1. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
2. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
3. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
4. Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks Cretu, Gabriela F.; Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer scienceAd hoc networks (Computer networks)Intrusion detection systems (Computer security)Anomaly detection (Computer security)
5. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer science
6. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Reports Computer science
7. Anomalous Payload-Based Worm Detection and Signature Generation Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore 2005 Articles Computer science
8. Fileprints: Identifying File Types by n-gram Analysis Li, Wei-Jen; Wang, Ke; Stolfo, Salvatore; Herzog, Benjamin 2005 Articles Computer science
9. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
10. Anomalous Payload-Based Network Intrusion Detection Wang, Ke; Stolfo, Salvatore 2004 Articles Computer science