51. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
52. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
53. Anomalous Payload-Based Network Intrusion Detection Wang, Ke; Stolfo, Salvatore 2004 Articles Computer science
54. Email Archive Analysis Through Graphical Visualization Li, Wei-Jen; Hershkop, Shlomo; Stolfo, Salvatore 2004 Articles Computer scienceElectronic mail systemsSpam (Electronic mail)Computer viruses
55. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
56. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science
57. Behavior Profiling of Email Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
58. Citizen's Attitudes about Privacy While Accessing Government Websites: Results of an Online Study Stolfo, Salvatore; Johnson, Eric J.; Pavlicic, Tomislav; Jan, Stephen 2003 Articles Computer science
59. Combining Behavior Models to Secure Email Systems Stolfo, Salvatore; Hu, Chia-wei; Li, Wei-Jen; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier 2003 Articles Computer science
60. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses Heller, Katherine; Svore, Krysta; Keromytis, Angelos D.; Stolfo, Salvatore 2003 Articles Computer science
61. One-Class Training for Masquerade Detection Wang, Ke; Stolfo, Salvatore 2003 Articles Computer science
62. Surveillance Detection in High Bandwidth Environments Robertson, Seth; Siegel, Eric V.; Miller, Matt; Stolfo, Salvatore 2003 Articles Computer science
63. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
64. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore 2002 Articles Computer science
65. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses Apap, Frank; Honig, Andrew; Hershkop, Shlomo; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
66. Data Mining Methods for Detection of New Malicious Executables Schultz, Matthew G.; Eskin, Eleazar; Zadok, Erez; Stolfo, Salvatore 2001 Articles Computer science
67. MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables Schultz, Matthew G.; Eskin, Eleazar; Zadok, Erez; Bhattacharyya, Manasi; Stolfo, Salvatore 2001 Articles Computer science
68. Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eskin, Eleazar; Lee, Wenke; Stolfo, Salvatore 2001 Articles Computer science
69. Real Time Data Mining-based Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K.; Eskin, Eleazar; Fan, Wei; Miller, Matthew; Hershkop, Shlomo; Zhang, Junxin 2001 Articles Computer science
70. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
71. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
72. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project Stolfo, Salvatore; Fan, Wei; Lee, Wenke; Prodromidis, Andreas L.; Chan, Philip K. 2000 Articles Computer science
73. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
74. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
75. Automated Intrusion Detection Methods Using NFR Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore 1999 Articles Computer science
76. Mining in a Data-flow Environment: Experience in Network Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
77. Data Mining Approaches for Intrusion Detection Lee, Wenke; Stolfo, Salvatore 1998 Articles Computer science
78. Mining Audit Data to Build Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1998 Articles Computer science
79. Learning Patterns from Unix Process Execution Traces for Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K. 1997 Articles Computer scienceMachine learningIntrusion detection systems (Computer security)