Skip to main content
Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Keromytis, Angelos D.
[remove]
33
Locasto, Michael E.
[remove]
33
Stavrou, Angelos
13
Stolfo, Salvatore
9
Cretu, Gabriela F.
7
more
Author
»
Academic Unit
Computer Science
33
Subject
Computer science
33
Anomaly detection (Computer security)
2
Computer security
1
Cyberterrorism
1
Digital signatures
1
more
Subject
»
Type
Articles
21
Reports
12
Date Published
Date Published range begin
–
Date Published range end
Current results range from
2004
to
2010
View distribution
Series
Columbia University Computer Science Technical Reports
13
Language
English
[remove]
33
Search Constraints
Start Over
You searched for:
Author
Keromytis, Angelos D.
Remove constraint Author: Keromytis, Angelos D.
Author
Locasto, Michael E.
Remove constraint Author: Locasto, Michael E.
Language
English
Remove constraint Language: English
« Previous |
1
-
20
of
33
|
Next »
Sort by Title Z-A
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
20 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
W3Bcrypt: Encryption as a Stylesheet
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
2.
W3Bcrypt: Encryption as a Stylesheet
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Reports
Computer science
3.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
4.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
5.
SSARES: Secure Searchable Automated Remote Email Storage
Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D.
2007
Articles
Computer science
6.
Speculative Virtual Verification: Policy-Constrained Speculative Execution
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2005
Articles
Computer science
7.
Speculative Execution as an Operating System Service
Locasto, Michael E.; Keromytis, Angelos D.
2006
Reports
Computer science
8.
Software Self-Healing Using Collaborative Application Communities
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2006
Articles
Computer science
9.
Return Value Predictability Profiles for Self–healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
10.
Return Value Predictability Profiles for Self-Healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
Anomaly detection (Computer security)
11.
Quantifying Application Behavior Space for Detection and Self-Healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2006
Reports
Computer science
12.
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2008
Articles
Computer science
13.
PalProtect: A Collaborative Security Approach to Comment Spam
Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D.
2006
Reports
Computer science
14.
PalProtect: A Collaborative Security Approach to Comment Spam
Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
15.
PachyRand: SQL Randomization for the PostgreSQL JDBC Driver
Locasto, Michael E.; Keromytis, Angelos D.
2005
Reports
Computer science
16.
On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore
2007
Reports
Computer science
17.
On the Infeasibility of Modeling Polymorphic Shellcode
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore
2007
Articles
Computer science
Digital signatures
18.
On The General Applicability of Instruction-Set Randomization
Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis
2010
Articles
Computer science
19.
Online Network Forensics for Automatic Repair Validation
Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D.
2008
Articles
Computer science
20.
From STEM to SEAD: Speculative Execution for Automated Defense
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.
2007
Reports
Computer science
« Previous
Next »
1
2