301. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project Stolfo, Salvatore; Fan, Wei; Lee, Wenke; Prodromidis, Andreas L.; Chan, Philip K. 2000 Articles Computer science
302. Conversion Functions for Symmetric Key Ciphers Cook, Debra L.; Keromytis, Angelos D. 2006 Articles Computer science
303. Conversion and Proxy Functions for Symmetric Key Ciphers Cook, Debra L.; Keromytis, Angelos D. 2005 Articles Computer science
304. Controlling High Bandwidth Aggregates in the Network Mahajan, Ratul; Bellovin, Steven Michael; Floyd, Sally; Ioannidis, John; Paxson, Vern; Shenker, Scott 2002 Articles Computer science
305. Constructionist Design Methodology for Interactive Intelligences Maskey, Sameer R.; Thorisson, Kristinn R.; Benko, Hrvoje; Abramov, Denis; Arnold, Andrew; Vaseekaran, Aruchunan 2004 Articles Information technologyComputer science
306. Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2008 Articles Computer science
307. Constraint-based sensor planning for scene modeling Reed, Michael K.; Allen, Peter K. 2000 Articles Computer science
308. Configuration Management and Security Bellovin, Steven Michael; Bush, Randy 2009 Articles Computer science
309. Concurrency Attacks Yang, Junfeng; Cui, Ang; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2012 Articles Computer science
310. Concurrency and Communication: Lessons from the SHIM Project Edwards, Stephen A. 2009 Articles Computer science
311. Computing robust viewpoints with multi-constraints using tree annealing Yao, Yulin; Allen, Peter K. 1995 Articles Computer science
312. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
314. Computation vs. Memory Systems: Pinning Down Accelerator Bottlenecks Kim, Martha Allen; Edwards, Stephen A. 2010 Articles Computer science
315. Computational Complexity of Iterative Processes Traub, Joseph F. 1972 Articles Iterative methods (Mathematics)MathematicsComputational complexityComputer science
316. Compositional Dataflow Circuits Edwards, Stephen A.; Townsend, Richard Morse; Barker, Martha Massee; Kim, Martha Allen 2019 Articles Data flow computingComputer networksBuffer storage (Computer science)Computer science
318. Compiling Esterel into Static Discrete-Event Code Edwards, Stephen A.; Kapadia, Vimal; Halas, Michael 2004 Articles Computer science
319. Compile-Time Analysis and Specialization of Clocks in Concurrent Programs Vasudevan, Nalini; Tardieu, Olivier; Dolby, Julian; Edwards, Stephen A. 2009 Articles Computer science
320. Combining corpus and machine-readable dictionary data for building bilingual lexicons Klavans, Judith L.; Tzoukermann, Evelyne 1995 Articles Computer scienceInformation technology
321. Combining Behavior Models to Secure Email Systems Stolfo, Salvatore; Hu, Chia-wei; Li, Wei-Jen; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier 2003 Articles Computer science
322. Columbia digital news project: an environment for briefing and search over multimedia information Aho, Alfred V.; Chang, Shih-Fu; McKeown, Kathleen; Radev, Dragomir R.; Smith, John R.; Zaman, Kazi A. 1998 Articles Computer science
323. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science
324. Code Generation in the Columbia Esterel Compiler Edwards, Stephen A.; Zeng, Jia 2007 Articles Computer science
325. CODACT: Towards Identifying Orthographic Variants in Dialectal Arabic Dasigi, Pradeep; Diab, Mona 2011 Articles Computer science
326. Citizen's Attitudes about Privacy While Accessing Government Websites: Results of an Online Study Stolfo, Salvatore; Johnson, Eric J.; Pavlicic, Tomislav; Jan, Stephen 2003 Articles Computer science
327. Characterizing Self-healing Software Systems Keromytis, Angelos D. 2007 Articles Computer science
328. Challenges in Synthesizing Fast Control-Dominated Circuits Soviani, Cristian; Edwards, Stephen A. 2005 Articles Computer science
329. Celling SHIM: Compiling Deterministic Concurrency to a Heterogeneous Multicore Vasudevan, Nalini; Edwards, Stephen A. 2009 Articles Computer science
330. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism
331. Capturing Information Flow with Concatenated Dynamic Taint Analysis Kim, Hyung Chan; Keromytis, Angelos D.; Covington, Michael; Sahita, Ravi 2009 Articles Computer science
332. CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap Locasto, Michael E.; Keromytis, Angelos D. 2004 Articles Computer science
333. CAD model acquisition using BSP trees Reed, Michael K.; Allen, Peter K.; Abrams, Steven 1995 Articles Computer science
334. Cache Impacts of Datatype Acceleration Wu, Lisa K.; Kim, Martha Allen; Edwards, Stephen A. 2011 Articles Computer science
335. Building a Secure Web Browser Ioannidis, Sotiris; Bellovin, Steven Michael 2001 Articles Computer science
336. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2005 Articles Computer science
337. Buffer Sharing in Rendezvous Programs Vasudevan, Nalini; Edwards, Stephen A. 2010 Articles Computer science
338. Buffer Sharing in CSP-like Programs Vasudevan, Nalini; Edwards, Stephen A. 2009 Articles Computer science
339. Bridging the Network Reservation Gap Using Overlays Stavrou, Angelos; Turner, David; Keromytis, Angelos D.; Prevelakis, Vassilis 2007 Articles Computer science
340. Brave New World: Pervasive Insecurity of Embedded Network Devices Cui, Ang; Song, Yingbo; Prabhu, Pratap; Stolfo, Salvatore 2009 Articles Computer scienceRouters (Computer networks)Webcams
341. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
342. Behavior Profiling of Email Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
343. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D. 2009 Articles Computer science
344. Behavior-Based Network Traffic Synthesis Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Articles Computer science
345. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
346. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
347. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
348. Band-aid Patching Sidiroglou, Stelios; Ioannidis, Sotiris; Keromytis, Angelos D. 2007 Articles Computer science
349. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
350. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
351. Automating the generation of coordinated multimedia explanations McKeown, Kathleen; Feiner, Steven 1991 Articles Computer science
352. Automatic registration of 2-D with 3-D imagery in urban environments Stamos, Ioannis; Allen, Peter K. 2001 Articles Computer science
353. Automatically Identifying Gene/Protein Terms in MEDLINE Abstracts Yu, Hong; Hatzivassiloglou, Vasileios; Rzhetsky, Andrey; Wilbur, W John 2003 Articles Computer scienceInformation technology
354. Automated model acquisition from range images with view planning Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
355. Automated Intrusion Detection Methods Using NFR Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore 1999 Articles Computer science
356. Authentication on Untrusted Remote Hosts with Public-key Sudo Burnside, Matthew Spindel; Lu, Mack; Keromytis, Angelos D. 2008 Articles Computer science
357. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
359. A Technical Word- and Term-Translation Aid Using Noisy Parallel Corpora across Language Groups Fung, Pascale; McKeown, Kathleen 1997 Articles Computer scienceInformation technology
360. Asynchronous Policy Evaluation and Enforcement Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
361. Asymptotic behavior of vector recurrences with applications Feldstein, Alan; Traub, Joseph F. 1977 Articles Computer scienceVector analysis--Computer programsRecursive programmingIterative methods (Mathematics)Differential equations, Nonlinear--Asymptotic theory
362. A Survey of Voice Over IP Security Research Keromytis, Angelos D. 2009 Articles Computer science
363. A Study of the Relative Costs of Network Security Protocols Miltchev, Stefan; Ioannidis, Sotiris; Keromytis, Angelos D. 2002 Articles Computer science
364. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
365. ASSURE: Automatic Software Self-healing Using Rescue Points Sidiroglou, Stelios; Laadan, Oren; Perez, Carlos R.; Viennot, Nicolas; Nieh, Jason; Keromytis, Angelos D. 2009 Articles Computer science
366. A Secure PLAN (Extended Version) Hicks, Michael; Keromytis, Angelos D.; Smith, Jonathan M. 2002 Articles Computer science
367. A Secure PLAN Hicks, Michael W.; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
369. A Secure Active Network Environment Architecture: Realization in SwitchWare Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
370. A Repeater Encryption Unit for IPv4 and IPv6 Nagashima, Norimitsu; Keromytis, Angelos D. 2005 Articles Computer science
371. Arachne: Integrated Enterprise Security Management Burnside, Matthew Spindel; Keromytis, Angelos D. 2007 Articles Computer science
372. A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Cui, Ang; Stolfo, Salvatore 2010 Articles Computer science
373. A Programmable Plaintext Recognizer Wagner, David A.; Bellovin, Steven Michael 1994 Articles Computer science
374. A Processor Extension for Cycle-Accurate Real-Time Software Ip, Nicholas Jun Hao; Edwards, Stephen A. 2006 Articles Computer science
375. Approximate Reachability for Dead Code Elimination in Esterel* Tardieu, Olivier; Edwards, Stephen A. 2005 Articles Computer science
376. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
377. APOD: Anonymous Physical Object Delivery Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
378. A Pay-per-Use DoS Protection Mechanism For the Web Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2004 Articles Computer science
379. A novel analysis space for pointer analysis and its application for bug finding Buss, Marcio; Brand, Daniel; Sreedhar, Vugranam; Edwards, Stephen A. 2009 Articles Computer science
380. Anonymity in Wireless Broadcast Networks Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.; Malkin, Tal G.; Rubin, Avi 2009 Articles Computer science
381. Anomaly Detection over Noisy Data Using Learned Probability Distributions Eskin, Eleazar 2000 Articles Computer science
382. Anomalous Payload-Based Worm Detection and Signature Generation Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore 2005 Articles Computer science
383. Anomalous Payload-Based Network Intrusion Detection Wang, Ke; Stolfo, Salvatore 2004 Articles Computer science
384. A Network Worm Vaccine Architecture Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Articles Computer science
385. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
386. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
387. An Efficient Algorithm for the Analysis of Cyclic Circuits Neiroukh, Osama; Edwards, Stephen A.; Song, Xiaoyu 2006 Articles Computer science
388. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
389. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
390. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
391. Analysis of strain and regional variation in gene expression in mouse brain Pavlidis, Paul; Noble, William 2001 Articles Analysis of varianceGene expression--ResearchDNA microarrays--Data processingGeneticsNeurosciencesComputer science
392. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
393. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
394. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
395. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
396. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
397. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
398. A Look Back at "Security Problems in the TCP/IP Protocol Suite" Bellovin, Steven Michael 2004 Articles Computer science
400. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science