1. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
2. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)