Skip to main content
Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Hershkop, Shlomo
[remove]
18
Stolfo, Salvatore
16
Bowen, Brian M.
4
Eskin, Eleazar
4
Hu, Chia-wei
4
more
Author
»
Academic Unit
Computer Science
18
Subject
Computer science
18
Computer security
2
Computer viruses
2
Anomaly detection (Computer security)
1
Data protection
1
more
Subject
»
Type
Articles
13
Reports
4
Data (Information)
1
Date Published
Date Published range begin
–
Date Published range end
Current results range from
2001
to
2015
View distribution
Series
Columbia University Computer Science Technical Reports
5
Language
English
18
Search Constraints
Start Over
You searched for:
Author
Hershkop, Shlomo
Remove constraint Author: Hershkop, Shlomo
« Previous |
1
-
10
of
18
|
Next »
Sort by Best Match
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
10 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data
Stolfo, Salvatore; Hershkop, Shlomo
2015
Data (Information)
Computer security
Data protection
Intrusion detection systems (Computer security)
Computer science
2.
Modeling User Search-Behavior for Masquerade Detection
Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore
2010
Reports
Computer science
3.
Baiting Inside Attackers Using Decoy Documents
Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
4.
Baiting Inside Attackers Using Decoy Documents
Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
5.
Designing Host and Network Sensors to Mitigate the Insider Threat
Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
6.
Designing Host and Network Sensors to Mitigate the Insider Threat
Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
7.
Automated Social Hierarchy Detection through Email Network Analysis
Rowe, Ryan; Creamer, German; Hershkop, Shlomo; Stolfo, Salvatore
2007
Reports
Computer science
8.
Post-Patch Retraining for Host-Based Anomaly Detection
Locasto, Michael E.; Cretu, Gabriela F.; Hershkop, Shlomo; Stavrou, Angelos
2007
Reports
Computer science
9.
Behavior-Based Modeling and Its Application to Email Analysis
Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke
2006
Articles
Computer science
Computer security
Computer viruses
Anomaly detection (Computer security)
10.
A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection
Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta
2005
Articles
Computer science
« Previous
Next »
1
2