Xenia Mountrouidou
Xenia Mountrouidou
Senior Security Researcher, Cyber adAPT
Verified email at - Homepage
Cited by
Cited by
Selective packet inspection to detect DoS flooding using software defined networking (SDN)
T Chin, X Mountrouidou, X Li, K Xiong
2015 IEEE 35th international conference on distributed computing systems …, 2015
An SDN-supported collaborative approach for DDoS flooding detection and containment
T Chin, X Mountrouidou, X Li, K Xiong
MILCOM 2015-2015 IEEE Military Communications Conference, 659-664, 2015
Securing the human: a review of literature on broadening diversity in cybersecurity education
X Mountrouidou, D Vosen, C Kari, MQ Azhar, S Bhatia, G Gagne, ...
Proceedings of the Working Group Reports on Innovation and Technology in …, 2019
Not just another Internet of Things taxonomy: A method for validation of taxonomies
X Mountrouidou, B Billings, L Mejia-Ricart
Internet of Things 6, 100049, 2019
Cybersecurity in liberal arts general education curriculum
X Mountrouidou, X Li, Q Burke
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology …, 2018
On the departure process of burst aggregation algorithms in optical burst switching
X Mountrouidou, H Perros
Computer Networks 53 (3), 247-264, 2009
Characterization of the burst aggregation process in optical burst switching
X Mountrouidou, HG Perros
International Conference on Research in Networking, 752-764, 2006
A zero burst loss architecture for star OBS networks
X Mountrouidou, V Puttasubbappa, H Perros
International Conference on Network Control and Engineering for QoS …, 2006
Bandwidth allocation under end‐to‐end percentile delay bounds
B Anjum, H Perros, X Mountrouidou, K Kontovasilis
International Journal of Network Management 21 (6), 536-547, 2011
The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity
R Weiss, CW O'Brien, X Mountrouidou, J Mache
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
Spectral clustering technique for classifying network attacks
A Little, X Mountrouidou, D Moseley
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
Performance evaluation of an optical burst switching scheme for grid networks
X Mountrouidou, HG Perros, M Beshai
2nd International Conference on Broadband Networks, 2005., 515-523, 2005
Adaptive workload shaping for power savings on disk drives
X Mountrouidou, A Riska, E Smirni
Proceedings of the 2nd ACM/SPEC International Conference on Performance …, 2011
IoT metrics and automation for security evaluation
T Setzler, X Mountrouidou
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021
Raising flags: Detecting covert storage channels using relative entropy
JK Chow, X Li, X Mountrouidou
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
Securing the human: Broadening diversity in cybersecurity
M Azhar, S Bhatia, G Gagne, C Kari, J Maguire, X Mountrouidou, L Tudor, ...
Proceedings of the 2019 ACM Conference on Innovation and Technology in …, 2019
Denial of service lab for experiential cybersecurity learning in primarily undergraduate institutions
H Ledford, X Mountrouidou, X Li
Journal of Computing Sciences in Colleges 32 (2), 158-164, 2016
System and method for graphical context drill-down
DA Bell, CL Gussin, P Mountrouidou
US Patent App. 12/862,022, 2012
Saving power without compromising disk drive reliability
X Mountrouidou, A Riska, E Smirni
2011 International Green Computing Conference and Workshops, 1-6, 2011
Memory management for object oriented applications during runtime
PB Benjamin, DN Brauneis Jr, JP Jurkiewicz, RG McDougald, ...
US Patent 8,453,130, 2013
The system can't perform the operation now. Try again later.
Articles 1–20