1. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
2. A Genre-based Clustering Approach to Content Extraction Gupta, Suhit; Becker, Hila; Kaiser, Gail E.; Stolfo, Salvatore 2005 Reports Computer science
3. Agent-Based Distributed Learning Applied to Fraud Detection Prodromidis, Andreas L.; Stolfo, Salvatore 1999 Reports Computer scienceCredit card fraudLaw enforcement--Technological innovationsAlgorithmsMachine learning
4. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
5. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
6. A Note on Implementing OPS5 Production Systems on DADO Stolfo, Salvatore 1984 Reports Computer science
7. An Overview of the DADO Parallel Computer Lerner, Mark D.; Maguire, Gerald Q.; Stolfo, Salvatore 1984 Reports Computer science
8. Approximate String Matching on the DADO2 Parallel Computer Mori, Toshikatsu; Stolfo, Salvatore 1988 Reports Computer science
9. Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence Stolfo, Salvatore; Miranker, Daniel P.; Shaw, David Elliot 1983 Reports Computer scienceParallel computersArtificial intelligence
10. Are maintenance expert systems practical now? Waldes, Peter; Lustgarten, Janet; Stolfo, Salvatore 1985 Reports Computer science
11. A simple preprocessing scheme to extract and balance implicit parallelism in the concurrent match of production rules Stolfo, Salvatore; Miranker, Daniel P.; Mills, Russell C. 1985 Reports Computer science
12. A Simple Scheme for a Fault Tolerant DADO Machine Stolfo, Salvatore 1985 Reports Computer scienceArtificial intelligence
13. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
14. Automated Social Hierarchy Detection through Email Network Analysis Rowe, Ryan; Creamer, German; Hershkop, Shlomo; Stolfo, Salvatore 2007 Reports Computer science
15. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
16. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
17. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
18. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science
19. Collaborative Distributed Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal 2004 Reports Computer science
20. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
21. Concurrency Attacks Yang, Junfeng; Cui, Ang; Gallagher, John Martin; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2011 Reports Computer science
22. DADO: A Parallel Computer for Artificial Intelligence Stolfo, Salvatore 1985 Reports Computer scienceArtificial intelligence
23. DADO: A Parallel Processor for Expert Systems Stolfo, Salvatore; Miranker, Daniel P. 1984 Reports Computer science
24. DADO: A Tree-Structured Machine Architecture for Production Systems Stolfo, Salvatore; Shaw, David Elliot 1982 Reports Computer science
25. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
26. Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Articles Computer science
27. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
28. Distributed Data Mining: The JAM system architecture Prodromidis, Andreas L.; Stolfo, Salvatore; Tselepis, Shelley; Truta, Terrance; Sherwin, Jeffrey; Kalina, David 2001 Reports Computer science
29. Explanation and Acquisition in Expert Systems Using Support Knowledge Pasik, Alexander J.; Christensen, Jens; Gordin, Douglas; Stancato, Agata; Stolfo, Salvatore 1985 Reports Computer science
30. Extracting Context To Improve Accuracy For HTML Content Extraction Gupta, Suhit; Kaiser, Gail E.; Stolfo, Salvatore 2004 Reports Computer science
31. Five Parallel Algorithms for Production System Execution on the DADO Machine Stolfo, Salvatore 1984 Reports Computer science
32. Genre Classification of Websites Using Search Engine Snippets Gupta, Suhit; Kaiser, Gail E.; Stolfo, Salvatore; Becker, Hila 2005 Reports Computer science
33. Host-based Anomaly Detection Using Wrapping File Systems Hershkop, Shlomo; Bui, Linh H.; Ferst, Ryan; Stolfo, Salvatore 2004 Reports Computer science
34. Improving Production System Performance on Parallel Architectures by Creating Constrained Copies of Rules Pasik, Alexander J.; Stolfo, Salvatore 1987 Reports Computer science
35. Incremental Evaluation of Rules and its Relationship to Parallelism Wolfson, Ouri; Dewan, Hasanat; Stolfo, Salvatore; Yemini, Yechiam 1990 Reports Computer science
37. Learning Control of Production Systems Stolfo, Salvatore 1979 Reports Computer scienceArtificial intelligence
38. Learning Meta-Rule Control of Production Systems from Execution Traces Harrison, Malcolm C.; Stolfo, Salvatore 1980 Reports Computer scienceExecution traces (Computer program testing)Explicit memoryImplicit memory
39. Logic Programming Using Parallel Associative Operations Taylor, Stephen; Lowry, Andy; Maguire, Gerald Q.; Stolfo, Salvatore 1984 Reports Computer science
41. LPS Algorithms: A Critical Analysis Lowry, Andy; Taylor, Stephen; Stolfo, Salvatore 1984 Reports Computer science
42. LPS Algorithms: A Detailed Examination Lowry, Andy; Taylor, Stephen; Stolfo, Salvatore 1984 Reports Computer science
43. Markov Models for Network-Behavior Modeling and Anonymization Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Reports Computer science
44. Masquerade Attack Detection Using a Search-Behavior Modeling Approach Ben Salem, Malek; Stolfo, Salvatore 2009 Reports Computer science
45. Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems Salem, Malek Ben; Stolfo, Salvatore 2008 Reports Computer science
46. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
47. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2010 Reports Computer science
48. Modeling User Search-Behavior for Masquerade Detection Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore 2010 Reports Computer science
49. More Rules May Mean Faster Parallel Execution Stolfo, Salvatore; Miranker, Daniel P.; Mills, Russell C. 1985 Reports Computer science
50. On the Design of Parallel Production System Machines: What's in a LIP? Stolfo, Salvatore 1983 Reports Computer scienceArtificial intelligence