default search action
Salvatore J. Stolfo
Person information
- affiliation: Columbia University, New York City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j43]Germán Creamer, Salvatore J. Stolfo, Mateo Creamer, Shlomo Hershkop, Ryan Rowe:
Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case. Complex. 2022: 8154476:1-8154476:18 (2022)
2010 – 2019
- 2019
- [j42]Jonathan Voris, Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
Active authentication using file system decoys and user behavior modeling: results of a large scale study. Comput. Secur. 87 (2019) - 2018
- [j41]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Motivating Security-Aware Energy Management. IEEE Micro 38(3): 98-106 (2018) - [c121]Preetam Dutta, Gabriel Ryan, Aleksander Zieba, Salvatore J. Stolfo:
Simulated User Bots: Real Time Testing of Insider Threat Detection Systems. IEEE Symposium on Security and Privacy Workshops 2018: 228-236 - 2017
- [b2]Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo:
Anomaly Detection as a Service: Challenges, Advances, and Opportunities. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01226-6 - [c120]Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
NEZHA: Efficient Domain-Independent Differential Testing. IEEE Symposium on Security and Privacy 2017: 615-632 - [c119]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. USENIX Security Symposium 2017: 1057-1074 - [i2]Theofilos Petsios, Adrian Tang, Dimitris Mitropoulos, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
Tug-of-War: Observations on Unified Content Handling. CoRR abs/1708.09334 (2017) - 2016
- [c118]David M. Tagatac, Michalis Polychronakis, Salvatore J. Stolfo:
Using Diversity to Harden Multithreaded Programs Against Exploitation. BigDataSecurity/HPSC/IDS 2016: 208-213 - [c117]Jonathan Voris, Yingbo Song, Malek Ben Salem, Salvatore J. Stolfo:
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage. MobiCASE 2016: 51-61 - 2015
- [c116]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads. CCS 2015: 256-267 - [c115]Jonathan Voris, Jill Jermyn, Nathaniel Boggs, Salvatore J. Stolfo:
Fox in the trap: thwarting masqueraders via automated decoy document deployment. EUROSEC 2015: 3:1-3:7 - [c114]Adrian Tang, John Demme, Simha Sethumadhavan, Salvatore J. Stolfo:
A silicon anti-virus engine. Hot Chips Symposium 2015: 1 - [c113]Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin, Salvatore J. Stolfo:
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks. WOWMOM 2015: 1-9 - 2014
- [c112]Sean Whalen, Nathaniel Boggs, Salvatore J. Stolfo:
Model Aggregation for Distributed Content Anomaly Detection. AISec@CCS 2014: 61-71 - [c111]Jill Jermyn, Jinho Hwang, Kun Bai, Maja Vukovic, Nikos Anerousis, Salvatore J. Stolfo:
Improving readiness for enterprise migration to the cloud. Middleware (Industry Track) 2014: 5:1-5:7 - [c110]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Unsupervised Anomaly-Based Malware Detection Using Hardware Features. RAID 2014: 109-129 - [c109]Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo:
Measuring Drive-by Download Defense in Depth. RAID 2014: 172-191 - [c108]Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo:
Synthetic Data Generation and Defense in Depth Measurement of Web Applications. RAID 2014: 234-254 - [i1]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Unsupervised Anomaly-based Malware Detection using Hardware Features. CoRR abs/1403.1631 (2014) - 2013
- [j40]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design. Inf. Manag. Comput. Secur. 21(2): 121-138 (2013) - [c107]John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, Salvatore J. Stolfo:
On the feasibility of online malware detection with performance counters. ISCA 2013: 559-570 - [c106]Ang Cui, Michael Costello, Salvatore J. Stolfo:
When Firmware Modifications Attack: A Case Study of Embedded Exploitation. NDSS 2013 - [c105]Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models. IEEE Symposium on Security and Privacy Workshops 2013: 52-59 - [e4]Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright:
Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science 8145, Springer 2013, ISBN 978-3-642-41283-7 [contents] - 2012
- [j39]Shari Lawrence Pfleeger, Marc Rogers, Masooda N. Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo:
Does Profiling Make Us More Secure? IEEE Secur. Priv. 10(4): 10-15 (2012) - [j38]Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo:
Usable, Secure, Private Search. IEEE Secur. Priv. 10(5): 53-60 (2012) - [j37]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. J. Comput. Secur. 20(2-3): 199-221 (2012) - [j36]Malek Ben Salem, Salvatore J. Stolfo:
Combining Baiting and User Search Profiling Techniques for Masquerade Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 13-29 (2012) - [j35]Malek Ben Salem, Salvatore J. Stolfo:
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection. Secur. Commun. Networks 5(8): 863-872 (2012) - [c104]Young Hee Park, Salvatore J. Stolfo:
Software decoys for insider threat. AsiaCCS 2012: 93-94 - [c103]Junfeng Yang, Ang Cui, Salvatore J. Stolfo, Simha Sethumadhavan:
Concurrency Attacks. HotPar 2012 - [c102]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou:
The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450 - [c101]Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis:
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshops 2012: 125-128 - [c100]Jonathan Voris, Nathaniel Boggs, Salvatore J. Stolfo:
Lost in Translation: Improving Decoy Documents via Automated Translation. IEEE Symposium on Security and Privacy Workshops 2012: 129-133 - [e3]Davide Balzarotti, Salvatore J. Stolfo, Marco Cova:
Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings. Lecture Notes in Computer Science 7462, Springer 2012, ISBN 978-3-642-33337-8 [contents] - 2011
- [j34]David Evans, Salvatore J. Stolfo:
Guest Editors' Introduction: The Science of Security. IEEE Secur. Priv. 9(3): 16-17 (2011) - [j33]Salvatore J. Stolfo, Steven M. Bellovin, David Evans:
Measuring Security. IEEE Secur. Priv. 9(3): 60-65 (2011) - [c99]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. ACSAC 2011: 393-402 - [c98]Ang Cui, Salvatore J. Stolfo:
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner. BADGERS@EuroSys 2011: 8-18 - [c97]Malek Ben Salem, Salvatore J. Stolfo:
Decoy Document Deployment for Effective Masquerade Attack Detection. DIMVA 2011: 35-54 - [c96]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou, Anup K. Ghosh, Dawson R. Engler, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - [c95]Simha Sethumadhavan, Salvatore J. Stolfo, Angelos D. Keromytis, Junfeng Yang, David I. August:
The SPARCHS Project: Hardware Support for Software Security. SysSec@DIMVA 2011: 119-122 - [c94]Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo:
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. RAID 2011: 142-160 - [c93]Malek Ben Salem, Salvatore J. Stolfo:
Modeling User Search Behavior for Masquerade Detection. RAID 2011: 181-200 - [c92]Ang Cui, Salvatore J. Stolfo:
Defending Embedded Systems with Software Symbiotes. RAID 2011: 358-377 - [c91]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. WOOT 2011: 19-27 - [c90]Malek Ben Salem, Salvatore J. Stolfo:
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned. CSET 2011 - [p6]Ang Cui, Salvatore J. Stolfo:
Symbiotes and defensive Mutualism: Moving Target Defense. Moving Target Defense 2011: 99-108 - [r1]Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem:
Insider Threat Defense. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 609-611 - 2010
- [j32]Germán Creamer, Salvatore J. Stolfo:
Erratum to: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 21(3): 542 (2010) - [j31]Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo:
Ethics in Security Vulnerability Research. IEEE Secur. Priv. 8(2): 67-72 (2010) - [j30]Salvatore J. Stolfo, Gene Tsudik:
Privacy-Preserving Sharing of Sensitive Information. IEEE Secur. Priv. 8(4): 16-17 (2010) - [j29]Malek Ben Salem, Salvatore J. Stolfo:
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 3-13 (2010) - [j28]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Mach. Learn. 81(2): 179-205 (2010) - [c89]Ang Cui, Salvatore J. Stolfo:
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. ACSAC 2010: 97-106 - [c88]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137 - [c87]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
Automating the injection of believable decoys to detect snooping. WISEC 2010: 81-86 - [p5]Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo:
Monitoring Technologies for Mitigating Insider Threats. Insider Threats in Cyber Security 2010: 197-217
2000 – 2009
- 2009
- [j27]Germán Creamer, Salvatore J. Stolfo:
A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 18(3): 419-445 (2009) - [j26]Shari Lawrence Pfleeger, Salvatore J. Stolfo:
Addressing the Insider Threat. IEEE Secur. Priv. 7(6): 10-13 (2009) - [j25]Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Designing Host and Network Sensors to Mitigate the Insider Threat. IEEE Secur. Priv. 7(6): 22-29 (2009) - [c86]Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis:
A Network Access Control Mechanism Based on Behavior Profiles. ACSAC 2009: 3-12 - [c85]Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo:
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46 - [c84]Salvatore J. Stolfo:
Polymorphic shellcode: the demise of signature-based detection. CSIIRW 2009: 7 - [c83]Doug Maughan, George Hull, Salvatore J. Stolfo, Robert J. Stratton III:
Keynote panel. CSIIRW 2009: 10 - [c82]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ICISS 2009: 193-207 - [c81]Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo:
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. NDSS 2009 - [c80]Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo:
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60 - [c79]Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo:
Brave New World: Pervasive Insecurity of Embedded Network Devices. RAID 2009: 378-380 - [c78]Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Baiting Inside Attackers Using Decoy Documents. SecureComm 2009: 51-70 - 2008
- [c77]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ACSAC 2008: 367-376 - [c76]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190 - [c75]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 - [c74]Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. SP 2008: 81-95 - [p4]Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
A Survey of Insider Attack Detection Research. Insider Attack and Cyber Security 2008: 69-90 - [e2]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents] - 2007
- [c73]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode. CCS 2007: 541-551 - [c72]Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis:
A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250 - [c71]Germán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo:
Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. WebKDD/SNA-KDD 2007: 40-58 - [p3]Salvatore J. Stolfo, Ke Wang, Wei-Jen Li:
Towards Stealthy Malware Detection. Malware Detection 2007: 231-249 - 2006
- [j24]Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang:
Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006) - [c70]Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo:
Intrusion and anomaly detection model exchange for mobile ad-hoc networks. CCNC 2006: 635-639 - [c69]Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop:
A temporal based forensic analysis of electronic communication. DG.O 2006: 23-24 - [c68]Ke Wang, Janak J. Parekh, Salvatore J. Stolfo:
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248 - [c67]Janak J. Parekh, Ke Wang, Salvatore J. Stolfo:
Privacy-preserving payload-based correlation for accurate malicious traffic detection. LSAD@SIGCOMM 2006: 99-106 - [c66]Suhit Gupta, Hila Becker, Gail E. Kaiser, Salvatore J. Stolfo:
Verifying genre-based clustering approach to content extraction. WWW 2006: 875-876 - 2005
- [j23]Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine A. Heller, Shlomo Hershkop, Andrew Honig, Krysta M. Svore:
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. J. Comput. Secur. 13(4): 659-693 (2005) - [c65]Salvatore J. Stolfo, Shlomo Hershkop:
Email mining toolkit supporting law enforcement forensic analyses. DG.O 2005: 221-222 - [c64]Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang:
Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28 - [c63]Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:
An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 - [c62]Shlomo Hershkop, Salvatore J. Stolfo:
Combining email models for false positive reduction. KDD 2005: 98-107 - [c61]Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 - [c60]Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo:
Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246 - [c59]Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo:
Extracting context to improve accuracy for HTML content extraction. WWW (Special interest tracks and posters) 2005: 1114-1115 - 2004
- [j22]Shlomo Hershkop, Salvatore J. Stolfo:
Identifying spam without peeking at the contents. ACM Crossroads 11(2): 3 (2004) - [j21]Salvatore J. Stolfo:
Worm and Attack Early Warning. IEEE Secur. Priv. 2(3): 73-75 (2004) - [j20]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan:
Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004) - [c58]Ke Wang, Salvatore J. Stolfo:
Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222 - [c57]Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo:
Email archive analysis through graphical visualization. VizSEC 2004: 128-132 - 2003
- [c56]Angelos D. Keromytis, Janak J. Parekh, Philip Gross, Gail E. Kaiser, Vishal Misra, Jason Nieh, Dan Rubenstein, Salvatore J. Stolfo:
A holistic approach to service survivability. SSRS@CCS 2003: 11-22 - [c55]Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicec, Stephen Jan:
Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. DG.O 2003 - [c54]Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo:
Surveillance Detection in High Bandwidth Environments. DISCEX (1) 2003: 130- - [c53]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern:
EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290- - [c52]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
Behavior Profiling of Email. ISI 2003: 74-90 - [c51]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81 - 2002
- [j19]Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok:
Toward Cost-Sensitive Modeling for Intrusion Detection and Response. J. Comput. Secur. 10(1/2): 5-22 (2002) - [c50]Herbert Schorr, Salvatore J. Stolfo:
Towards the Digital Government of the 21st Century. DG.O 2002 - [c49]Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo:
A Fully Distributed Framework for Cost-Sensitive Data Mining. ICDCS 2002: 445-446 - [c48]Wei Fan, Haixun Wang, Philip S. Yu, Shaw-Hwa Lo, Salvatore J. Stolfo:
Progressive Modeling. ICDM 2002: 163-170 - [c47]Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo:
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. RAID 2002: 36-53 - [c46]Wei Fan, Salvatore J. Stolfo:
Ensemble-based Adaptive Intrusion Detection. SDM 2002: 41-58 - [c45]Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo:
A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. SDM 2002: 437-453 - [p2]Eleazar Eskin, Andrew Arnold, Michael J. Prerau, Leonid Portnoy, Salvatore J. Stolfo:
A Geometric Framework for Unsupervised Anomaly Detection. Applications of Data Mining in Computer Security 2002: 77-101 - [p1]Andrew Honig, Andrew Howard, Eleazar Eskin, Salvatore J. Stolfo:
Adaptive Model Generation. Applications of Data Mining in Computer Security 2002: 153-193 - 2001
- [j18]Andreas L. Prodromidis, Salvatore J. Stolfo:
Cost Complexity-Based Pruning of Ensemble Classifiers. Knowl. Inf. Syst. 3(4): 449-469 (2001) - [j17]