Search Results - "ARGYRAKI, Katerina"

Refine Results
  1. 1
  2. 2
  3. 3

    Optimal Source-Based Filtering of Malicious Traffic by Soldo, F., Argyraki, K., Markopoulou, A.

    Published in IEEE/ACM transactions on networking (01-04-2012)
    “…In this paper, we consider the problem of blocking malicious traffic on the Internet via source-based filtering. In particular, we consider filtering via…”
    Get full text
    Journal Article
  4. 4

    Home Blood Pressure Is as Reliable as Ambulatory Blood Pressure in Predicting Target-Organ Damage in Hypertension by Stergiou, George S., Argyraki, Katerina K., Moyssakis, Ioannis, Mastorantonakis, Stylianos E., Achimastos, Apostolos D., Karamanos, Vasilios G., Roussias, Leonidas G.

    Published in American journal of hypertension (01-06-2007)
    “…Our objective was to assess the value of home blood pressure (BP) monitoring in comparison to office BP measurements and ambulatory monitoring in predicting…”
    Get full text
    Journal Article
  5. 5

    Netscope: Practical Network Loss Tomography by Ghita, Denisa, Hung Nguyen, Kurant, Maciej, Argyraki, Katerina, Thiran, Patrick

    Published in 2010 Proceedings IEEE INFOCOM (01-03-2010)
    “…We present Netscope, a tomographic technique that infers the loss rates of network links from unicast end-to-end measurements. Netscope uses a novel…”
    Get full text
    Conference Proceeding
  6. 6

    Salmonella enteritidis Infection Complicated by Acute Myocarditis: A Case Report and Review of the Literature by Papamichalis, Panagiotis, Argyraki, Katerina, Papamichalis, Michail, Loukopoulos, Argyris, Dalekos, Georgios N., Rigopoulou, Eirini I.

    Published in Cardiology Research and Practice (01-01-2011)
    “…Salmonella spp. is the cause of commonly encountered infections, with seasonal pattern of occurrence and worldwide distribution. Some of the clinical…”
    Get full text
    Journal Article
  7. 7

    Creating Secrets Out of Packet Erasures by Safaka, Iris, Czap, Laszlo, Argyraki, Katerina, Fragouli, Christina

    “…We present protocols for creating pairwise secrets between nodes in a wireless network, so that these secrets are secure from an eavesdropper, Eve, with…”
    Get full text
    Journal Article
  8. 8
  9. 9

    Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks by Argyraki, K., Cheriton, D.R.

    Published in IEEE/ACM transactions on networking (01-08-2009)
    “…In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and…”
    Get full text
    Journal Article
  10. 10
  11. 11
  12. 12

    Exchanging pairwise secrets efficiently by Safaka, Iris, Fragouli, Christina, Argyraki, Katerina, Diggavi, Suhas

    Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)
    “…We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an…”
    Get full text
    Conference Proceeding
  13. 13

    Loss and Delay Accountability for the Internet by Argyraki, K., Maniatis, P., Irzak, O., Ashish, S., Shenker, S.

    “…The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their…”
    Get full text
    Conference Proceeding
  14. 14

    Optimal Filtering of Source Address Prefixes: Models and Algorithms by Soldo, F., Markopoulou, A., Argyraki, K.

    Published in IEEE INFOCOM 2009 (01-04-2009)
    “…How can we protect the network infrastructure from malicious traffic, such as scanning, malicious code propagation, and distributed denial-of-service (DDoS)…”
    Get full text
    Conference Proceeding
  15. 15

    Group secret key generation over broadcast erasure channels by Jafari Siavoshani, Mahdi, Fragouli, C, Diggavi, S, Pulleti, U, Argyraki, K

    “…We consider a group of m trusted nodes that aim to create a shared secret key K over a wireless channel in the presence an eavesdropper Eve. We assume an…”
    Get full text
    Conference Proceeding
  16. 16

    Identity Aware Sensor Networks by Keller, L., Jafari Siavoshani, M., Fragouli, C., Argyraki, K., Diggavi, S.

    Published in IEEE INFOCOM 2009 (01-04-2009)
    “…In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the…”
    Get full text
    Conference Proceeding
  17. 17

    Generating Steganographic Text with LSTMs by Fang, Tina, Jaggi, Martin, Argyraki, Katerina

    Published 30-05-2017
    “…Motivated by concerns for user privacy, we design a steganographic system ("stegosystem") that enables two users to exchange encrypted messages without an…”
    Get full text
    Journal Article
  18. 18

    Verifying Reachability in Networks with Mutable Datapaths by Panda, Aurojit, Lahav, Ori, Argyraki, Katerina, Sagiv, Mooly, Shenker, Scott

    Published 04-07-2016
    “…Recent work has made great progress in verifying the forwarding correctness of networks . However, these approaches cannot be used to verify networks…”
    Get full text
    Journal Article
  19. 19

    Verifying Isolation Properties in the Presence of Middleboxes by Panda, Aurojit, Lahav, Ori, Argyraki, Katerina, Sagiv, Mooly, Shenker, Scott

    Published 25-09-2014
    “…Great progress has been made recently in verifying the correctness of router forwarding tables. However, these approaches do not work for networks containing…”
    Get full text
    Journal Article
  20. 20

    Towards unconditional tor-like anonymity by Safaka, Iris, Czap, László, Argyraki, Katerina, Fragouli, Christina

    “…We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol…”
    Get full text
    Conference Proceeding