
Salvatore J. Stolfo
Person information
- affiliation: Columbia University, New York City, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – 2019
- 2019
- [j42]Jonathan Voris, Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
Active authentication using file system decoys and user behavior modeling: results of a large scale study. Comput. Secur. 87 (2019) - 2018
- [j41]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Motivating Security-Aware Energy Management. IEEE Micro 38(3): 98-106 (2018) - [c118]Preetam Dutta, Gabriel Ryan, Aleksander Zieba, Salvatore J. Stolfo:
Simulated User Bots: Real Time Testing of Insider Threat Detection Systems. IEEE Symposium on Security and Privacy Workshops 2018: 228-236 - 2017
- [b1]Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo:
Anomaly Detection as a Service: Challenges, Advances, and Opportunities. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017 - [c117]Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
NEZHA: Efficient Domain-Independent Differential Testing. IEEE Symposium on Security and Privacy 2017: 615-632 - [c116]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. USENIX Security Symposium 2017: 1057-1074 - [i2]Theofilos Petsios, Adrian Tang, Dimitris Mitropoulos, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
Tug-of-War: Observations on Unified Content Handling. CoRR abs/1708.09334 (2017) - 2016
- [c115]Jonathan Voris, Yingbo Song, Malek Ben Salem, Salvatore J. Stolfo:
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage. MobiCASE 2016: 51-61 - 2015
- [c114]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads. CCS 2015: 256-267 - [c113]Jonathan Voris, Jill Jermyn, Nathaniel Boggs, Salvatore J. Stolfo:
Fox in the trap: thwarting masqueraders via automated decoy document deployment. EUROSEC 2015: 3:1-3:7 - [c112]Adrian Tang, John Demme, Simha Sethumadhavan, Salvatore J. Stolfo:
A silicon anti-virus engine. Hot Chips Symposium 2015: 1 - [c111]Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin, Salvatore J. Stolfo:
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks. WOWMOM 2015: 1-9 - 2014
- [c110]Sean Whalen, Nathaniel Boggs, Salvatore J. Stolfo:
Model Aggregation for Distributed Content Anomaly Detection. AISec@CCS 2014: 61-71 - [c109]Jill Jermyn, Jinho Hwang, Kun Bai, Maja Vukovic, Nikos Anerousis, Salvatore J. Stolfo:
Improving readiness for enterprise migration to the cloud. Middleware (Industry Track) 2014: 5:1-5:7 - [c108]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Unsupervised Anomaly-Based Malware Detection Using Hardware Features. RAID 2014: 109-129 - [c107]Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo:
Measuring Drive-by Download Defense in Depth. RAID 2014: 172-191 - [c106]Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo:
Synthetic Data Generation and Defense in Depth Measurement of Web Applications. RAID 2014: 234-254 - [i1]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Unsupervised Anomaly-based Malware Detection using Hardware Features. CoRR abs/1403.1631 (2014) - 2013
- [j40]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design. Inf. Manag. Comput. Secur. 21(2): 121-138 (2013) - [c105]John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, Salvatore J. Stolfo:
On the feasibility of online malware detection with performance counters. ISCA 2013: 559-570 - [c104]Ang Cui, Michael Costello, Salvatore J. Stolfo:
When Firmware Modifications Attack: A Case Study of Embedded Exploitation. NDSS 2013 - [c103]Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models. IEEE Symposium on Security and Privacy Workshops 2013: 52-59 - [e4]Salvatore J. Stolfo, Angelos Stavrou
, Charles V. Wright:
Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science 8145, Springer 2013, ISBN 978-3-642-41283-7 [contents] - 2012
- [j39]Shari Lawrence Pfleeger, Marc Rogers, Masooda Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo:
Does Profiling Make Us More Secure? IEEE Secur. Priv. 10(4): 10-15 (2012) - [j38]Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo:
Usable, Secure, Private Search. IEEE Secur. Priv. 10(5): 53-60 (2012) - [j37]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. J. Comput. Secur. 20(2-3): 199-221 (2012) - [j36]Malek Ben Salem, Salvatore J. Stolfo:
Combining Baiting and User Search Profiling Techniques for Masquerade Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 13-29 (2012) - [j35]Malek Ben Salem, Salvatore J. Stolfo:
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection. Secur. Commun. Networks 5(8): 863-872 (2012) - [c102]Young Hee Park, Salvatore J. Stolfo:
Software decoys for insider threat. AsiaCCS 2012: 93-94 - [c101]Junfeng Yang, Ang Cui, Salvatore J. Stolfo, Simha Sethumadhavan:
Concurrency Attacks. HotPar 2012 - [c100]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier
, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou
:
The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450 - [c99]Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis:
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshops 2012: 125-128 - [c98]Jonathan Voris, Nathaniel Boggs, Salvatore J. Stolfo:
Lost in Translation: Improving Decoy Documents via Automated Translation. IEEE Symposium on Security and Privacy Workshops 2012: 129-133 - [e3]Davide Balzarotti, Salvatore J. Stolfo, Marco Cova:
Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings. Lecture Notes in Computer Science 7462, Springer 2012, ISBN 978-3-642-33337-8 [contents] - 2011
- [j34]David Evans, Salvatore J. Stolfo:
Guest Editors' Introduction: The Science of Security. IEEE Secur. Priv. 9(3): 16-17 (2011) - [j33]Salvatore J. Stolfo, Steven M. Bellovin, David Evans:
Measuring Security. IEEE Secur. Priv. 9(3): 60-65 (2011) - [c97]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. ACSAC 2011: 393-402 - [c96]Ang Cui, Salvatore J. Stolfo:
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner. BADGERS@EuroSys 2011: 8-18 - [c95]Malek Ben Salem, Salvatore J. Stolfo:
Decoy Document Deployment for Effective Masquerade Attack Detection. DIMVA 2011: 35-54 - [c94]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou
, Anup K. Ghosh, Dawson R. Engler, Marc Dacier
, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - [c93]Simha Sethumadhavan, Salvatore J. Stolfo, Angelos D. Keromytis, Junfeng Yang, David I. August:
The SPARCHS Project: Hardware Support for Software Security. SysSec@DIMVA 2011: 119-122 - [c92]Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou
, Salvatore J. Stolfo:
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. RAID 2011: 142-160 - [c91]Malek Ben Salem, Salvatore J. Stolfo:
Modeling User Search Behavior for Masquerade Detection. RAID 2011: 181-200 - [c90]Ang Cui, Salvatore J. Stolfo:
Defending Embedded Systems with Software Symbiotes. RAID 2011: 358-377 - [c89]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. WOOT 2011: 19-27 - [c88]Malek Ben Salem, Salvatore J. Stolfo:
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned. CSET 2011 - [p6]Ang Cui, Salvatore J. Stolfo:
Symbiotes and defensive Mutualism: Moving Target Defense. Moving Target Defense 2011: 99-108 - [r1]Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem:
Insider Threat Defense. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 609-611 - 2010
- [j32]Germán Creamer, Salvatore J. Stolfo:
Erratum to: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 21(3): 542 (2010) - [j31]Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo:
Ethics in Security Vulnerability Research. IEEE Secur. Priv. 8(2): 67-72 (2010) - [j30]Salvatore J. Stolfo, Gene Tsudik:
Privacy-Preserving Sharing of Sensitive Information. IEEE Secur. Priv. 8(4): 16-17 (2010) - [j29]Malek Ben Salem, Salvatore J. Stolfo:
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 3-13 (2010) - [j28]Yingbo Song, Michael E. Locasto, Angelos Stavrou
, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Mach. Learn. 81(2): 179-205 (2010) - [c87]Ang Cui, Salvatore J. Stolfo:
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. ACSAC 2010: 97-106 - [c86]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137 - [c85]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
Automating the injection of believable decoys to detect snooping. WISEC 2010: 81-86 - [p5]Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo:
Monitoring Technologies for Mitigating Insider Threats. Insider Threats in Cyber Security 2010: 197-217
2000 – 2009
- 2009
- [j27]Germán Creamer, Salvatore J. Stolfo:
A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 18(3): 419-445 (2009) - [j26]Shari Lawrence Pfleeger, Salvatore J. Stolfo:
Addressing the Insider Threat. IEEE Secur. Priv. 7(6): 10-13 (2009) - [j25]Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Designing Host and Network Sensors to Mitigate the Insider Threat. IEEE Secur. Priv. 7(6): 22-29 (2009) - [c84]Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis:
A Network Access Control Mechanism Based on Behavior Profiles. ACSAC 2009: 3-12 - [c83]Angelos Stavrou
, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo:
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46 - [c82]Salvatore J. Stolfo:
Polymorphic shellcode: the demise of signature-based detection. CSIIRW 2009: 7 - [c81]Doug Maughan, George Hull, Salvatore J. Stolfo, Robert J. Stratton III:
Keynote panel. CSIIRW 2009: 10 - [c80]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ICISS 2009: 193-207 - [c79]Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo:
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. NDSS 2009 - [c78]Gabriela F. Cretu-Ciocarlie, Angelos Stavrou
, Michael E. Locasto, Salvatore J. Stolfo:
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60 - [c77]Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo:
Brave New World: Pervasive Insecurity of Embedded Network Devices. RAID 2009: 378-380 - [c76]Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Baiting Inside Attackers Using Decoy Documents. SecureComm 2009: 51-70 - 2008
- [c75]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ACSAC 2008: 367-376 - [c74]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190 - [c73]Michael E. Locasto, Angelos Stavrou
, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 - [c72]Gabriela F. Cretu, Angelos Stavrou
, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95 - [p4]Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
A Survey of Insider Attack Detection Research. Insider Attack and Cyber Security 2008: 69-90 - [e2]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents] - 2007
- [c71]Yingbo Song, Michael E. Locasto, Angelos Stavrou
, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode. CCS 2007: 541-551 - [c70]Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou
, Elli Androulaki, Angelos D. Keromytis:
A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250 - [c69]Germán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo:
Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. WebKDD/SNA-KDD 2007: 40-58 - [p3]Salvatore J. Stolfo, Ke Wang, Wei-Jen Li:
Towards Stealthy Malware Detection. Malware Detection 2007: 231-249 - 2006
- [j24]Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang:
Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006) - [c68]Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo:
Intrusion and anomaly detection model exchange for mobile ad-hoc networks. CCNC 2006: 635-639 - [c67]Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop:
A temporal based forensic analysis of electronic communication. DG.O 2006: 23-24 - [c66]Ke Wang, Janak J. Parekh, Salvatore J. Stolfo:
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248 - [c65]Suhit Gupta, Hila Becker, Gail E. Kaiser, Salvatore J. Stolfo:
Verifying genre-based clustering approach to content extraction. WWW 2006: 875-876 - 2005
- [j23]Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine A. Heller, Shlomo Hershkop, Andrew Honig, Krysta M. Svore:
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. J. Comput. Secur. 13(4): 659-693 (2005) - [c64]Salvatore J. Stolfo, Shlomo Hershkop:
Email mining toolkit supporting law enforcement forensic analyses. DG.O 2005: 221-222 - [c63]Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang:
Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28 - [c62]Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:
An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 - [c61]Shlomo Hershkop, Salvatore J. Stolfo:
Combining email models for false positive reduction. KDD 2005: 98-107 - [c60]Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 - [c59]Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo:
Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246 - [c58]Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo:
Extracting context to improve accuracy for HTML content extraction. WWW (Special interest tracks and posters) 2005: 1114-1115 - 2004
- [j22]Shlomo Hershkop, Salvatore J. Stolfo:
Identifying spam without peeking at the contents. ACM Crossroads 11(2): 3 (2004) - [j21]Salvatore J. Stolfo:
Worm and Attack Early Warning. IEEE Secur. Priv. 2(3): 73-75 (2004) - [j20]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan:
Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004) - [c57]Ke Wang, Salvatore J. Stolfo:
Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222 - [c56]Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo:
Email archive analysis through graphical visualization. VizSEC 2004: 128-132 - 2003
- [c55]Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicec, Stephen Jan:
Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. DG.O 2003 - [c54]Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo:
Surveillance Detection in High Bandwidth Environments. DISCEX (1) 2003: 130- - [c53]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern:
EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290- - [c52]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
Behavior Profiling of Email. ISI 2003: 74-90 - [c51]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81 - 2002
- [j19]Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok:
Toward Cost-Sensitive Modeling for Intrusion Detection and Response. J. Comput. Secur. 10(1/2): 5-22 (2002) - [c50]Herbert Schorr, Salvatore J. Stolfo:
Towards the Digital Government of the 21st Century. DG.O 2002 - [c49]Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo:
A Fully Distributed Framework for Cost-Sensitive Data Mining. ICDCS 2002: 445-446 - [c48]Wei Fan, Haixun Wang, Philip S. Yu, Shaw-hwa Lo, Salvatore J. Stolfo:
Progressive Modeling. ICDM 2002: 163-170 - [c47]Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo:
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. RAID 2002: 36-53 - [c46]Wei Fan, Salvatore J. Stolfo:
Ensemble-based Adaptive Intrusion Detection. SDM 2002: 41-58 - [c45]Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo:
A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. SDM 2002: 437-453 - [p2]Eleazar Eskin, Andrew Arnold, Michael J. Prerau, Leonid Portnoy, Salvatore J. Stolfo:
A Geometric Framework for Unsupervised Anomaly Detection. Applications of Data Mining in Computer Security 2002: 77-101 - [p1]Andrew Honig, Andrew Howard, Eleazar Eskin, Salvatore J. Stolfo:
Adaptive Model Generation. Applications of Data Mining in Computer Security 2002: 153-193 - 2001
- [j18]Andreas L. Prodromidis, Salvatore J. Stolfo:
Cost Complexity-Based Pruning of Ensemble Classifiers. Knowl. Inf. Syst. 3(4): 449-469 (2001) - [j17]Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin:
Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Rec. 30(4): 5-14 (2001) - [c44]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan:
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130 - [c43]Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:
Data Mining Methods for Detection of New Malicious Executables. IEEE Symposium on Security and Privacy 2001: 38-49 - [c42]Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Salvatore J. Stolfo:
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables. USENIX Annual Technical Conference, FREENIX Track 2001: 245-252 - 2000
- [j16]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000) - [j15]Wenke Lee, Salvatore J. Stolfo:
A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000) - [c41]Herbert Schorr, Salvatore J. Stolfo:
Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services. DG.O 2000 - [c40]Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller:
A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153 - [c39]Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo:
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65 - [e1]Raghu Ramakrishnan, Salvatore J. Stolfo, Roberto J. Bayardo, Ismail Parsa:
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, Boston, MA, USA, August 20-23, 2000. ACM 2000, ISBN 1-58113-233-6 [contents]
1990 – 1999
- 1999
- [j14]Philip Chan, Wei Fan, Andreas L. Prodromidis, Salvatore J. Stolfo:
Distributed data mining in credit card fraud detection. IEEE Intell. Syst. 14(6): 67-74 (1999) - [j13]Philip K. Chan, Salvatore J. Stolfo, David H. Wolpert:
Guest Editors' Introduction. Mach. Learn. 36(1-2): 5-7 (1999) - [c38]Andreas L. Prodromidis, Salvatore J. Stolfo:
Minimal Cost Complexity Pruning of Meta-Classifiers. AAAI/IAAI 1999: 979 - [c37]