1. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
2. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
3. Empirical Measurement of Defense in Depth Boggs, Nathaniel 2015 Theses Firewalls (Computer security)Virus inhibitorsIntrusion detection systems (Computer security)Computer securityComputer science
4. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
5. Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks Cretu, Gabriela F.; Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer scienceAd hoc networks (Computer networks)Intrusion detection systems (Computer security)Anomaly detection (Computer security)
6. Learning Patterns from Unix Process Execution Traces for Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K. 1997 Articles Computer scienceMachine learningIntrusion detection systems (Computer security)
7. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
8. The Security Flag in the IPv4 Header Bellovin, Steven Michael 2003 Reports Computer scienceIntrusion detection systems (Computer security)Internet communicationInternet--Safety measures