2 ANGELOS SCHOINAS The Aristotelean Concept of Habituation - A Psychological Approach ἀρετή student online philosophy journal Dezember 2014, Nº 2 ANGELOS SCHOINAS The Aristotelean Concept of Habituation - A Psychological Approach](https://www.pdfsearch.io/img/6c631e1dadc5e01105f8f81bc7d39756.jpg) | Add to Reading ListSource URL: www.philosophie.unibe.chLanguage: English - Date: 2015-03-24 11:14:14
|
---|
3![Ice, ice maybe? Angelos Michaelides1 1 Thomas Young Centre, Department of Physics and Astronomy, University College London, UK Ice, ice maybe? Angelos Michaelides1 1 Thomas Young Centre, Department of Physics and Astronomy, University College London, UK](https://www.pdfsearch.io/img/9a39759a3db57b9b7506c66eb031ae1a.jpg) | Add to Reading ListSource URL: conferences.au.dkLanguage: English - Date: 2018-03-09 04:47:43
|
---|
4![Bypassing clang’s SafeStack for Fun and Profit Enes Göktaş, Angelos Economopoulos, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos Bypassing clang’s SafeStack for Fun and Profit Enes Göktaş, Angelos Economopoulos, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos](https://www.pdfsearch.io/img/25e509ae02ab01ad7753ae1541fe1402.jpg) | Add to Reading ListSource URL: www.blackhat.comLanguage: English - Date: 2018-05-11 13:27:48
|
---|
5![HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer](https://www.pdfsearch.io/img/ab8beae1eb3c7a55f0d755812b4631c3.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:27
|
---|
6![1 Distributed Trust John Ioannidis, AT&T Labs – Research Angelos D. Keromytis, Columbia University CONTENTS 1 Distributed Trust John Ioannidis, AT&T Labs – Research Angelos D. Keromytis, Columbia University CONTENTS](https://www.pdfsearch.io/img/d8949c18af03958868a6769649a0f0f5.jpg) | Add to Reading ListSource URL: www.cs.columbia.eduLanguage: English - Date: 2005-01-21 17:53:06
|
---|
7![Developing a Benchmark Suite for Semantic Web Data from Existing Workflows Antonis Troumpoukis1 , Angelos Charalambidis1 , Giannis Mouchakis1 , Stasinos Konstantopoulos1 , Ronald Siebes2 , Victor de Boer2 , Stian Soiland Developing a Benchmark Suite for Semantic Web Data from Existing Workflows Antonis Troumpoukis1 , Angelos Charalambidis1 , Giannis Mouchakis1 , Stasinos Konstantopoulos1 , Ronald Siebes2 , Victor de Boer2 , Stian Soiland](https://www.pdfsearch.io/img/9e49c250fc28425e89ab049acdb9cdca.jpg) | Add to Reading ListSource URL: ceur-ws.orgLanguage: English - Date: 2016-09-06 06:55:28
|
---|
8![DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Mansoor Alicherry Angelos D. Keromytis Department of Computer Science, Columbia University in the City of New York DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Mansoor Alicherry Angelos D. Keromytis Department of Computer Science, Columbia University in the City of New York](https://www.pdfsearch.io/img/e182505ad191b2ab48fc7317ba8650e3.jpg) | Add to Reading ListSource URL: www.cs.columbia.edu- Date: 2009-03-19 11:59:22
|
---|
9![(IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke (IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke](https://www.pdfsearch.io/img/545ba75860110e30dc7b8c6dc8438479.jpg) | Add to Reading ListSource URL: www.ics.forth.gr- Date: 2012-03-22 09:28:00
|
---|