1. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science
2. Measuring Drive-by Download Defense in Depth Boggs, Nathaniel Gordon; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
3. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Articles Computer science
4. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
5. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
6. Aggregated Word Pair Features for Implicit Discourse Relation Disambiguation Biran, Or; McKeown, Kathleen 2013 Articles Computer scienceLinguistics
7. A negative selection heuristic to predict new transcriptional targets Cerulo, Luigi; Paduano, Vincenzo; Zoppoli, Pietro; Ceccarelli, Michele 2013 Articles BioinformaticsComputer science
8. Metaseq: Privacy Preserving Meta-analysis of Sequencing-based Association Studies Singh, Angad Pal; Zafer, Samreen; Pe'er, Itsik 2013 Articles BioinformaticsGeneticsComputer science
9. Redundancy in electronic health record corpora: analysis, impact on text mining performance and mitigation strategies Cohen, Raphael; Elhadad, Michael; Elhadad, Noemie 2013 Articles BioinformaticsComputer science
10. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
11. Concurrency Attacks Yang, Junfeng; Cui, Ang; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2012 Articles Computer science
12. Detecting and Correcting Syntactic Errors in Machine Translation Using Feature-Based Lexicalized Tree Adjoining Grammars Ma, Wei-Yun; McKeown, Kathleen 2012 Articles Computer science
14. Efficient Point-to-Subspace Query in ℓ1 with Application to Robust Face Recognition Sun, Ju; Zhang, Yuqian; Wright, John N. 2012 Articles Computer scienceArtificial intelligence
15. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
16. Improved arabic-to-english statistical machine translation by reordering post-verbal subjects for word alignment Carpuat, Marine; Marton, Yuval; Habash, Nizar Y. 2012 Articles Computer science
17. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
18. Lost in Translation: Improving Decoy Documents via Automated Translation Voris, Jonathan A.; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2012 Articles Computer science
20. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
21. Software-based Decoy System for Insider Threats Park, Younghee; Stolfo, Salvatore 2012 Articles Computer science
22. Subgroup Detection in Ideological Discussions Abu-Jbara, Amjad; Dasigi, Pradeep; Diab, Mona; Radev, Dragomir R. 2012 Articles Computer scienceLinguistics
23. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
24. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
25. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
26. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
27. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
28. Behavior-Based Network Traffic Synthesis Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Articles Computer science
29. Cache Impacts of Datatype Acceleration Wu, Lisa K.; Kim, Martha Allen; Edwards, Stephen A. 2011 Articles Computer science
30. CODACT: Towards Identifying Orthographic Variants in Dialectal Arabic Dasigi, Pradeep; Diab, Mona 2011 Articles Computer science
31. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
32. Cross-domain Collaborative Anomaly Detection: So Far Yet So Close Boggs, Nathaniel Gordon; Hiremagalore, Sharath; Stavrou, Angelos; Stolfo, Salvatore 2011 Articles Computer science
33. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
34. Defending Embedded Systems with Software Symbiotes Cui, Ang; Stolfo, Salvatore 2011 Articles Computer science
35. Detecting Traffic Snooping in Tor Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science
36. From Prey to Hunter: Transforming Legacy Embedded Devices into Exploitation Sensor Grids Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
37. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
38. Identifying Justifications in Written Dialogs By Classifying Text as Argumentative Biran, Or; Rambow, Owen 2011 Articles Computer science
39. Information Status Distinctions and Referring Expressions: An Empirical Study of References to People in News Summaries Siddharthan, Advaith; Nenkova, Ani; McKeown, Kathleen 2011 Articles Computer science
40. Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
41. Measuring the Deployment Hiccups of DNSSEC Pappas, Vasileios; Keromytis, Angelos D. 2011 Articles Computer science
42. Measuring the Human Factor of Cyber Security Bowen, Brian M.; Devarajan, Ramaswamy; Stolfo, Salvatore 2011 Articles Computer science
43. Misuse Detection in Consent-based Networks Alicherry, Mansoor; Keromytis, Angelos D. 2011 Articles Computer science
44. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
45. Multiplexed Illumination for Scene Recovery in the Presence of Global Illumination Gu, Jinwei; Kobayashi, Toshihiro; Gupta, Mohit; Nayar, Shree K. 2011 Articles Computer science
46. On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
47. Policy Refinement of Network Services for MANETs Zhao, Hang; Lobo, Jorge; Roy, Arnab; Bellovin, Steven Michael 2011 Articles Computer science
48. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
49. Reflections on the Engineering and Operation of a Large-Scale Embedded Device Vulnerability Scanner Cui, Ang; Stolfo, Salvatore 2011 Articles Computer scienceInternet
50. Retrofitting Security in COTS Software with Binary Rewriting O'Sullivan, Pádraig; Anand, Kapil; Kotha, Aparna; Smithson, Matthew; Barua, Rajeev; Keromytis, Angelos D. 2011 Articles Computer science