Skip to main content
Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Stolfo, Salvatore
12
Wang, Ke
[remove]
12
Hershkop, Shlomo
4
Hu, Chia-wei
4
Nimeskern, Olivier
4
more
Author
»
Academic Unit
Computer Science
12
Subject
Computer science
12
Anomaly detection (Computer security)
2
Intrusion detection systems (Computer security)
2
Ad hoc networks (Computer networks)
1
Computer security
1
more
Subject
»
Type
Articles
[remove]
12
Date Published
Date Published range begin
–
Date Published range end
Current results range from
2003
to
2006
View distribution
Language
English
12
Search Constraints
Start Over
You searched for:
Author
Wang, Ke
Remove constraint Author: Wang, Ke
Type
Articles
Remove constraint Type: Articles
1
-
12
of
12
Sort by Best Match
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
100 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore
2006
Articles
Computer science
2.
Behavior-Based Modeling and Its Application to Email Analysis
Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke
2006
Articles
Computer science
Computer security
Computer viruses
Anomaly detection (Computer security)
3.
Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
Cretu, Gabriela F.; Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore
2006
Articles
Computer science
Ad hoc networks (Computer networks)
Intrusion detection systems (Computer security)
Anomaly detection (Computer security)
4.
Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection
Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore
2006
Articles
Computer science
5.
Anomalous Payload-Based Worm Detection and Signature Generation
Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore
2005
Articles
Computer science
6.
Fileprints: Identifying File Types by n-gram Analysis
Li, Wei-Jen; Wang, Ke; Stolfo, Salvatore; Herzog, Benjamin
2005
Articles
Computer science
7.
FLIPS: Hybrid Adaptive Intrusion Prevention
Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore
2005
Articles
Computer science
Intrusion detection systems (Computer security)
8.
Anomalous Payload-Based Network Intrusion Detection
Wang, Ke; Stolfo, Salvatore
2004
Articles
Computer science
9.
A Behavior-Based Approach To Securing Email Systems
Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei
2003
Articles
Computer science
10.
Behavior Profiling of Email
Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei
2003
Articles
Computer science
11.
Combining Behavior Models to Secure Email Systems
Stolfo, Salvatore; Hu, Chia-wei; Li, Wei-Jen; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier
2003
Articles
Computer science
12.
One-Class Training for Masquerade Detection
Wang, Ke; Stolfo, Salvatore
2003
Articles
Computer science