301. Experience with the KeyNote Trust Management System: Applications and Future Directions Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2003 Articles Computer science
302. Extracting Synonymous Gene and Protein Terms From Biological Literature Yu, Hong; Agichtein, Eugene 2003 Articles Computer scienceInformation technology
304. Managing Access Control in Large Scale Heterogeneous Networks Keromytis, Angelos D.; Anagnostakis, Kostas G.; Ioannidis, Sotiris; Greenwald, Michael; Smith, Jonathan M. 2003 Articles Computer science
305. New methods for digital modeling of historic sites Allen, Peter K.; Troccoli, Alejandro; Smith, Benjamin; Murray, Stephen D.; Stamos, Ioannis; Leordeanu, Marius 2003 Articles Computer science
306. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses Heller, Katherine; Svore, Krysta; Keromytis, Angelos D.; Stolfo, Salvatore 2003 Articles Computer science
307. One-Class Training for Masquerade Detection Wang, Ke; Stolfo, Salvatore 2003 Articles Computer science
308. Porting a Network Cryptographic Service to the RMC2000: A Case Study in Embedded Software Development Jan, Stephen; de Dios, Paolo; Edwards, Stephen A. 2003 Articles Computer science
309. Secure and Flexible Global File Sharing Miltchev, Stefan; Prevelakis, Vassilis; Ioannidis, Sotiris; Ioannidis, John; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
310. SOS: An Architecture for Mitigating DDoS Attacks Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
311. Surveillance Detection in High Bandwidth Environments Robertson, Seth; Siegel, Eric V.; Miller, Matt; Stolfo, Salvatore 2003 Articles Computer science
312. Tagging Data In The Network Stack: mbuf tags Keromytis, Angelos D. 2003 Articles Computer science
313. TAPI: Transactions for Accessing Public Infrastructure Blaze, Matt; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Nikander, Pekka; Prevelakis, Vassilis 2003 Articles Computer science
314. The Design of the OpenBSD Cryptographic Framework Keromytis, Angelos D.; Wright, Jason L.; Raadt, Theo de 2003 Articles Computer science
315. The Semantics and Execution of a Synchronous Block-Diagram Language Edwards, Stephen A.; Lee, Edward A. 2003 Articles Computer science
316. The STRONGMAN Architecture Keromytis, Angelos D.; Ioannidis, Sotiris; Greenwald, Michael B.; Smith, Jonathan M. 2003 Articles Computer science
317. The Synchronous Languages 12 Years Later Edwards, Stephen A.; Albert, Benveniste; Caspi, Paul; Halbwachs, Nicolas; Le Guernic, Paul; De Simone, Robert 2003 Articles Computer science
318. Tutorial: Compiling Concurrent Languages for Sequential Processors Edwards, Stephen A. 2003 Articles Computer science
319. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
320. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
321. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
322. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
323. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
324. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore 2002 Articles Computer science
325. A Secure PLAN (Extended Version) Hicks, Michael; Keromytis, Angelos D.; Smith, Jonathan M. 2002 Articles Computer science
326. A Study of the Relative Costs of Network Security Protocols Miltchev, Stefan; Ioannidis, Sotiris; Keromytis, Angelos D. 2002 Articles Computer science
328. Controlling High Bandwidth Aggregates in the Network Mahajan, Ratul; Bellovin, Steven Michael; Floyd, Sally; Ioannidis, John; Paxson, Vern; Shenker, Scott 2002 Articles Computer science
329. Designing an Embedded Firewall/VPN Gateway Prevelakis, Vassilis; Keromytis, Angelos D. 2002 Articles Computer science
330. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses Apap, Frank; Honig, Andrew; Hershkop, Shlomo; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
331. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2002 Articles Computer science
332. Fileteller: Paying and Getting Paid for File Storage Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Prevelakis, Vassilis 2002 Articles Computer science
333. Implementing Pushback: Router-Based Defense Against DDoS Attacks Ioannidis, John; Bellovin, Steven Michael 2002 Articles Computer science
334. Inferring Strategies for Sentence Ordering in Multidocument News Summarization McKeown, Kathleen; Barzilay, Regina; Elhadad, Noemie 2002 Articles Computer science
335. Is There a Curse of Dimensionality for Contraction Fixed Points in the Worst Case? Rust, John; Traub, Joseph F.; Wozniakowski, Henryk 2002 Articles Computer science
336. MET: An Experimental System for Malicious Email Tracking Bhattacharyya, Manasi; Hershkop, Shlomo; Eskin, Eleazar 2002 Articles Computer science
337. Secure Overlay Services Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
338. Sentence Fusion for Multidocument News Summarization Barzilay, Regina; McKeown, Kathleen; Elhadad, Noemie 2002 Articles Computer science
339. Sub-Operating Systems: A New Approach to Application Security Ioannidis, Sotiris; Bellovin, Steven Michael; Smith, Jonathan M. 2002 Articles Computer science
340. Trust Management for IPsec Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
341. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
342. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
343. Analysis of strain and regional variation in gene expression in mouse brain Pavlidis, Paul; Noble, William 2001 Articles Analysis of varianceGene expression--ResearchDNA microarrays--Data processingGeneticsNeurosciencesComputer science
344. Automatic registration of 2-D with 3-D imagery in urban environments Stamos, Ioannis; Allen, Peter K. 2001 Articles Computer science
345. Building a Secure Web Browser Ioannidis, Sotiris; Bellovin, Steven Michael 2001 Articles Computer science
347. Cryptographic Modes of Operation for the Internet Bellovin, Steven Michael; Blaze, Matt 2001 Articles Computer science
348. Data Mining Methods for Detection of New Malicious Executables Schultz, Matthew G.; Eskin, Eleazar; Zadok, Erez; Stolfo, Salvatore 2001 Articles Computer science
349. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Ioannidis, John; Canetti, Ran; Keromytis, Angelos D.; Reingold, Omer 2001 Articles Computer science
350. Generation and Evaluation of Intraoperative Inferences for Automated Health Care Briefings on Patient Status After Bypass Surgery McKeown, Kathleen; Jordan, Desmond; Concepcion, Kristian; Feiner, Steven; Hatzivassiloglou, Vasileios 2001 Articles Computer scienceBioinformatics
351. MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables Schultz, Matthew G.; Eskin, Eleazar; Zadok, Erez; Bhattacharyya, Manasi; Stolfo, Salvatore 2001 Articles Computer science
352. Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eskin, Eleazar; Lee, Wenke; Stolfo, Salvatore 2001 Articles Computer science
353. Offline Micropayments without Trusted Hardware Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2001 Articles Computer science
354. Real Time Data Mining-based Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K.; Eskin, Eleazar; Fan, Wei; Miller, Matthew; Hershkop, Shlomo; Zhang, Junxin 2001 Articles Computer science
355. The Price of Safety in an Active Network Alexander, D. Scott; Menage, Paul B.; Keromytis, Angelos D.; Arbaugh, William A.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2001 Articles Computer science
356. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host Gleitz, Peter M.; Bellovin, Steven Michael 2001 Articles Computer science
357. 3-D model construction using range and image data Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
358. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
359. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
360. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
361. Anomaly Detection over Noisy Data Using Learned Probability Distributions Eskin, Eleazar 2000 Articles Computer science
362. Constraint-based sensor planning for scene modeling Reed, Michael K.; Allen, Peter K. 2000 Articles Computer science
363. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project Stolfo, Salvatore; Fan, Wei; Lee, Wenke; Prodromidis, Andreas L.; Chan, Philip K. 2000 Articles Computer science
364. Implementing a Distributed Firewall Ioannidis, Sotiris; Keromytis, Angelos D.; Bellovin, Steven Michael; Smith, Jonathan M. 2000 Articles Computer scienceFirewalls (Computer security)IPSec (Computer network protocol)Computer networks--Security measuresOpenBSD (Electronic resource)
365. Integration of range and image sensing for photorealistic 3D modeling Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
366. Joint-coupled compensation effects in visually servoed tracking Oh, Paul Y.; Allen, Peter K. 2000 Articles Computer science
367. Learning Methods to Combine Linguistic Indicators: Improving Aspectual Classification and Revealing Linguistic Insights McKeown, Kathleen; Siegel, Eric V. 2000 Articles Computer science
368. Prosody Modelling in Concept-to-Speech Generation: Methodological Issues McKeown, Kathleen; Pan, Shimei 2000 Articles Computer science
369. Scalable Resource Control in Active Networks Anagnostakis, Kostas G.; Hicks, Michael W.; Ioannidis, Sotiris; Keromytis, Angelos D.; Smith, Jonathan M. 2000 Articles Computer science
370. Secure Quality of Service Handling: SQoSH Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Muir, Steve; Smith, Jonathan M. 2000 Articles Computer science
371. Semi-automated Color Segmentation of Anatomical Tissue Imielinska, Celina Z.; Downes, M. S.; Yuan, W. 2000 Articles Diagnostic imagingBioinformaticsComputer science
372. Text-based approaches for non-topical image categorization Sable, Carl L.; Hatzivassiloglou, Vasileios 2000 Articles Computer scienceInformation technology
373. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
375. A Continuous Model of Computation Traub, Joseph F. 1999 Articles Computer scienceTuring machinesPhysicsComputational complexity
376. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
378. Automated Intrusion Detection Methods Using NFR Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore 1999 Articles Computer science
380. Mining in a Data-flow Environment: Experience in Network Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
381. Moat: A Virtual Private Network Appliance and Services Platform Denker, John S.; Bellovin, Steven Michael; Daniel, Hugh; Mintz, Nancy L.; Killian, Tom; Plotnick, Mark A. 1999 Articles Computer science
382. A Secure Active Network Environment Architecture: Realization in SwitchWare Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
383. Columbia digital news project: an environment for briefing and search over multimedia information Aho, Alfred V.; Chang, Shih-Fu; McKeown, Kathleen; Radev, Dragomir R.; Smith, John R.; Zaman, Kazi A. 1998 Articles Computer science
384. Critical Infrastructures You Can Trust: Where Telecommunications Fits Schneider, Fred B.; Bellovin, Steven Michael; Inouye, Alan S. 1998 Articles Computer science
386. Data Mining Approaches for Intrusion Detection Lee, Wenke; Stolfo, Salvatore 1998 Articles Computer science
387. Generating natural language summaries from multiple on-line sources McKeown, Kathleen; Radev, Dragomir R. 1998 Articles Computer science
388. Interactive sensor planning Stamos, Ioannis; Allen, Peter K. 1998 Articles Computer scienceCity planning
389. KeyNote: Trust Management for Public-Key Infrastructures Blaze, Matt; Feigenbaum, Joan; Keromytis, Angelos D. 1998 Articles Computer science
390. Mining Audit Data to Build Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1998 Articles Computer science
391. Registering, integrating, and building CAD models from range data Yang, Ruigang; Allen, Peter K. 1998 Articles Computer science
392. Safety and Security of Programmable Network Infrastructures Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
393. The SwitchWare Active Network Architecture Alexander, D. Scott; Arbaugh, William A.; Hicks, Michael W.; Kakkar, Pankaj; Keromytis, Angelos D.; Moore, Jonathan T.; Gunter, Carl A.; Nettles, Scott M.; Smith, Jonathan M. 1998 Articles Computer science
394. 3-D modeling from range imagery: an incremental method with a planning component Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
395. A Technical Word- and Term-Translation Aid Using Noisy Parallel Corpora across Language Groups Fung, Pascale; McKeown, Kathleen 1997 Articles Computer scienceInformation technology
396. Automated model acquisition from range images with view planning Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
397. Floating constraints in lexical choice McKeown, Kathleen; Elhadad, Michael; Robin, Jacques 1997 Articles Computer science
398. Implementing IPsec Keromytis, Angelos D.; Ioannidis, John; Smith, Jonathan M. 1997 Articles Computer science
399. Learning Patterns from Unix Process Execution Traces for Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K. 1997 Articles Computer scienceMachine learningIntrusion detection systems (Computer security)
400. Probable Plaintext Cryptanalysis of the IP Security Protocols Bellovin, Steven Michael 1997 Articles Computer science