Skip to main content
Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Keromytis, Angelos D.
[remove]
21
Locasto, Michael E.
[remove]
21
Stavrou, Angelos
8
Stolfo, Salvatore
6
Sidiroglou, Stelios
5
more
Author
»
Academic Unit
Computer Science
21
Subject
Computer science
21
Anomaly detection (Computer security)
2
Computer security
1
Cyberterrorism
1
Digital signatures
1
more
Subject
»
Type
Articles
[remove]
21
Date Published
Date Published range begin
–
Date Published range end
Current results range from
2004
to
2010
View distribution
Series
Columbia University Computer Science Technical Reports
1
Language
English
21
Search Constraints
Start Over
You searched for:
Author
Locasto, Michael E.
Remove constraint Author: Locasto, Michael E.
Author
Keromytis, Angelos D.
Remove constraint Author: Keromytis, Angelos D.
Type
Articles
Remove constraint Type: Articles
« Previous |
1
-
20
of
21
|
Next »
Sort by Title Z-A
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
20 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
W3Bcrypt: Encryption as a Stylesheet
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
2.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
3.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
4.
SSARES: Secure Searchable Automated Remote Email Storage
Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D.
2007
Articles
Computer science
5.
Speculative Virtual Verification: Policy-Constrained Speculative Execution
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2005
Articles
Computer science
6.
Software Self-Healing Using Collaborative Application Communities
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2006
Articles
Computer science
7.
Return Value Predictability Profiles for Self–healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
8.
Return Value Predictability Profiles for Self-Healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
Anomaly detection (Computer security)
9.
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2008
Articles
Computer science
10.
PalProtect: A Collaborative Security Approach to Comment Spam
Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
11.
On the Infeasibility of Modeling Polymorphic Shellcode
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore
2007
Articles
Computer science
Digital signatures
12.
On The General Applicability of Instruction-Set Randomization
Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis
2010
Articles
Computer science
13.
Online Network Forensics for Automatic Repair Validation
Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D.
2008
Articles
Computer science
14.
From STEM to SEAD: Speculative Execution for Automated Defense
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.
2007
Articles
Computer science
15.
FLIPS: Hybrid Adaptive Intrusion Prevention
Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
Intrusion detection systems (Computer security)
16.
Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction
Antonatos, Spiros; Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.; Markatos, Evangelos
2007
Articles
Computer science
17.
Dark Application Communities
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
18.
Casting Out Demons: Sanitizing Training Data for Anomaly Sensors
Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D.
2008
Articles
Computer science
Anomaly detection (Computer security)
Computer security
Cyberterrorism
19.
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
Locasto, Michael E.; Keromytis, Angelos D.
2004
Articles
Computer science
20.
Building a Reactive Immune System for Software Services
Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D.
2005
Articles
Computer science
« Previous
Next »
1
2