Skip to main content
Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Keromytis, Angelos D.
[remove]
33
Locasto, Michael E.
[remove]
33
Stavrou, Angelos
13
Stolfo, Salvatore
9
Cretu, Gabriela F.
7
more
Author
»
Academic Unit
Computer Science
[remove]
33
Subject
Computer science
33
Anomaly detection (Computer security)
2
Computer security
1
Cyberterrorism
1
Digital signatures
1
more
Subject
»
Type
Articles
21
Reports
12
Date Published
Date Published range begin
–
Date Published range end
Current results range from
2004
to
2010
View distribution
Series
Columbia University Computer Science Technical Reports
13
Language
English
33
Search Constraints
Start Over
You searched for:
Author
Keromytis, Angelos D.
Remove constraint Author: Keromytis, Angelos D.
Author
Locasto, Michael E.
Remove constraint Author: Locasto, Michael E.
Academic Unit
Computer Science
Remove constraint Academic Unit: Computer Science
1
-
33
of
33
Sort by Title Z-A
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
50 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
W3Bcrypt: Encryption as a Stylesheet
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
2.
W3Bcrypt: Encryption as a Stylesheet
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Reports
Computer science
3.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
4.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
5.
SSARES: Secure Searchable Automated Remote Email Storage
Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D.
2007
Articles
Computer science
6.
Speculative Virtual Verification: Policy-Constrained Speculative Execution
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2005
Articles
Computer science
7.
Speculative Execution as an Operating System Service
Locasto, Michael E.; Keromytis, Angelos D.
2006
Reports
Computer science
8.
Software Self-Healing Using Collaborative Application Communities
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2006
Articles
Computer science
9.
Return Value Predictability Profiles for Self–healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
10.
Return Value Predictability Profiles for Self-Healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
Anomaly detection (Computer security)
11.
Quantifying Application Behavior Space for Detection and Self-Healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2006
Reports
Computer science
12.
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2008
Articles
Computer science
13.
PalProtect: A Collaborative Security Approach to Comment Spam
Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D.
2006
Reports
Computer science
14.
PalProtect: A Collaborative Security Approach to Comment Spam
Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
15.
PachyRand: SQL Randomization for the PostgreSQL JDBC Driver
Locasto, Michael E.; Keromytis, Angelos D.
2005
Reports
Computer science
16.
On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore
2007
Reports
Computer science
17.
On the Infeasibility of Modeling Polymorphic Shellcode
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore
2007
Articles
Computer science
Digital signatures
18.
On The General Applicability of Instruction-Set Randomization
Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis
2010
Articles
Computer science
19.
Online Network Forensics for Automatic Repair Validation
Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D.
2008
Articles
Computer science
20.
From STEM to SEAD: Speculative Execution for Automated Defense
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.
2007
Reports
Computer science
21.
From STEM to SEAD: Speculative Execution for Automated Defense
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.
2007
Articles
Computer science
22.
FLIPS: Hybrid Adaptive Intrusion Prevention
Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
Intrusion detection systems (Computer security)
23.
Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction
Antonatos, Spiros; Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.; Markatos, Evangelos
2007
Articles
Computer science
24.
Dark Application Communities
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
25.
Collaborative Distributed Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal
2004
Reports
Computer science
26.
Casting Out Demons: Sanitizing Training Data for Anomaly Sensors
Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D.
2008
Articles
Computer science
Anomaly detection (Computer security)
Computer security
Cyberterrorism
27.
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
Locasto, Michael E.; Keromytis, Angelos D.
2004
Articles
Computer science
28.
Building a Reactive Immune System for Software Services
Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D.
2005
Articles
Computer science
29.
Building a Reactive Immune System for Software Services
Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D.
2004
Reports
Computer science
30.
Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation
Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D.
2006
Reports
Computer science
31.
Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization
Locasto, Michael E.; Keromytis, Angelos D.
2006
Reports
Computer science
32.
Application Communities: Using Monoculture for Dependability
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2005
Articles
Computer science
33.
A Model for Automatically Repairing Execution Integrity
Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D.
2007
Reports
Computer science