Spiros Antonatos  Spiros Antonatos photo       

contact information

Research staff member - Security and Privacy
Ireland Research Lab, Dublin, Ireland
  +353dash87dash6653255

links



2015

Traffic Measurement and Route Recommendation System for Mass Rapid Transit (MRT)
Thomas Holleczek, Dang The Anh, Shanyang Yin, Yunye Jin, Spiros Antonatos, Han Leong Goh, Samantha Low, Amy Shi Nash
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, NSW, Australia, August 10-13, 2015, pp. 1859--1868


2014

Oscillation Resolution for Mobile Phone Cellular Tower Data to Enable Mobility Modelling
Wei Wu, Yue Wang, Jo\ {a}o B\'{a}rtolo Gomes, Dang The Anh, Spiros Antonatos, Mingqiang Xue, Peng Yang, Ghim-Eng Yap, Xiaoli Li, Shonali Krishnaswamy, James Decraene, Amy Shi Nash
IEEE 15th International Conference on Mobile Data Management, MDM 2014, Brisbane, Australia, July 14-18, 2014 - Volume 1, pp. 321--328

Home and Work Place Prediction for Urban Planning Using Mobile Network Data
Manoranjan Dash, Hai-Long Nguyen, Hong Cao, Ghim-Eng Yap, Minh Nhut Nguyen, Xiaoli Li, Shonali Priyadarsini Krishnaswamy, James Decraene, Spiros Antonatos, Yue Wang, Dang The Anh, Amy Shi Nash
IEEE 15th International Conference on Mobile Data Management, MDM 2014, Brisbane, Australia, July 14-18, 2014 - Volume 2, pp. 37--42


2010

Using social networks to harvest email addresses
Iasonas Polakis, Georgios Kontaxis, Spyros Antonatos, Eleni Gessiou, Thanasis Petsas, Evangelos P. Markatos
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010, pp. 11--20

A Systematic Characterization of IM Threats using Honeypots
Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos
Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010

Understanding the behavior of malicious applications in social networks
A. Makridakis, Elias Athanasopoulos, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Evangelos P. Markatos
IEEE Network 24(5), 14--19, 2010


2009

Regular Expression Matching on Graphics Hardware for Intrusion Detection
Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis
Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 265--283

HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing
W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis
Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 381--388

Harnessing the Power of P2P Systems for Fast Attack Signature Validation
Spyros Antonatos, Quang Hieu Vu
Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 107--114


2008

Gnort: High Performance Network Intrusion Detection Using Graphics Processors
Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis
Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 116--134

Antisocial Networks: Turning a Social Network into a Botnet
Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 146--160


2007

Flexible and high-performance anonymization of NetFlow records using anontool
Michalis Foukarakis, Demetres Antoniades, Spyros Antonatos, Evangelos P. Markatos
Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 33--38


2006

A Generic Anonymization Framework for Network Traffic
Dimitris Koukis, Spyros Antonatos, Demetres Antoniades, Evangelos P. Markatos, Panagiotis Trimintzios
Proceedings of IEEE International Conference on Communications, ICC 2006, Istanbul, Turkey, 11-15 June 2006, pp. 2302--2309

Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart
Elias Athanasopoulos, Spyros Antonatos
Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 97--108

On the Privacy Risks of Publishing Anonymized IP Network Traces
Dimitris Koukis, Spyros Antonatos, Kostas G. Anagnostakis
Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 22--32

TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Spyros Antonatos, Kostas G. Anagnostakis
Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 12--21

An Active Splitter Architecture for Intrusion Detection and Prevention
Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
IEEE Trans. Dependable Sec. Comput. 3(1), 31--44, 2006

Puppetnets: misusing web browsers as a distributed attack infrastructure
Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006, pp. 221--234


2005

Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection
Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan, pp. 393--408

Defending against hitlist worms using network address space randomization
Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005, pp. 30--40


2004

Generating realistic workloads for network intrusion detection systems
Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos
Proceedings of the Fourth International Workshop on Software and Performance, WOSP 2004, Redwood Shores, California, USA, January 14-16, 2004, pp. 207--215

Performance Analysis of Content Matching Intrusion Detection Systems
Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis
2004 Symposium on Applications and the Internet (SAINT 2004), 26-30 January 2004, Tokyo, Japan, pp. 208--218


2003

E\(^\mbox2\)xB: A Domain-Specific String Matching Algorithm for Intrusion Detection
Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
Security and Privacy in the Age of Uncertainty, IFIP TC11 18\(^\mboxth\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece, pp. 217--228