1. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
2. Masquerade Attack Detection Using a Search-Behavior Modeling Approach Ben Salem, Malek; Stolfo, Salvatore 2009 Reports Computer science
3. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2010 Reports Computer science
4. Modeling User Search-Behavior for Masquerade Detection Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore 2010 Reports Computer science
5. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
6. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
7. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
8. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
9. On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
10. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science