1. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
2. A Genre-based Clustering Approach to Content Extraction Gupta, Suhit; Becker, Hila; Kaiser, Gail E.; Stolfo, Salvatore 2005 Reports Computer science
3. Agent-Based Distributed Learning Applied to Fraud Detection Prodromidis, Andreas L.; Stolfo, Salvatore 1999 Reports Computer scienceCredit card fraudLaw enforcement--Technological innovationsAlgorithmsMachine learning
4. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
5. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
6. A Note on Implementing OPS5 Production Systems on DADO Stolfo, Salvatore 1984 Reports Computer science
7. An Overview of the DADO Parallel Computer Lerner, Mark D.; Maguire, Gerald Q.; Stolfo, Salvatore 1984 Reports Computer science
8. Anti-Virus in Silicon Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Reports Virus inhibitorsComputer securityMalware (Computer software)Computer softwareCoupled problems (Complex systems)Computer science
9. Approximate String Matching on the DADO2 Parallel Computer Mori, Toshikatsu; Stolfo, Salvatore 1988 Reports Computer science
10. Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence Stolfo, Salvatore; Miranker, Daniel P.; Shaw, David Elliot 1983 Reports Computer scienceParallel computersArtificial intelligence
11. Are maintenance expert systems practical now? Waldes, Peter; Lustgarten, Janet; Stolfo, Salvatore 1985 Reports Computer science
12. A simple preprocessing scheme to extract and balance implicit parallelism in the concurrent match of production rules Stolfo, Salvatore; Miranker, Daniel P.; Mills, Russell C. 1985 Reports Computer science
13. A Simple Scheme for a Fault Tolerant DADO Machine Stolfo, Salvatore 1985 Reports Computer scienceArtificial intelligence
14. Automated Social Hierarchy Detection through Email Network Analysis Rowe, Ryan; Creamer, German; Hershkop, Shlomo; Stolfo, Salvatore 2007 Reports Computer science
15. Bait and Snitch: Defending Computer Systems with Decoys Voris, Jonathan A.; Jermyn, Jill; Keromytis, Angelos D.; Stolfo, Salvatore 2013 Reports Computer science
16. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
17. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science
18. Collaborative Distributed Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal 2004 Reports Computer science
19. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
20. Concurrency Attacks Yang, Junfeng; Cui, Ang; Gallagher, John Martin; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2011 Reports Computer science
21. DADO: A Parallel Computer for Artificial Intelligence Stolfo, Salvatore 1985 Reports Computer scienceArtificial intelligence
22. DADO: A Parallel Processor for Expert Systems Stolfo, Salvatore; Miranker, Daniel P. 1984 Reports Computer science
23. DADO: A Tree-Structured Machine Architecture for Production Systems Stolfo, Salvatore; Shaw, David Elliot 1982 Reports Computer science
24. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
25. Distributed Data Mining: The JAM system architecture Prodromidis, Andreas L.; Stolfo, Salvatore; Tselepis, Shelley; Truta, Terrance; Sherwin, Jeffrey; Kalina, David 2001 Reports Computer science
26. Explanation and Acquisition in Expert Systems Using Support Knowledge Pasik, Alexander J.; Christensen, Jens; Gordin, Douglas; Stancato, Agata; Stolfo, Salvatore 1985 Reports Computer science
27. Extracting Context To Improve Accuracy For HTML Content Extraction Gupta, Suhit; Kaiser, Gail E.; Stolfo, Salvatore 2004 Reports Computer science
28. Five Parallel Algorithms for Production System Execution on the DADO Machine Stolfo, Salvatore 1984 Reports Computer science
29. Genre Classification of Websites Using Search Engine Snippets Gupta, Suhit; Kaiser, Gail E.; Stolfo, Salvatore; Becker, Hila 2005 Reports Computer science
30. Host-based Anomaly Detection Using Wrapping File Systems Hershkop, Shlomo; Bui, Linh H.; Ferst, Ryan; Stolfo, Salvatore 2004 Reports Computer science
31. Improving Production System Performance on Parallel Architectures by Creating Constrained Copies of Rules Pasik, Alexander J.; Stolfo, Salvatore 1987 Reports Computer science
32. Incremental Evaluation of Rules and its Relationship to Parallelism Wolfson, Ouri; Dewan, Hasanat; Stolfo, Salvatore; Yemini, Yechiam 1990 Reports Computer science
34. Learning Control of Production Systems Stolfo, Salvatore 1979 Reports Computer scienceArtificial intelligence
35. Learning Meta-Rule Control of Production Systems from Execution Traces Harrison, Malcolm C.; Stolfo, Salvatore 1980 Reports Computer scienceExecution traces (Computer program testing)Explicit memoryImplicit memory
36. Logic Programming Using Parallel Associative Operations Taylor, Stephen; Lowry, Andy; Maguire, Gerald Q.; Stolfo, Salvatore 1984 Reports Computer science
38. LPS Algorithms: A Critical Analysis Lowry, Andy; Taylor, Stephen; Stolfo, Salvatore 1984 Reports Computer science
39. LPS Algorithms: A Detailed Examination Lowry, Andy; Taylor, Stephen; Stolfo, Salvatore 1984 Reports Computer science
40. Markov Models for Network-Behavior Modeling and Anonymization Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Reports Computer science
41. Masquerade Attack Detection Using a Search-Behavior Modeling Approach Ben Salem, Malek; Stolfo, Salvatore 2009 Reports Computer science
42. Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems Salem, Malek Ben; Stolfo, Salvatore 2008 Reports Computer science
43. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
44. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2010 Reports Computer science
45. Modeling User Search-Behavior for Masquerade Detection Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore 2010 Reports Computer science
46. More Rules May Mean Faster Parallel Execution Stolfo, Salvatore; Miranker, Daniel P.; Mills, Russell C. 1985 Reports Computer science
47. On the Design of Parallel Production System Machines: What's in a LIP? Stolfo, Salvatore 1983 Reports Computer scienceArtificial intelligence
48. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Reports Computer science
49. PPL/M: The System Level Language for Programming the DADO Machine Stolfo, Salvatore; Miranker, Daniel P.; Lerner, Mark D. 1984 Reports Computer science
50. Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing Dewan, Hasanat M.; Stolfo, Salvatore; Hernandez, Mauricio; Hwang, Jae-Jun 1994 Reports Computer science