1. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
3. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
4. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
5. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
6. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
7. On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
8. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2010 Reports Computer science
9. Modeling User Search-Behavior for Masquerade Detection Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore 2010 Reports Computer science
10. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
11. Masquerade Attack Detection Using a Search-Behavior Modeling Approach Ben Salem, Malek; Stolfo, Salvatore 2009 Reports Computer science