1. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
2. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
3. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
4. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
5. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
6. Addressing the Insider Threat Pfleeger, Shari Lawrence; Stolfo, Salvatore 2009 Articles Computer science
7. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore 2002 Articles Computer science
8. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science
9. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
10. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
11. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
12. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
13. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
14. Anomalous Payload-Based Network Intrusion Detection Wang, Ke; Stolfo, Salvatore 2004 Articles Computer science
15. Anomalous Payload-Based Worm Detection and Signature Generation Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore 2005 Articles Computer science
16. A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Cui, Ang; Stolfo, Salvatore 2010 Articles Computer science
17. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
18. Automated Intrusion Detection Methods Using NFR Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore 1999 Articles Computer science
19. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
20. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
21. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
22. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
23. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
24. Behavior-Based Network Traffic Synthesis Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Articles Computer science
25. Behavior Profiling of Email Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
26. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
27. Brave New World: Pervasive Insecurity of Embedded Network Devices Cui, Ang; Song, Yingbo; Prabhu, Pratap; Stolfo, Salvatore 2009 Articles Computer scienceRouters (Computer networks)Webcams
28. Citizen's Attitudes about Privacy While Accessing Government Websites: Results of an Online Study Stolfo, Salvatore; Johnson, Eric J.; Pavlicic, Tomislav; Jan, Stephen 2003 Articles Computer science
29. Combining Behavior Models to Secure Email Systems Stolfo, Salvatore; Hu, Chia-wei; Li, Wei-Jen; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier 2003 Articles Computer science
30. Concurrency Attacks Yang, Junfeng; Cui, Ang; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2012 Articles Computer science
31. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project Stolfo, Salvatore; Fan, Wei; Lee, Wenke; Prodromidis, Andreas L.; Chan, Philip K. 2000 Articles Computer science
32. Cross-domain Collaborative Anomaly Detection: So Far Yet So Close Boggs, Nathaniel Gordon; Hiremagalore, Sharath; Stavrou, Angelos; Stolfo, Salvatore 2011 Articles Computer science
33. Data Mining Approaches for Intrusion Detection Lee, Wenke; Stolfo, Salvatore 1998 Articles Computer science
34. Data Mining Methods for Detection of New Malicious Executables Schultz, Matthew G.; Eskin, Eleazar; Zadok, Erez; Stolfo, Salvatore 2001 Articles Computer science
35. Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Articles Computer science
36. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
37. Defending Embedded Systems with Software Symbiotes Cui, Ang; Stolfo, Salvatore 2011 Articles Computer science
38. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
39. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses Apap, Frank; Honig, Andrew; Hershkop, Shlomo; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
40. Email Archive Analysis Through Graphical Visualization Li, Wei-Jen; Hershkop, Shlomo; Stolfo, Salvatore 2004 Articles Computer scienceElectronic mail systemsSpam (Electronic mail)Computer viruses
41. Ethics in Security Vulnerability Research Matwyshyn, Andrea M.; Cui, Ang; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
42. Fileprints: Identifying File Types by n-gram Analysis Li, Wei-Jen; Wang, Ke; Stolfo, Salvatore; Herzog, Benjamin 2005 Articles Computer science
43. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
44. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
45. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment Voris, Jonathan A.; Jermyn, Jill Louise; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2015 Articles Computer science
46. From Prey to Hunter: Transforming Legacy Embedded Devices into Exploitation Sensor Grids Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
47. Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks Cretu, Gabriela F.; Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer scienceAd hoc networks (Computer networks)Intrusion detection systems (Computer security)Anomaly detection (Computer security)
48. Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
49. Learning Patterns from Unix Process Execution Traces for Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K. 1997 Articles Computer scienceMachine learningIntrusion detection systems (Computer security)
50. Lost in Translation: Improving Decoy Documents via Automated Translation Voris, Jonathan A.; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2012 Articles Computer science