Skip to main content
Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Locasto, Michael E.
[remove]
22
Keromytis, Angelos D.
21
Stavrou, Angelos
9
Stolfo, Salvatore
7
Cretu, Gabriela F.
5
more
Author
»
Academic Unit
Computer Science
22
Subject
Computer science
22
Anomaly detection (Computer security)
2
Computer security
1
Cyberterrorism
1
Digital signatures
1
more
Subject
»
Type
Articles
[remove]
22
Date Published
Date Published range begin
–
Date Published range end
Current results range from
2004
to
2010
View distribution
Series
Columbia University Computer Science Technical Reports
1
Language
English
22
Search Constraints
Start Over
You searched for:
Author
Locasto, Michael E.
Remove constraint Author: Locasto, Michael E.
Type
Articles
Remove constraint Type: Articles
1
-
22
of
22
Sort by Best Match
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
50 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
On The General Applicability of Instruction-Set Randomization
Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis
2010
Articles
Computer science
2.
Casting Out Demons: Sanitizing Training Data for Anomaly Sensors
Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D.
2008
Articles
Computer science
Anomaly detection (Computer security)
Computer security
Cyberterrorism
3.
Online Network Forensics for Automatic Repair Validation
Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D.
2008
Articles
Computer science
4.
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2008
Articles
Computer science
5.
Return Value Predictability Profiles for Self–healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
6.
Return Value Predictability Profiles for Self-Healing
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore
2008
Articles
Computer science
Anomaly detection (Computer security)
7.
Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction
Antonatos, Spiros; Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.; Markatos, Evangelos
2007
Articles
Computer science
8.
From STEM to SEAD: Speculative Execution for Automated Defense
Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.
2007
Articles
Computer science
9.
Online Training and Sanitization of AD Systems
Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore
2007
Articles
Computer science
10.
On the Infeasibility of Modeling Polymorphic Shellcode
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore
2007
Articles
Computer science
Digital signatures
11.
SSARES: Secure Searchable Automated Remote Email Storage
Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D.
2007
Articles
Computer science
12.
Dark Application Communities
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
13.
PalProtect: A Collaborative Security Approach to Comment Spam
Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
14.
Software Self-Healing Using Collaborative Application Communities
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2006
Articles
Computer science
15.
W3Bcrypt: Encryption as a Stylesheet
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D.
2006
Articles
Computer science
16.
Application Communities: Using Monoculture for Dependability
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2005
Articles
Computer science
17.
Building a Reactive Immune System for Software Services
Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D.
2005
Articles
Computer science
18.
FLIPS: Hybrid Adaptive Intrusion Prevention
Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
Intrusion detection systems (Computer security)
19.
Speculative Virtual Verification: Policy-Constrained Speculative Execution
Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.
2005
Articles
Computer science
20.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
21.
Towards Collaborative Security and P2P Intrusion Detection
Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
22.
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
Locasto, Michael E.; Keromytis, Angelos D.
2004
Articles
Computer science