1. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
2. Behavior Profiling of Email Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
3. Combining Behavior Models to Secure Email Systems Stolfo, Salvatore; Hu, Chia-wei; Li, Wei-Jen; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier 2003 Articles Computer science
4. One-Class Training for Masquerade Detection Wang, Ke; Stolfo, Salvatore 2003 Articles Computer science
5. Anomalous Payload-Based Network Intrusion Detection Wang, Ke; Stolfo, Salvatore 2004 Articles Computer science
6. Anomalous Payload-Based Worm Detection and Signature Generation Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore 2005 Articles Computer science
7. Fileprints: Identifying File Types by n-gram Analysis Li, Wei-Jen; Wang, Ke; Stolfo, Salvatore; Herzog, Benjamin 2005 Articles Computer science
8. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
9. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
10. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
11. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
12. Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks Cretu, Gabriela F.; Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer scienceAd hoc networks (Computer networks)Intrusion detection systems (Computer security)Anomaly detection (Computer security)
13. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Reports Computer science
14. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer science