1. When Firmware Modifications Attack: A Case Study of Embedded Exploitation Cui, Ang; Costello, Michael; Stolfo, Salvatore 2013 Presentations (Communicative Events) Malware (Computer software)Computer securityComputer firmwareComputer science
2. User-Defined Predicates in OPS5: A Needed Language Extension for Financial Expert Systems Pasik, Alexander J.; Miranker, Daniel P.; Stolfo, Salvatore; Kresnicka, Thomas 1989 Reports Computer science
3. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
4. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
5. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
6. Unification in a Parallel Environment Taylor, Stephen; Tzoar, Daphne; Stolfo, Salvatore 1984 Reports Computer science
7. Towards the Parallel Execution of Rules in Production System Programs Ishida, Toru; Stolfo, Salvatore 1985 Reports Computer science
8. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
9. Toward Scalable and Parallel Inductive Learning: A Case Study in Splice Junction Prediction Chan, Philip K.; Stolfo, Salvatore 1994 Reports Computer science
10. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
11. Toward Cost-Sensitive Modeling for Intrusion Detection Lee, Wenke; Miller, Matthew; Stolfo, Salvatore; Jallad, Kahil; Park, Christopher T.; Zadok, Erez; Prabhakar, Vijay 2000 Reports Computer science
12. Thwarting Attacks in Malcode-Bearing Documents by Altering Data Sector Values Li, Wei-Jen; Stolfo, Salvatore 2009 Reports Computer science
13. The SPARCHS Project: Hardware Support for Software Security Sethumadhavan, Lakshminarasimhan; Stolfo, Salvatore; Keromytis, Angelos D.; Yang, Junfeng; August, David 2011 Articles Computer science
14. The NON-VON Database Machine: An Overview Shaw, David Elliot; Stolfo, Salvatore; Ibrahim, Hussein; Hillyer, Bruce K.; Andrews, Jim; Wiederhold, Gio 1981 Reports Computer input-output equipmentParallel programming (Computer science)Computer engineeringInformation scienceColumbia UniversityStanford University
15. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
16. The Do-loop Considered Harmful in Production System Programming Biema, Michael van; Miranker, Daniel P.; Stolfo, Salvatore 1986 Reports Computer science
17. The DADO Production System Machine Stolfo, Salvatore; Miranker, Daniel P. 1984 Reports Computer science
19. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
20. Symbiotes and defensive Mutualism: Moving Target Defense Cui, Ang; Stolfo, Salvatore 2011 Chapters (Layout Features) Computer software--Design and constructionComputer programmingComputer securityComputer science