Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Stolfo, Salvatore
[remove]
171
Keromytis, Angelos D.
38
Hershkop, Shlomo
15
Stavrou, Angelos
15
Cui, Ang
14
more
Author
»
Academic Unit
Computer Science
171
Subject
Computer science
168
Computer security
8
Artificial intelligence
5
Intrusion detection systems (Computer security)
5
Malware (Computer software)
4
more
Subject
»
Type
Articles
85
Reports
80
Chapters (Layout Features)
3
Presentations (Communicative Events)
2
Conference Objects
1
Date Published
Date Published range begin
–
Date Published range end
Current results range from
1979
to
2018
View distribution
Series
Columbia University Computer Science Technical Reports
78
Language
English
[remove]
171
Search Constraints
Start Over
You searched for:
Author
Stolfo, Salvatore
Remove constraint Author: Stolfo, Salvatore
Language
English
Remove constraint Language: English
« Previous |
1
-
50
of
171
|
Next »
Sort by Title A-Z
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
50 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
A Behavior-Based Approach To Securing Email Systems
Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei
2003
Articles
Computer science
2.
ACE: An Expert System Supporting Analysis and Management Decision Making
Stolfo, Salvatore; Vesonder, Gregg T.
1982
Reports
Database management
Telephone cables--Maintenance and repair
3.
A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection
Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta
2005
Articles
Computer science
4.
Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating
Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore
2009
Reports
Computer science
5.
Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems
Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore
2002
Articles
Computer science
6.
Adaptive Model Generation for Intrusion Detection Systems
Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore
2000
Articles
Computer science
7.
A Data Mining Framework for Building Intrusion Detection Models
Lee, Wenke; Stolfo, Salvatore; Mok, Kui W.
1999
Articles
Computer science
8.
Addressing the Insider Threat
Pfleeger, Shari Lawrence; Stolfo, Salvatore
2009
Articles
Computer science
9.
A Genre-based Clustering Approach to Content Extraction
Gupta, Suhit; Becker, Hila; Kaiser, Gail E.; Stolfo, Salvatore
2005
Reports
Computer science
10.
Agent-Based Distributed Learning Applied to Fraud Detection
Prodromidis, Andreas L.; Stolfo, Salvatore
1999
Reports
Computer science
Credit card fraud
Law enforcement--Technological innovations
Algorithms
Machine learning
11.
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore
2002
Articles
Computer science
12.
A Holistic Approach to Service Survivability
Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore
2003
Articles
Computer science
13.
A Holistic Approach to Service Survivability
Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore
2003
Reports
Computer science
14.
ALDR: A New Metric for Measuring Effective Layering of Defenses
Boggs, Nathaniel Gordon; Stolfo, Salvatore
2011
Articles
Computer science
15.
A Multiple Model Cost-Sensitive Approach for Intrusion Detection
Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew
2000
Articles
Computer science
16.
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore
2006
Articles
Computer science
17.
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore
2006
Reports
Computer science
18.
An Email Worm Vaccine Architecture
Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
19.
A Network Access Control Mechanism Based on Behavior Profiles
Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D.
2009
Articles
Computer science
20.
Anomalous Payload-Based Network Intrusion Detection
Wang, Ke; Stolfo, Salvatore
2004
Articles
Computer science
21.
Anomalous Payload-Based Worm Detection and Signature Generation
Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore
2005
Articles
Computer science
22.
A Note on Implementing OPS5 Production Systems on DADO
Stolfo, Salvatore
1984
Reports
Computer science
23.
An Overview of the DADO Parallel Computer
Lerner, Mark D.; Maguire, Gerald Q.; Stolfo, Salvatore
1984
Reports
Computer science
24.
Anti-Virus in Silicon
Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore
2015
Reports
Virus inhibitors
Computer security
Malware (Computer software)
Computer software
Coupled problems (Complex systems)
Computer science
25.
Approximate String Matching on the DADO2 Parallel Computer
Mori, Toshikatsu; Stolfo, Salvatore
1988
Reports
Computer science
26.
A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan
Cui, Ang; Stolfo, Salvatore
2010
Articles
Computer science
27.
A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan
Cui, Ang; Stolfo, Salvatore
2010
Articles
Computer science
28.
Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence
Stolfo, Salvatore; Miranker, Daniel P.; Shaw, David Elliot
1983
Reports
Computer science
Parallel computers
Artificial intelligence
29.
Are maintenance expert systems practical now?
Waldes, Peter; Lustgarten, Janet; Stolfo, Salvatore
1985
Reports
Computer science
30.
A simple preprocessing scheme to extract and balance implicit parallelism in the concurrent match of production rules
Stolfo, Salvatore; Miranker, Daniel P.; Mills, Russell C.
1985
Reports
Computer science
31.
A Simple Scheme for a Fault Tolerant DADO Machine
Stolfo, Salvatore
1985
Reports
Computer science
Artificial intelligence
32.
A Study of Malcode-Bearing Documents
Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D.
2007
Reports
Computer science
33.
A Study of Malcode-Bearing Documents
Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D.
2007
Articles
Computer science
34.
Automated Intrusion Detection Methods Using NFR
Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore
1999
Articles
Computer science
35.
Automated Social Hierarchy Detection through Email Network Analysis
Rowe, Ryan; Creamer, German; Hershkop, Shlomo; Stolfo, Salvatore
2007
Reports
Computer science
36.
Automating the Injection of Believable Decoys to Detect Snooping
Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore
2010
Articles
Computer science
37.
Bait and Snitch: Defending Computer Systems with Decoys
Voris, Jonathan A.; Jermyn, Jill; Keromytis, Angelos D.; Stolfo, Salvatore
2013
Reports
Computer science
38.
Baiting Inside Attackers Using Decoy Documents
Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Reports
Computer science
39.
Baiting Inside Attackers Using Decoy Documents
Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore
2009
Articles
Computer science
40.
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D.
2009
Articles
Computer science
41.
BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs
Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D.
2007
Reports
Computer science
42.
Behavior-Based Modeling and Its Application to Email Analysis
Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke
2006
Articles
Computer science
Computer security
Computer viruses
Anomaly detection (Computer security)
43.
Behavior-Based Network Access Control: A Proof-of-Concept
Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D.
2008
Articles
Computer science
Computer networks--Access control
Intrusion detection systems (Computer security)
44.
Behavior-Based Network Traffic Synthesis
Song, Yingbo; Stolfo, Salvatore; Jebara, Tony
2011
Articles
Computer science
45.
Behavior Profiling of Email
Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei
2003
Articles
Computer science
46.
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore
2010
Articles
Computer science
47.
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore
2010
Reports
Computer science
48.
Brave New World: Pervasive Insecurity of Embedded Network Devices
Cui, Ang; Song, Yingbo; Prabhu, Pratap; Stolfo, Salvatore
2009
Articles
Computer science
Routers (Computer networks)
Webcams
49.
Citizen's Attitudes about Privacy While Accessing Government Websites: Results of an Online Study
Stolfo, Salvatore; Johnson, Eric J.; Pavlicic, Tomislav; Jan, Stephen
2003
Articles
Computer science
50.
CLKscrew: Exposing the Perils of Security-Oblivious Energy Management, Usenix 2018 (Distinguished Paper Award)
Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore
2018
Conference Objects
Computer science
Computer networks
Computer security
Energy consumption
« Previous
Next »
1
2
3
4
Academic Commons provides global access to research and scholarship produced at
Columbia University
,
Barnard College
,
Teachers College
,
Union Theological Seminary
and
Jewish Theological Seminary
. Academic Commons is managed by the
Columbia University Libraries
.