default search action
Xenofontas A. Dimitropoulos
Person information
- affiliation: Foundation for Research & Technology Hellas (FORTH), Institute of Computer Science
- affiliation: ETH Zurich, Computer Engineering and Networks Laboratory
- affiliation: IBM Research, Zurich
- affiliation: Georgia Institute of Technology, Atlanta, School of Electrical and Computer Engineering
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c51]Antonios Chatzivasileiou, Alexandros Kornilakis, Katerina Lionta, Georgios Nomikos, Xenofontas A. Dimitropoulos, Georgios Smaragdakis:
How Russia's Invasion of Ukraine Impacted the Internet Peering of the Conflicted Countries. TMA 2024: 1-10 - 2022
- [c50]Emmanouil Lakiotakis, Nikolaos Pappas, Xenofontas A. Dimitropoulos:
Modeling the Age of Information in UAV-aided Wireless Networks. CSCN 2022: 105-110 - 2021
- [j31]Vasileios Giotsas, George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas A. Dimitropoulos:
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs. IEEE/ACM Trans. Netw. 29(1): 1-16 (2021) - [c49]Petros Gigis, Matt Calder, Lefteris Manassakis, George Nomikos, Vasileios Kotronis, Xenofontas A. Dimitropoulos, Ethan Katz-Bassett, Georgios Smaragdakis:
Seven years in the life of Hypergiants' off-nets. SIGCOMM 2021: 516-533
2010 – 2019
- 2019
- [j30]Emmanouil Lakiotakis, Christos Liaskos, Xenofontas A. Dimitropoulos:
Improving networked music performance systems using application-network collaboration. Concurr. Comput. Pract. Exp. 31(24) (2019) - [c48]Alexandros Milolidakis, Romain Fontugne, Xenofontas A. Dimitropoulos:
Detecting Network Disruptions At Colocation Facilities. INFOCOM 2019: 2161-2169 - [c47]Emmanouil Lakiotakis, Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
Joint Optimization of UAV Placement and Caching under Battery Constraints in UAV-aided Small-Cell Networks. MAGESys@SIGCOMM 2019: 8-14 - [i38]Alexandros Milolidakis, Romain Fontugne, Xenofontas A. Dimitropoulos:
Detecting Network Disruptions At Colocation Facilities. CoRR abs/1911.04866 (2019) - [i37]George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas A. Dimitropoulos, Vasileios Giotsas:
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs. CoRR abs/1911.04924 (2019) - 2018
- [j29]Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, Xenofontas A. Dimitropoulos:
A Survey among Network Operators on BGP Prefix Hijacking. Comput. Commun. Rev. 48(1): 64-69 (2018) - [j28]Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas A. Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti:
ARTEMIS: Neutralizing BGP Hijacking Within a Minute. IEEE/ACM Trans. Netw. 26(6): 2471-2486 (2018) - [c46]Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas A. Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti:
ARTEMIS: Neutralizing BGP Hijacking within a Minute. ANRW 2018: 6 - [c45]George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas A. Dimitropoulos, Vasileios Giotsas:
O Peer, Where Art Thou?: Uncovering Remote Peering Interconnections at IXPs. Internet Measurement Conference 2018: 265-278 - [c44]Savvas Kastanakis, Pavlos Sermpezis, Vasileios Kotronis, Xenofontas A. Dimitropoulos:
CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching. MECOMM@SIGCOMM 2018: 19-24 - [e3]Xenofontas A. Dimitropoulos, Alberto Dainotti, Laurent Vanbever, Theophilus Benson:
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2018, Heraklion, Greece, December 04-07, 2018. ACM 2018, ISBN 978-1-4503-6080-7 [contents] - [i36]Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas A. Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti:
ARTEMIS: Neutralizing BGP Hijacking within a Minute. CoRR abs/1801.01085 (2018) - [i35]Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, Xenofontas A. Dimitropoulos:
A Survey among Network Operators on BGP Prefix Hijacking. CoRR abs/1801.02918 (2018) - [i34]Savvas Kastanakis, Pavlos Sermpezis, Vasileios Kotronis, Xenofontas A. Dimitropoulos:
CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching. CoRR abs/1806.02704 (2018) - [i33]Emmanouil Lakiotakis, Christos Liaskos, Xenofontas A. Dimitropoulos:
Application-Network Collaboration Using SDN for Ultra-Low Delay Teleorchestras. CoRR abs/1808.09399 (2018) - [i32]Emmanouil Lakiotakis, Christos Liaskos, Xenofontas A. Dimitropoulos:
Improving Networked Music Performance Systems Using Application-Network Collaboration. CoRR abs/1808.09405 (2018) - [i31]Emmanouil Lakiotakis, Christos Liaskos, Xenofontas A. Dimitropoulos:
Enabling Ultra-Low Delay Teleorchestras using Software Defined Networking. CoRR abs/1809.07864 (2018) - 2017
- [j27]Christos Liaskos, Xenofontas A. Dimitropoulos, Leandros Tassiulas:
Backpressure on the Backbone: A Lightweight, Non-Intrusive Traffic Engineering Approach. IEEE Trans. Netw. Serv. Manag. 14(1): 176-190 (2017) - [c43]Petros Gigis, Vasileios Kotronis, Emile Aben, Stephen D. Strowes, Xenofontas A. Dimitropoulos:
Characterizing User-to-User Connectivity with RIPE Atlas. ANRW 2017: 4-6 - [c42]Tewelde Degefa Assefa, Rashedul Hoque, Elias Z. Tragos, Xenofontas A. Dimitropoulos:
SDN-based local mobility management with X2-interface in femtocell networks. CAMAD 2017: 1-6 - [c41]Vasileios Kotronis, George Nomikos, Lefteris Manassakis, Dimitris Mavrommatis, Xenofontas A. Dimitropoulos:
Shortcuts through colocation facilities. Internet Measurement Conference 2017: 470-476 - [c40]George Nomikos, Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
Re-mapping the internet: Bring the IXPs into play: www.inspire.edu.gr/ixp-map. INFOCOM Workshops 2017: 910-915 - [c39]Tewelde Degefa Assefa, Rashedul Hoque, Elias Z. Tragos, Xenofontas A. Dimitropoulos:
Poster abstract: SDN-based handover management in enterprise networked femtocells with X2-forwarding scheme. INFOCOM Workshops 2017: 1022-1023 - [c38]Emmanouil Lakiotakis, Christos Liaskos, Xenofontas A. Dimitropoulos:
Application-network collaboration using SDN for ultra-low delay teleorchestras. ISCC 2017: 70-75 - [c37]Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
Can SDN accelerate BGP convergence? - A performance analysis of inter-domain routing centralization. Networking 2017: 1-9 - [i30]Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
Can SDN Accelerate BGP Convergence? A Performance Analysis of Inter-domain Routing Centralization. CoRR abs/1702.00188 (2017) - [i29]Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking. CoRR abs/1702.05349 (2017) - [i28]Pavlos Sermpezis, George Nomikos, Xenofontas A. Dimitropoulos:
Re-mapping the Internet: Bring the IXPs into Play. CoRR abs/1706.07323 (2017) - [i27]Petros Gigis, Vasileios Kotronis, Emile Aben, Stephen D. Strowes, Xenofontas A. Dimitropoulos:
Characterizing User-to-User Connectivity with RIPE Atlas. CoRR abs/1707.05038 (2017) - [i26]Vasileios Kotronis, George Nomikos, Lefteris Manassakis, Dimitris Mavrommatis, Xenofontas A. Dimitropoulos:
Shortcuts through Colocation Facilities. CoRR abs/1710.04422 (2017) - 2016
- [j26]Rowan Klöti, Bernhard Ager, Vasileios Kotronis, George Nomikos, Xenofontas A. Dimitropoulos:
A Comparative Look into Public IXP Datasets. Comput. Commun. Rev. 46(1): 21-29 (2016) - [j25]Dimitrios Gkounis, Vasileios Kotronis, Christos Liaskos, Xenofontas A. Dimitropoulos:
On the Interplay of Link-Flooding Attacks and Traffic Engineering. Comput. Commun. Rev. 46(2): 5-11 (2016) - [j24]Alberto Dainotti, Ethan Katz-Bassett, Xenofontas A. Dimitropoulos:
The BGP hackathon 2016 report. Comput. Commun. Rev. 46(3): 12:1-12:6 (2016) - [j23]Alberto Dainotti, Karyn Benson, Alistair King, Bradley Huffaker, Eduard Glatz, Xenofontas A. Dimitropoulos, Philipp Richter, Alessandro Finamore, Alex C. Snoeren:
Lost in Space: Improving Inference of IPv4 Address Space Utilization. IEEE J. Sel. Areas Commun. 34(6): 1862-1876 (2016) - [j22]Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
Inter-domain SDN: Analysing the Effects of Routing Centralization on BGP Convergence Time. SIGMETRICS Perform. Evaluation Rev. 44(2): 30-32 (2016) - [c36]Christos Liaskos, Vasileios Kotronis, Xenofontas A. Dimitropoulos:
A novel framework for modeling and mitigating distributed link flooding attacks. INFOCOM 2016: 1-9 - [c35]George Nomikos, Xenofontas A. Dimitropoulos:
traIXroute: Detecting IXPs in traceroute paths. PAM 2016: 346-358 - [c34]Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking. SIGCOMM 2016: 625-626 - [c33]Vasileios Kotronis, Rowan Klöti, Matthias Rost, Panagiotis Georgopoulos, Bernhard Ager, Stefan Schmid, Xenofontas A. Dimitropoulos:
Stitching Inter-Domain Paths over IXPs. SOSR 2016: 17 - [e2]Thomas Karagiannis, Xenofontas A. Dimitropoulos:
Passive and Active Measurement - 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings. Lecture Notes in Computer Science 9631, Springer 2016, ISBN 978-3-319-30504-2 [contents] - [i25]Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
Analysing the Effects of Routing Centralization on BGP Convergence Time. CoRR abs/1605.08864 (2016) - [i24]Pavlos Sermpezis, Gavriil Chaviaras, Petros Gigis, Xenofontas A. Dimitropoulos:
Monitor, Detect, Mitigate: Combating BGP Prefix Hijacking in Real-Time with ARTEMIS. CoRR abs/1609.05702 (2016) - [i23]Dimitrios Gkounis, Vasileios Kotronis, Christos Liaskos, Xenofontas A. Dimitropoulos:
On the Interplay of Link-Flooding Attacks and Traffic Engineering. CoRR abs/1611.02488 (2016) - [i22]Christos Liaskos, Vasileios Kotronis, Xenofontas A. Dimitropoulos:
A Novel Framework for Modeling and Mitigating Distributed Link Flooding Attacks. CoRR abs/1611.02491 (2016) - [i21]Vasileios Kotronis, Adrian Gämperli, Xenofontas A. Dimitropoulos:
Routing Centralization Across Domains via SDN: A Model and Emulation Framework for BGP Evolution. CoRR abs/1611.02494 (2016) - [i20]Rowan Klöti, Bernhard Ager, Vasileios Kotronis, George Nomikos, Xenofontas A. Dimitropoulos:
A Comparative Look into Public IXP Datasets. CoRR abs/1611.02624 (2016) - [i19]Vasileios Kotronis, Xenofontas A. Dimitropoulos, Rowan Klöti, Bernhard Ager, Panagiotis Georgopoulos, Stefan Schmid:
Control Exchange Points: Providing QoS-enabled End-to-End Services via SDN-based Inter-domain Routing Orchestration. CoRR abs/1611.02628 (2016) - [i18]Vasileios Kotronis, Rowan Klöti, Matthias Rost, Panagiotis Georgopoulos, Bernhard Ager, Stefan Schmid, Xenofontas A. Dimitropoulos:
Stitching Inter-Domain Paths over IXPs. CoRR abs/1611.02642 (2016) - [i17]Rowan Klöti, Vasileios Kotronis, Bernhard Ager, Xenofontas A. Dimitropoulos:
Policy-Compliant Path Diversity and Bisection Bandwidth. CoRR abs/1611.02842 (2016) - [i16]Adrian Gämperli, Vasileios Kotronis, Xenofontas A. Dimitropoulos:
Evaluating the Effect of Centralization on Routing Convergence on a Hybrid BGP-SDN Emulation Framework. CoRR abs/1611.03113 (2016) - [i15]Vasileios Kotronis, Rowan Klöti, Matthias Rost, Panagiotis Georgopoulos, Bernhard Ager, Stefan Schmid, Xenofontas A. Dimitropoulos:
Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services. CoRR abs/1611.03407 (2016) - [i14]George Nomikos, Xenofontas A. Dimitropoulos:
traIXroute: Detecting IXPs in traceroute paths. CoRR abs/1611.03895 (2016) - [i13]Christos Liaskos, Xenofontas A. Dimitropoulos, Leandros Tassiulas:
Backpressure on the Backbone: A Lightweight, Non-intrusive Traffic Engineering Approach. CoRR abs/1611.05619 (2016) - 2015
- [j21]Vasileios Kotronis, Adrian Gämperli, Xenofontas A. Dimitropoulos:
Routing centralization across domains via SDN: A model and emulation framework for BGP evolution. Comput. Networks 92: 227-239 (2015) - [c32]Rowan Klöti, Vasileios Kotronis, Bernhard Ager, Xenofontas A. Dimitropoulos:
Policy-compliant path diversity and bisection bandwidth. INFOCOM 2015: 675-683 - [c31]Suso Benitez-Baleato, Nils B. Weidmann, Petros Gigis, Xenofontas A. Dimitropoulos, Eduard Glatz, Brian Trammell:
Transparent Estimation of Internet Penetration from Network Observations. PAM 2015: 220-231 - [c30]Vasileios Kotronis, Rowan Klöti, Matthias Rost, Panagiotis Georgopoulos, Bernhard Ager, Stefan Schmid, Xenofontas A. Dimitropoulos:
Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services. SIGMETRICS 2015: 429-430 - [c29]Elias Raftopoulos, Eduard Glatz, Xenofontas A. Dimitropoulos, Alberto Dainotti:
How Dangerous Is Internet Scanning? - A Measurement Study of the Aftermath of an Internet-Wide Scan. TMA 2015: 158-172 - 2014
- [j20]Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Michael G. Kallitsis, Eduard Glatz, Xenofontas A. Dimitropoulos:
Estimating internet address space usage through passive measurements. Comput. Commun. Rev. 44(1): 42-49 (2014) - [j19]Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Michael G. Kallitsis, Eduard Glatz, Xenofontas A. Dimitropoulos:
Estimating internet address space usage through passive measurements. Comput. Commun. Rev. 44(2): 99-100 (2014) - [j18]Eduard Glatz, Stelios Mavromatidis, Bernhard Ager, Xenofontas A. Dimitropoulos:
Visualizing big network traffic data using frequent pattern mining and hypergraphs. Computing 96(1): 27-38 (2014) - [j17]Elias Raftopoulos, Xenofontas A. Dimitropoulos:
IDS Alert Correlation in the Wild With EDGe. IEEE J. Sel. Areas Commun. 32(10): 1933-1946 (2014) - [c28]Vasileios Kotronis, Xenofontas A. Dimitropoulos, Rowan Klöti, Bernhard Ager, Panagiotis Georgopoulos, Stefan Schmid:
Control Exchange Points: Providing QoS-enabled End-to-End Services via SDN-based Inter-domain Routing Orchestration. ONS 2014 - [c27]Adrian Gämperli, Vasileios Kotronis, Xenofontas A. Dimitropoulos:
Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework. SIGCOMM 2014: 369-370 - [i12]Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Eduard Glatz, Xenofontas A. Dimitropoulos, Philipp Richter, Alessandro Finamore, Alex C. Snoeren:
Lost in Space: Improving Inference of IPv4 Address Space Utilization. CoRR abs/1410.6858 (2014) - [i11]Dimitrios Gkounis, Vasileios Kotronis, Xenofontas A. Dimitropoulos:
Towards Defeating the Crossfire Attack using SDN. CoRR abs/1412.2013 (2014) - 2013
- [j16]Mentari Djatmiko, Dominik Schatzmann, Xenofontas A. Dimitropoulos, Arik Friedman, Roksana Boreli:
Collaborative network outage troubleshooting with secure multiparty computation. IEEE Commun. Mag. 51(11): 78-84 (2013) - [j15]Ignasi Paredes-Oliva, Pere Barlet-Ros, Xenofontas A. Dimitropoulos:
FaRNet: Fast recognition of high-dimensional patterns from big network traffic data. Comput. Networks 57(18): 3897-3913 (2013) - [j14]Elias Raftopoulos, Xenofontas A. Dimitropoulos:
A quality metric for IDS signatures: in the wild the size matters. EURASIP J. Inf. Secur. 2013: 7 (2013) - [c26]Mentari Djatmiko, Dominik Schatzmann, Xenofontas A. Dimitropoulos, Arik Friedman, Roksana Boreli:
Federated flow-based approach for privacy preserving connectivity tracking. CoNEXT 2013: 429-440 - [c25]Francesco Fusco, Michail Vlachos, Xenofontas A. Dimitropoulos, Luca Deri:
Indexing million of packets per second using GPUs. Internet Measurement Conference 2013: 327-332 - [c24]Ignasi Paredes-Oliva, Pere Barlet-Ros, Xenofontas A. Dimitropoulos:
FaRNet: fast recognition of high multi-dimensional network traffic patterns. SIGMETRICS 2013: 355-356 - [c23]Elias Raftopoulos, Xenofontas A. Dimitropoulos:
Understanding Network Forensics Analysis in an Operational Environment. IEEE Symposium on Security and Privacy Workshops 2013: 111-118 - 2012
- [j13]Francesco Fusco, Xenofontas A. Dimitropoulos, Michail Vlachos, Luca Deri:
pcapIndex: an index for network packet traces with legacy compatibility. Comput. Commun. Rev. 42(1): 47-53 (2012) - [j12]Daniela Brauckhoff, Xenofontas A. Dimitropoulos, Arno Wagner, Kavé Salamatian:
Anomaly extraction in backbone networks using association rules. IEEE/ACM Trans. Netw. 20(6): 1788-1799 (2012) - [c22]Atef Abdelkefi, Yuming Jiang, Xenofontas A. Dimitropoulos:
K-sparse approximation for traffic histogram dimensionality reduction. CNSM 2012: 64-72 - [c21]Elias Raftopoulos, Matthias Egli, Xenofontas A. Dimitropoulos:
Shedding Light on Log Correlation in Network Forensics Analysis. DIMVA 2012: 232-241 - [c20]Vasileios Kotronis, Xenofontas A. Dimitropoulos, Bernhard Ager:
Outsourcing the routing control logic: better internet routing based on SDN principles. HotNets 2012: 55-60 - [c19]Eduard Glatz, Xenofontas A. Dimitropoulos:
Classifying internet one-way traffic. Internet Measurement Conference 2012: 37-50 - [c18]Francesco Fusco, Michail Vlachos, Xenofontas A. Dimitropoulos:
RasterZip: compressing network monitoring data with support for partial decompression. Internet Measurement Conference 2012: 51-64 - [c17]Ignasi Paredes-Oliva, Ismael Castell-Uroz, Pere Barlet-Ros, Xenofontas A. Dimitropoulos, Josep Solé-Pareta:
Practical anomaly detection based on classifying frequent traffic patterns. INFOCOM Workshops 2012: 49-54 - [c16]Eduard Glatz, Xenofontas A. Dimitropoulos:
Classifying internet one-way traffic. SIGMETRICS 2012: 417-418 - [e1]Antonio Pescapè, Luca Salgarelli, Xenofontas A. Dimitropoulos:
Traffic Monitoring and Analysis - 4th International Workshop, TMA 2012, Vienna, Austria, March 12, 2012. Proceedings. Lecture Notes in Computer Science 7189, Springer 2012, ISBN 978-3-642-28533-2 [contents] - [i10]Martin Burkhart, Xenofontas A. Dimitropoulos:
How to Protect Data Privacy in Collaborative Network Security. ERCIM News 2012(90) (2012) - 2011
- [j11]Martin Burkhart, Xenofontas A. Dimitropoulos:
Privacy-preserving distributed network troubleshooting - bridging the gap between theory and practice. ACM Trans. Inf. Syst. Secur. 14(4): 31:1-31:30 (2011) - [c15]Xenofontas A. Dimitropoulos:
Research Roadmap on Security Measurements. SysSec@DIMVA 2011: 83-85 - [c14]Elias Raftopoulos, Xenofontas A. Dimitropoulos:
Detecting, validating and characterizing computer infections in the wild. Internet Measurement Conference 2011: 29-44 - 2010
- [c13]Martin Burkhart, Xenofontas A. Dimitropoulos:
Fast Privacy-Preserving Top-k Queries Using Secret Sharing. ICCCN 2010: 1-7 - [c12]Dominik Schatzmann, Wolfgang Mühlbauer, Thrasyvoulos Spyropoulos, Xenofontas A. Dimitropoulos:
Digging into HTTPS: flow-based classification of webmail traffic. Internet Measurement Conference 2010: 322-327 - [c11]Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos, Maurizio Molina, Pere Barlet-Ros, Daniela Brauckhoff:
Automating root-cause analysis of network anomalies using frequent itemset mining. SIGCOMM 2010: 467-468 - [c10]Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas A. Dimitropoulos:
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. USENIX Security Symposium 2010: 223-240
2000 – 2009
- 2009
- [j10]Dimitrios Dechouniotis, Nikolaos Leontiou, Xenofontas A. Dimitropoulos, Andreas Kind, Spyros G. Denazis:
Unveiling the underlying relationships over a network for monitoring purposes. Int. J. Netw. Manag. 19(6): 513-526 (2009) - [j9]Andreas Kind, Marc Ph. Stoecklin, Xenofontas A. Dimitropoulos:
Histogram-based traffic anomaly detection. IEEE Trans. Netw. Serv. Manag. 6(2): 110-121 (2009) - [j8]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Amin Vahdat, George F. Riley:
Graph annotations in modeling complex network topologies. ACM Trans. Model. Comput. Simul. 19(4): 17:1-17:29 (2009) - [c9]Daniela Brauckhoff, Xenofontas A. Dimitropoulos, Arno Wagner, Kavé Salamatian:
Anomaly extraction in backbone networks using association rules. Internet Measurement Conference 2009: 28-34 - [c8]Xenofontas A. Dimitropoulos, Paul Hurley, Andreas Kind, Marc Ph. Stoecklin:
On the 95-Percentile Billing Method. PAM 2009: 207-216 - [i9]Martin Burkhart, Mario Strasser, Xenofontas A. Dimitropoulos:
SEPIA: Security through Private Information Aggregation. CoRR abs/0903.4258 (2009) - 2008
- [j7]Xenofontas A. Dimitropoulos, Paul Hurley, Andreas Kind:
Probabilistic lossy counting: an efficient algorithm for finding heavy hitters. Comput. Commun. Rev. 38(1): 5 (2008) - [j6]Xenofontas A. Dimitropoulos, M. Ángeles Serrano, Dmitri V. Krioukov:
On cycles in AS relationships. Comput. Commun. Rev. 38(3): 102-104 (2008) - [j5]Andreas Kind, Xenofontas A. Dimitropoulos, Spyros G. Denazis, Benoit Claise:
Advanced network monitoring brings life to the awareness plane. IEEE Commun. Mag. 46(10): 140-146 (2008) - [j4]Xenofontas A. Dimitropoulos, Marc Ph. Stoecklin, Paul Hurley, Andreas Kind:
The eternal sunshine of the sketch data structure. Comput. Networks 52(17): 3248-3257 (2008) - [i8]Xenofontas A. Dimitropoulos, M. Ángeles Serrano, Dmitri V. Krioukov:
On Cycles in AS Relationships. CoRR abs/0807.0887 (2008) - 2007
- [j3]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Marina Fomenkov, Bradley Huffaker, Young Hyun, Kimberly C. Claffy, George F. Riley:
AS relationships: inference and validation. Comput. Commun. Rev. 37(1): 29-40 (2007) - [c7]Dimitrios Dechouniotis, Xenofontas A. Dimitropoulos, Andreas Kind, Spyros G. Denazis:
Dependency Detection Using a Fuzzy Engine. DSOM 2007: 110-121 - [i7]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Amin Vahdat, George F. Riley:
Graph Annotations in Modeling Complex Network Topologies. CoRR abs/0708.3879 (2007) - 2006
- [b1]Christos Xenofontas A. Dimitropoulos:
Measuring and Modeling Internet Routing for Realistic Simulations. Georgia Institute of Technology, Atlanta, GA, USA, 2006 - [j2]Priya Mahadevan, Dmitri V. Krioukov, Marina Fomenkov, Xenofontas A. Dimitropoulos, Kimberly C. Claffy, Amin Vahdat:
The internet AS-level topology: three data sources and one definitive metric. Comput. Commun. Rev. 36(1): 17-26 (2006) - [j1]Xenofontas A. Dimitropoulos, George F. Riley:
Efficient large-scale BGP simulations. Comput. Networks 50(12): 2013-2027 (2006) - [c6]Xenofontas A. Dimitropoulos, George F. Riley:
Modeling Autonomous-System Relationships. PADS 2006: 143-149 - [i6]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, George F. Riley, Kimberly C. Claffy:
Revealing the Autonomous System Taxonomy: The Machine Learning Approach. CoRR abs/cs/0604015 (2006) - [i5]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Marina Fomenkov, Bradley Huffaker, Young Hyun, Kimberly C. Claffy, George F. Riley:
AS Relationships: Inference and Validation. CoRR abs/cs/0604017 (2006) - 2005
- [c5]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, George F. Riley:
Revisiting Internet AS-Level Topology Discovery. PAM 2005: 177-188 - [c4]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Bradley Huffaker, Kimberly C. Claffy, George F. Riley:
Inferring AS Relationships: Dead End or Lively Beginning? WEA 2005: 113-125 - [i4]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, George F. Riley:
Revisiting Internet AS-level Topology Discovery. CoRR abs/cs/0507046 (2005) - [i3]Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Bradley Huffaker, Kimberly C. Claffy, George F. Riley:
Inferring AS Relationships: Dead End or Lively Beginning? CoRR abs/cs/0507047 (2005) - [i2]Priya Mahadevan, Dmitri V. Krioukov, Marina Fomenkov, Bradley Huffaker, Xenofontas A. Dimitropoulos, Kimberly C. Claffy, Amin Vahdat:
Lessons from Three Views of the Internet Topology. CoRR abs/cs/0508033 (2005) - [i1]Priya Mahadevan, Dmitri V. Krioukov, Marina Fomenkov, Bradley Huffaker, Xenofontas A. Dimitropoulos, Kimberly C. Claffy, Amin Vahdat:
The Internet AS-Level Topology: Three Data Sources and One Definitive Metric. CoRR abs/cs/0512095 (2005) - 2004
- [c3]Xenofontas A. Dimitropoulos, George F. Riley:
Large-Scale Simulation Models of BGP. MASCOTS 2004: 287-294 - [c2]Jintae Kim, Steven Y. Ko, David M. Nicol, Xenofontas A. Dimitropoulos, George F. Riley:
A BGP Attack Against Traffic Engineering. WSC 2004: 318-326 - 2003
- [c1]Xenofontas A. Dimitropoulos, George F. Riley:
Creating Realistic BGP Models. MASCOTS 2003: 64-70
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint