1. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
2. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
3. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
4. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
5. The SPARCHS Project: Hardware Support for Software Security Sethumadhavan, Lakshminarasimhan; Stolfo, Salvatore; Keromytis, Angelos D.; Yang, Junfeng; August, David 2011 Articles Computer science
6. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
7. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
8. Surveillance Detection in High Bandwidth Environments Robertson, Seth; Siegel, Eric V.; Miller, Matt; Stolfo, Salvatore 2003 Articles Computer science
9. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
10. Software-based Decoy System for Insider Threats Park, Younghee; Stolfo, Salvatore 2012 Articles Computer science