Follow
Panagiotis Kintis
Title
Cited by
Cited by
Year
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1612017
Enabling network security through active DNS datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
892016
An empirical study of the i2p anonymity network and its censorship resistance
NP Hoang, P Kintis, M Antonakakis, M Polychronakis
Proceedings of the internet measurement conference 2018, 379-392, 2018
562018
Security risks in asynchronous web servers: When performance optimizations amplify the impact of data-oriented attacks
M Morton, J Werner, P Kintis, K Snow, M Antonakakis, M Polychronakis, ...
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 167-182, 2018
292018
Understanding the Privacy Implications of ECS
P Kintis, Y Nadji, D Dagon, M Farrell, M Antonakakis
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
292016
Financial Lower Bounds of Online Advertising Abuse
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, W Lee, M Farrell
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
20*2016
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, M Farrell
Computers & Security 67, 164-180, 2017
112017
Understanding the Growth and Security Considerations of ECS.
A Kountouras, P Kintis, A Avgetidis, T Papastergiou, C Lever, ...
NDSS, 2021
62021
Rodney Jo e. 2016. Enabling Network Security Through Active DNS Datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
Research in Attacks, Intrusions, and Defenses, Fabian Monrose, Marc Dacier …, 0
3
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy
A Faulkenberry, A Avgetidis, Z Ma, O Alrawi, C Lever, P Kintis, F Monrose, ...
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
22022
Hiding in plain sight
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
22017
Financial Lower Bounds of Online Advertising Abuse Detection of Intrusions and Malware, and Vulnerability Assessment
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, W Lee, M Farrell
Springer, 2016
22016
Characterizing Network Infrastructure Using the Domain Name System
P Kintis
Georgia Institute of Technology, 2020
2020
Extracting malware clusters from network traffic features of dynamic analysis traces
AN Avgetidis, M Antonakakis, P Kintis
2017
Secure and Scalable Identity Management for the Aviation Industry
P Kintis, A Kountouras, N Pitropakis, D Dagon, M Antonakakis, C Markou, ...
2017
Visualizing DNS Datasets for Alert-driven Threat Analysis
R Romero-Gomez, Y Nadji, P Kintis, M Antonakakis
The Privacy Problems Behind RFC 7871
P Kintis, A Kountouras, D Dagon, M Antonakakis
The system can't perform the operation now. Try again later.
Articles 1–17