1. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
2. AIM Encrypt: A Case Study of the Dangers of Cryptographic Urban Legends Locasto, Michael E. 2003 Reports Computer science
3. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
4. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
5. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
6. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Reports Computer science
7. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2005 Articles Computer science
8. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2004 Reports Computer science
9. CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap Locasto, Michael E.; Keromytis, Angelos D. 2004 Articles Computer science
10. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism
11. Collaborative Distributed Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal 2004 Reports Computer science
12. Dark Application Communities Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
13. Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction Antonatos, Spiros; Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.; Markatos, Evangelos 2007 Articles Computer science
14. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
15. From STEM to SEAD: Speculative Execution for Automated Defense Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D. 2007 Articles Computer science
16. Micro-speculation, Micro-sandboxing, and Self-Correcting Assertions: Support for Self-Healing Software and Application Communities Locasto, Michael E. 2005 Reports Computer science
17. Online Network Forensics for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
18. Online Training and Sanitization of AD Systems Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2007 Articles Computer science
19. On The General Applicability of Instruction-Set Randomization Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis 2010 Articles Computer science
20. On the Infeasibility of Modeling Polymorphic Shellcode Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Articles Computer scienceDigital signatures