11. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
12. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
13. Masquerade Attack Detection Using a Search-Behavior Modeling Approach Ben Salem, Malek; Stolfo, Salvatore 2009 Reports Computer science
14. Self-monitoring Monitors Stolfo, Salvatore; Greenbaum, Isaac; Sethumadhavan, Lakshminarasimhan 2009 Reports Computer science
15. Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode Prabhu, Pratap; Song, Yingbo; Stolfo, Salvatore 2009 Reports Computer science
16. Thwarting Attacks in Malcode-Bearing Documents by Altering Data Sector Values Li, Wei-Jen; Stolfo, Salvatore 2009 Reports Computer science
17. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
18. Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems Salem, Malek Ben; Stolfo, Salvatore 2008 Reports Computer science
19. SPARSE: A Hybrid System to Detect Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore 2008 Reports Computer science
20. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Reports Computer science