11. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
12. Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks Cretu, Gabriela F.; Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer scienceAd hoc networks (Computer networks)Intrusion detection systems (Computer security)Anomaly detection (Computer security)
13. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Reports Computer science
14. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer science