default search action
Michael G. Kallitsis
Person information
- affiliation:
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi:
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. USENIX Security Symposium 2024 - [i8]Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. CoRR abs/2403.03998 (2024) - 2023
- [c20]Aniket Anand, Michalis Kallitsis, Jackson Sippe, Alberto Dainotti:
Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization. CoNEXT (Companion) 2023: 1-8 - [c19]Liz Izhikevich, Manda Tran, Michalis Kallitsis, Aurore Fass, Zakir Durumeric:
Cloud Watching: Understanding Attacks Against Cloud-Hosted Services. IMC 2023: 313-327 - [c18]Daniel Wagner, Sahil Ashish Ranadive, Harm Griffioen, Michalis Kallitsis, Alberto Dainotti, Georgios Smaragdakis, Anja Feldmann:
How to Operate a Meta-Telescope in your Spare Time. IMC 2023: 328-343 - [i7]Aniket Anand, Michalis Kallitsis, Jackson Sippe, Alberto Dainotti:
Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization. CoRR abs/2305.07193 (2023) - [i6]Liz Izhikevich, Manda Tran, Michalis Kallitsis, Aurore Fass, Zakir Durumeric:
Cloud Watching: Understanding Attacks Against Cloud-Hosted Services. CoRR abs/2309.13471 (2023) - 2022
- [j8]Michael G. Kallitsis, Rupesh Prajapati, Vasant G. Honavar, Dinghao Wu, John Yen:
Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes. IEEE Trans. Inf. Forensics Secur. 17: 3611-3625 (2022) - [c17]Panos Kampanakis, Michael G. Kallitsis:
Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates. CSCML 2022: 337-355 - [c16]Rajat Tandon, Pithayuth Charnsethikul, Michalis Kallitsis, Jelena Mirkovic:
AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs. GLOBECOM 2022: 3399-3404 - [c15]Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. USENIX Security Symposium 2022: 483-500 - [i5]Rafail Kartsioukas, Rajat Tandon, Zheng Gao, Jelena Mirkovic, Michalis Kallitsis, Stilian Stoev:
Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals. CoRR abs/2211.04918 (2022) - 2021
- [c14]Rupesh Prajapati, Vasant G. Honavar, Dinghao Wu, John Yen, Michalis Kallitsis:
Shedding light into the darknet: scanning characterization and detection of temporal changes. CoNEXT 2021: 469-470 - [i4]Michalis Kallitsis, Vasant G. Honavar, Rupesh Prajapati, Dinghao Wu, John Yen:
Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes. CoRR abs/2108.00079 (2021) - 2020
- [j7]Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Running Refraction Networking for Real. Proc. Priv. Enhancing Technol. 2020(4): 321-335 (2020)
2010 – 2019
- 2018
- [c13]Sergey Frolov, Eric Wustrow, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman:
An ISP-Scale Deployment of TapDance. ANRW 2018: 22 - [c12]Michael G. Kallitsis, Shrijita Bhattacharya, George Michailidis:
Detection of False Data Injection Attacks in Smart Grids Based on Forecasts. SmartGridComm 2018: 1-7 - 2017
- [c11]Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - [c10]Sergey Frolov, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow:
An ISP-Scale Deployment of TapDance. FOCI @ USENIX Security Symposium 2017 - 2016
- [j6]Michael G. Kallitsis, Stilian A. Stoev, Shrijita Bhattacharya, George Michailidis:
AMON: An Open Source Architecture for Online Monitoring, Statistical Analysis, and Forensics of Multi-Gigabit Streams. IEEE J. Sel. Areas Commun. 34(6): 1834-1848 (2016) - [c9]Michael G. Kallitsis, Shrijita Bhattacharya, Stilian Stoev, George Michailidis:
Adaptive statistical detection of false data injection attacks in smart grids. GlobalSIP 2016: 826-830 - 2015
- [c8]Karyn Benson, Alberto Dainotti, kc claffy, Alex C. Snoeren, Michael G. Kallitsis:
Leveraging Internet Background Radiation for Opportunistic Network Analysis. Internet Measurement Conference 2015: 423-436 - [c7]Michael G. Kallitsis, George Michailidis, Samir Tout:
Correlative monitoring for detection of false data injection attacks in smart grids. SmartGridComm 2015: 386-391 - [i3]Michael G. Kallitsis, Stilian Stoev, Shrijita Bhattacharya, George Michailidis:
AMON: An Open Source Architecture for Online Monitoring, Statistical Analysis and Forensics of Multi-gigabit Streams. CoRR abs/1509.00268 (2015) - 2014
- [j5]Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Michael G. Kallitsis, Eduard Glatz, Xenofontas A. Dimitropoulos:
Estimating internet address space usage through passive measurements. Comput. Commun. Rev. 44(1): 42-49 (2014) - [j4]Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Michael G. Kallitsis, Eduard Glatz, Xenofontas A. Dimitropoulos:
Estimating internet address space usage through passive measurements. Comput. Commun. Rev. 44(2): 99-100 (2014) - [c6]Jakub Czyz, Michael G. Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael D. Bailey, Manish Karir:
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks. Internet Measurement Conference 2014: 435-448 - [i2]Michael G. Kallitsis, Stilian Stoev, George Michailidis:
Hashing Pursuit for Online Identification of Heavy-Hitters in High-Speed Network Streams. CoRR abs/1412.6148 (2014) - 2013
- [j3]Michael G. Kallitsis, Stilian Stoev, George Michailidis:
Fast Algorithms for Optimal Link Selection in Large-Scale Network Monitoring. IEEE Trans. Signal Process. 61(8): 2088-2103 (2013) - [c5]Jakub Czyz, Kyle Lady, Sam G. Miller, Michael D. Bailey, Michael G. Kallitsis, Manish Karir:
Understanding IPv6 internet background radiation. Internet Measurement Conference 2013: 105-118 - [i1]Michael G. Kallitsis, Stilian Stoev, George Michailidis:
A State-Space Approach for Optimal Traffic Monitoring via Network Flow Sampling. CoRR abs/1306.5793 (2013) - 2012
- [j2]Michael G. Kallitsis, George Michailidis, Michael Devetsikiotis:
Optimal Power Allocation Under Communication Network Externalities. IEEE Trans. Smart Grid 3(1): 162-173 (2012) - 2011
- [c4]Michael G. Kallitsis, George Michailidis, Michael Devetsikiotis:
Network Decomposition in Practice: An Application to Optimal Resource Allocation. GLOBECOM 2011: 1-6 - [c3]Michael G. Kallitsis, George Michailidis, Michael Devetsikiotis:
A decentralized algorithm for optimal resource allocation in smartgrids with communication network externalities. SmartGridComm 2011: 434-439
2000 – 2009
- 2009
- [j1]Michael G. Kallitsis, George Michailidis, Michael Devetsikiotis:
Measurement-based optimal resource allocation for network services with pricing differentiation. Perform. Evaluation 66(9-10): 505-523 (2009) - [c2]Michael G. Kallitsis, Robert D. Callaway, Michael Devetsikiotis, George Michailidis:
A Distributed Algorithm for Resource Allocation for Delay Sensitive Services. CAMAD 2009: 1-6 - 2008
- [c1]Michael G. Kallitsis, Robert D. Callaway, Michael Devetsikiotis, George Michailidis:
Distributed and Dynamic Resource Allocation for Delay Sensitive Network Services. GLOBECOM 2008: 1432-1437
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint