1. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
2. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
3. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
4. Automated Social Hierarchy Detection through Email Network Analysis Rowe, Ryan; Creamer, German; Hershkop, Shlomo; Stolfo, Salvatore 2007 Reports Computer science
5. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
6. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
7. Behavior Profiling of Email Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
8. Combining Behavior Models to Secure Email Systems Stolfo, Salvatore; Hu, Chia-wei; Li, Wei-Jen; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier 2003 Articles Computer science
9. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
10. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses Apap, Frank; Honig, Andrew; Hershkop, Shlomo; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
11. Email Archive Analysis Through Graphical Visualization Li, Wei-Jen; Hershkop, Shlomo; Stolfo, Salvatore 2004 Articles Computer scienceElectronic mail systemsSpam (Electronic mail)Computer viruses
12. Host-based Anomaly Detection Using Wrapping File Systems Hershkop, Shlomo; Bui, Linh H.; Ferst, Ryan; Stolfo, Salvatore 2004 Reports Computer science
13. Modeling User Search-Behavior for Masquerade Detection Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore 2010 Reports Computer science
14. Real Time Data Mining-based Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K.; Eskin, Eleazar; Fan, Wei; Miller, Matthew; Hershkop, Shlomo; Zhang, Junxin 2001 Articles Computer science