Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Keromytis, Angelos D.
[remove]
26
Stolfo, Salvatore
[remove]
26
Stavrou, Angelos
7
Locasto, Michael E.
6
Bowen, Brian M.
5
more
Author
»
Academic Unit
Computer Science
26
Subject
Computer science
26
Intrusion detection systems (Computer security)
2
Anomaly detection (Computer security)
1
Computer networks--Access control
1
Digital signatures
1
Type
Articles
[remove]
26
Date Published
Date Published range begin
–
Date Published range end
Current results range from
2003
to
2012
View distribution
Language
English
26
Search Constraints
Start Over
You searched for:
Author
Keromytis, Angelos D.
Remove constraint Author: Keromytis, Angelos D.
Author
Stolfo, Salvatore
Remove constraint Author: Stolfo, Salvatore
Type
Articles
Remove constraint Type: Articles
« Previous |
1
-
20
of
26
|
Next »
Sort by Published Earliest
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
20 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
A Holistic Approach to Service Survivability
Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore
2003
Articles
Computer science
2.
One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses
Heller, Katherine; Svore, Krysta; Keromytis, Angelos D.; Stolfo, Salvatore
2003
Articles
Computer science
3.
One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses
Heller, Katherine; Svore, Krysta; Keromytis, Angelos D.; Stolfo, Salvatore
2003
Articles
Computer science
4.
An Email Worm Vaccine Architecture
Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
5.
FLIPS: Hybrid Adaptive Intrusion Prevention
Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
Intrusion detection systems (Computer security)
6.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
7.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
8.
A Study of Malcode-Bearing Documents
Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D.
2007
Articles
Computer science
9.
Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems
Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D.
2007
Articles
Computer science
10.
Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems
Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D.
2007
Articles
Computer science
11.
On the Infeasibility of Modeling Polymorphic Shellcode
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore
2007
Articles
Computer science
Digital signatures
12.
Behavior-Based Network Access Control: A Proof-of-Concept
Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D.
2008
Articles
Computer science
Computer networks--Access control
Intrusion detection systems (Computer security)
13.
Return Value Predictability Profiles for Self–healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
14.
Return Value Predictability Profiles for Self-Healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
Anomaly detection (Computer security)
15.
A Network Access Control Mechanism Based on Behavior Profiles
Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D.
2009
Articles
Computer science
16.
Baiting Inside Attackers Using Decoy Documents
Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
17.
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D.
2009
Articles
Computer science
18.
Designing Host and Network Sensors to Mitigate the Insider Threat
Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
19.
Designing Host and Network Sensors to Mitigate the Insider Threat
Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
20.
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
« Previous
Next »
1
2
Academic Commons provides global access to research and scholarship produced at
Columbia University
,
Barnard College
,
Teachers College
,
Union Theological Seminary
and
Jewish Theological Seminary
. Academic Commons is managed by the
Columbia University Libraries
.