1. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
2. Behavior Profiling of Email Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
3. Combining Behavior Models to Secure Email Systems Stolfo, Salvatore; Hu, Chia-wei; Li, Wei-Jen; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier 2003 Articles Computer science
4. One-Class Training for Masquerade Detection Wang, Ke; Stolfo, Salvatore 2003 Articles Computer science
5. Anomalous Payload-Based Network Intrusion Detection Wang, Ke; Stolfo, Salvatore 2004 Articles Computer science
6. Anomalous Payload-Based Worm Detection and Signature Generation Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore 2005 Articles Computer science
7. Fileprints: Identifying File Types by n-gram Analysis Li, Wei-Jen; Wang, Ke; Stolfo, Salvatore; Herzog, Benjamin 2005 Articles Computer science
8. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
9. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
10. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science