scispace - formally typeset
S

Sotiris Ioannidis

Researcher at Foundation for Research & Technology – Hellas

Publications -  170
Citations -  6100

Sotiris Ioannidis is an academic researcher from Foundation for Research & Technology – Hellas. The author has contributed to research in topics: Computer science & The Internet. The author has an hindex of 37, co-authored 138 publications receiving 5118 citations. Previous affiliations of Sotiris Ioannidis include Stevens Institute of Technology & University of Rochester.

Papers
More filters
Journal ArticleDOI

A New Wireless Communication Paradigm through Software-Controlled Metasurfaces

TL;DR: This article proposes a radically different approach, enabling deterministic, programmable control over the behavior of wireless environments, using the so-called HyperSurface tile, a novel class of planar meta-materials that can interact with impinging electromagnetic waves in a controlled manner.
Proceedings ArticleDOI

Implementing a distributed firewall

TL;DR: This paper presents the design and implementation of a distributed rewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system.
Book ChapterDOI

Gnort: High Performance Network Intrusion Detection Using Graphics Processors

TL;DR: An intrusion detection system based on the Snort open-source NIDS that exploits the underutilized computational power of modern graphics cards to offload the costly pattern matching operations from the CPU, and thus increase the overall processing throughput.
Posted Content

A New Wireless Communication Paradigm through Software-controlled Metasurfaces

TL;DR: The HyperSurface tiles as discussed by the authors can effectively re-engineer electromagnetic waves, including steering towards any desired direction, full absorption, polarization manipulation, and more, by using planar meta-materials.
Proceedings ArticleDOI

Rage against the virtual machine: hindering dynamic analysis of Android malware

TL;DR: A broad range of anti-analysis techniques that malware can employ to evade dynamic analysis in emulated Android environments are presented and possible countermeasures are proposed to improve the resistance of current dynamic analysis tools against evasion attempts.