1. 3-D model construction using range and image data Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
2. 3-D modeling from range imagery: an incremental method with a planning component Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
3. 3D modeling of historic sites using range and image data Allen, Peter K.; Stamos, Ioannis; Troccoli, Alejandro; Smith, Benjamin; Leordeanu, Marius; Hsu, Y. C. 2003 Articles Computer scienceArchitecture
4. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
5. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
7. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
8. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
9. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
10. A Class of Globally Convergent Iterations for the Solution of Polynomial Equations Traub, Joseph F. 1966 Articles Iterative methods (Mathematics)Polynomials--Study and teachingComputer science
11. A Clean-Slate Design for the Next-Generation Secure Internet Bellovin, Steven Michael; Clark, David D.; Perrig, Adrian; Song, Dawn 2006 Articles Computer science
12. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
13. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
14. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
15. A Continuous Model of Computation Traub, Joseph F. 1999 Articles Computer scienceTuring machinesPhysicsComputational complexity
16. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
17. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
18. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
19. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
20. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
21. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
22. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
23. Addressing the Insider Threat Pfleeger, Shari Lawrence; Stolfo, Salvatore 2009 Articles Computer science
24. A Deterministic Multi-Way Rendezvous Library for Haskell Vasudevan, Nalini; Singh, Satnam; Edwards, Stephen A. 2008 Articles Computer science
26. A Disruptive Computer Design Idea: Architectures with Repeatable Timing Edwards, Stephen A.; Kim, Sungjun; Lee, Edward A.; Liu, Isaac; Patel, Hiren D.; Schoeberl, Martin 2009 Articles Computer science
27. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
28. A Domain-Specific Language for Generating Dataflow Analyzers Zheng, Jia; Mitchell, Chuck; Edwards, Stephen A. 2006 Articles Computer science
29. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
30. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
31. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore 2002 Articles Computer science
32. Aggregated Word Pair Features for Implicit Discourse Relation Disambiguation Biran, Or; McKeown, Kathleen 2013 Articles Computer scienceLinguistics
33. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science
34. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
36. A Look Back at "Security Problems in the TCP/IP Protocol Suite" Bellovin, Steven Michael 2004 Articles Computer science
37. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
38. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
39. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
40. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
41. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
42. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
43. Analysis of strain and regional variation in gene expression in mouse brain Pavlidis, Paul; Noble, William 2001 Articles Analysis of varianceGene expression--ResearchDNA microarrays--Data processingGeneticsNeurosciencesComputer science
44. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
45. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
46. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
47. An Efficient Algorithm for the Analysis of Cyclic Circuits Neiroukh, Osama; Edwards, Stephen A.; Song, Xiaoyu 2006 Articles Computer science
48. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
49. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
50. A Network Worm Vaccine Architecture Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Articles Computer science
51. Anomalous Payload-Based Network Intrusion Detection Wang, Ke; Stolfo, Salvatore 2004 Articles Computer science
52. Anomalous Payload-Based Worm Detection and Signature Generation Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore 2005 Articles Computer science
53. Anomaly Detection over Noisy Data Using Learned Probability Distributions Eskin, Eleazar 2000 Articles Computer science
54. Anonymity in Wireless Broadcast Networks Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.; Malkin, Tal G.; Rubin, Avi 2009 Articles Computer science
55. A novel analysis space for pointer analysis and its application for bug finding Buss, Marcio; Brand, Daniel; Sreedhar, Vugranam; Edwards, Stephen A. 2009 Articles Computer science
56. A Pay-per-Use DoS Protection Mechanism For the Web Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2004 Articles Computer science
57. APOD: Anonymous Physical Object Delivery Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
58. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
59. Approximate Reachability for Dead Code Elimination in Esterel* Tardieu, Olivier; Edwards, Stephen A. 2005 Articles Computer science
60. A Processor Extension for Cycle-Accurate Real-Time Software Ip, Nicholas Jun Hao; Edwards, Stephen A. 2006 Articles Computer science
61. A Programmable Plaintext Recognizer Wagner, David A.; Bellovin, Steven Michael 1994 Articles Computer science
62. A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Cui, Ang; Stolfo, Salvatore 2010 Articles Computer science
63. Arachne: Integrated Enterprise Security Management Burnside, Matthew Spindel; Keromytis, Angelos D. 2007 Articles Computer science
64. A Repeater Encryption Unit for IPv4 and IPv6 Nagashima, Norimitsu; Keromytis, Angelos D. 2005 Articles Computer science
65. A Secure Active Network Environment Architecture: Realization in SwitchWare Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
66. A Secure PLAN Hicks, Michael W.; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
68. A Secure PLAN (Extended Version) Hicks, Michael; Keromytis, Angelos D.; Smith, Jonathan M. 2002 Articles Computer science
69. ASSURE: Automatic Software Self-healing Using Rescue Points Sidiroglou, Stelios; Laadan, Oren; Perez, Carlos R.; Viennot, Nicolas; Nieh, Jason; Keromytis, Angelos D. 2009 Articles Computer science
70. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
71. A Study of the Relative Costs of Network Security Protocols Miltchev, Stefan; Ioannidis, Sotiris; Keromytis, Angelos D. 2002 Articles Computer science
73. Asymptotic behavior of vector recurrences with applications Feldstein, Alan; Traub, Joseph F. 1977 Articles Computer scienceVector analysis--Computer programsRecursive programmingIterative methods (Mathematics)Differential equations, Nonlinear--Asymptotic theory
74. Asynchronous Policy Evaluation and Enforcement Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
75. A Technical Word- and Term-Translation Aid Using Noisy Parallel Corpora across Language Groups Fung, Pascale; McKeown, Kathleen 1997 Articles Computer scienceInformation technology
77. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
78. Authentication on Untrusted Remote Hosts with Public-key Sudo Burnside, Matthew Spindel; Lu, Mack; Keromytis, Angelos D. 2008 Articles Computer science
79. Automated Intrusion Detection Methods Using NFR Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore 1999 Articles Computer science
80. Automated model acquisition from range images with view planning Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
81. Automatically Identifying Gene/Protein Terms in MEDLINE Abstracts Yu, Hong; Hatzivassiloglou, Vasileios; Rzhetsky, Andrey; Wilbur, W John 2003 Articles Computer scienceInformation technology
82. Automatic registration of 2-D with 3-D imagery in urban environments Stamos, Ioannis; Allen, Peter K. 2001 Articles Computer science
83. Automating the generation of coordinated multimedia explanations McKeown, Kathleen; Feiner, Steven 1991 Articles Computer science
84. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
85. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
86. Band-aid Patching Sidiroglou, Stelios; Ioannidis, Sotiris; Keromytis, Angelos D. 2007 Articles Computer science
87. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
88. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
89. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
90. Behavior-Based Network Traffic Synthesis Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Articles Computer science
91. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D. 2009 Articles Computer science
92. Behavior Profiling of Email Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
93. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
94. Brave New World: Pervasive Insecurity of Embedded Network Devices Cui, Ang; Song, Yingbo; Prabhu, Pratap; Stolfo, Salvatore 2009 Articles Computer scienceRouters (Computer networks)Webcams
95. Bridging the Network Reservation Gap Using Overlays Stavrou, Angelos; Turner, David; Keromytis, Angelos D.; Prevelakis, Vassilis 2007 Articles Computer science
96. Buffer Sharing in CSP-like Programs Vasudevan, Nalini; Edwards, Stephen A. 2009 Articles Computer science
97. Buffer Sharing in Rendezvous Programs Vasudevan, Nalini; Edwards, Stephen A. 2010 Articles Computer science
98. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2005 Articles Computer science
99. Building a Secure Web Browser Ioannidis, Sotiris; Bellovin, Steven Michael 2001 Articles Computer science
100. Cache Impacts of Datatype Acceleration Wu, Lisa K.; Kim, Martha Allen; Edwards, Stephen A. 2011 Articles Computer science