Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Shlomo Hershkop
2010 – today
- 2013
[c13]Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo: System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models. IEEE Symposium on Security and Privacy Workshops 2013: 52-59
2000 – 2009
- 2009
[j4]Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo: Designing Host and Network Sensors to Mitigate the Insider Threat. IEEE Security & Privacy 7(6): 22-29 (2009)
[c12]Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo: Baiting Inside Attackers Using Decoy Documents. SecureComm 2009: 51-70- 2008
[p1]Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo: A Survey of Insider Attack Detection Research. Insider Attack and Cyber Security 2008: 69-90
[e1]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair (Eds.): Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6- 2007
[c11]Germán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo: Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. WebKDD/SNA-KDD 2007: 40-58- 2006
[j3]Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006)
[c10]Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop: A temporal based forensic analysis of electronic communication. DG.O 2006: 23-24- 2005
[j2]Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine A. Heller, Shlomo Hershkop, Andrew Honig, Krysta Marie Svore: A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. Journal of Computer Security 13(4): 659-693 (2005)
[c9]Salvatore J. Stolfo, Shlomo Hershkop: Email mining toolkit supporting law enforcement forensic analyses. DG.O 2005: 221-222
[c8]Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28
[c7]Shlomo Hershkop, Salvatore J. Stolfo: Combining email models for false positive reduction. KDD 2005: 98-107- 2004
[j1]Shlomo Hershkop, Salvatore J. Stolfo: Identifying spam without peeking at the contents. ACM Crossroads 11(2): 3 (2004)
[c6]Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo: Email archive analysis through graphical visualization. VizSEC 2004: 128-132- 2003
[c5]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290-
[c4]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90
[c3]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81- 2002
[c2]Manasi Bhattacharyya, Shlomo Hershkop, Eleazar Eskin: MET: an experimental system for Malicious Email Tracking. NSPW 2002: 3-10
[c1]Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo: Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. RAID 2002: 36-53
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:06 CEST by the dblp team



