Argyros, George
285  results:
Search for persons X
?
1

Mime Artist: Bypassing Whitelisting for the Web with JavaSc..:

, In: Lecture Notes in Computer Science; Computer Security – ESORICS 2019,
 
?
2

The Learnability of Symbolic Automata:

, In: Computer Aided Verification; Lecture Notes in Computer Science,
Argyros, George ; D'Antoni, Loris - p. 427-445 , 2018
 
?
 
?
4

Evaluating the Privacy Guarantees of Location Proximity Ser..:

Argyros, George ; Petsios, Theofilos ; Sivakorn, Suphannee..
ACM Transactions on Privacy and Security (TOPS).  19 (2017)  4 - p. 1-31 , 2017
 
?
5

SFADiff : Automated Evasion Attacks and Fingerprinting U..:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
Argyros, George ; Stais, Ioannis ; Jana, Suman.. - p. 1690-1701 , 2016
 
?
6

Where's Wally? : Precise User Discovery Attacks in Locat..:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
 
?
7

Which Targets Stimulate Cross-border Acquisitions? An Empir..:

Georgopoulos, Antonios ; Argyros, George ; Boura, Giota
Journal of Industry, Competition and Trade.  8 (2007)  1 - p. 55-72 , 2007
 
?
8

PREVALENCE OF HEALED LONG-BONE FRACTURES IN WILD CARNIVORES..:

Argyros, George C. ; Roth, Aaron J.
Journal of Zoo and Wildlife Medicine.  47 (2016)  3 - p. 879-882 , 2016
 
?
 
?
 
?
15

On the Ostrowski Method for Solving Equations:

Argyros, Ioannis K. ; George, Santhosh ; Argyros, ChristopherI.
European Journal of Mathematical Analysis.  2 (2021)  - p. 3 , 2021
 
1-15