1. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
2. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
3. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
4. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
5. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
6. Addressing the Insider Threat Pfleeger, Shari Lawrence; Stolfo, Salvatore 2009 Articles Computer science
7. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore 2002 Articles Computer science
8. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science
9. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
10. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science