Salvatore J. Stolfo

Affiliations: 
Computer Science Columbia University, New York, NY 
Area:
Computer Security, Intrusion and Anomaly Detection, Embedded Device Security, Data Mining/machine Learning
Google:
"Salvatore Stolfo"
Bio:

http://www.cs.columbia.edu/documents/cv/sal/CV_Stolfo.pdf
https://www.genealogy.math.ndsu.nodak.edu/id.php?id=125122

Parents

Sign in to add mentor
Malcom Harrison grad student NYU Courant
Jacob T. Schwartz grad student 1975-1979 NYU Courant (Neurotree)

Children

Sign in to add trainee
Daniel P. Miranker grad student 1980-1985 UT Austin
Philip Chan grad student 1997 Florida Tech
Wenke Lee grad student 1994-1999 Georgia Tech
Wei Fan grad student 2001 Columbia
Eleazar Eskin grad student 2002 Columbia
Shlomo Hershkop grad student 2006 Columbia
German Creamer grad student 2007 Columbia
Vanessa Frias-Martinez grad student 2008 Columbia
Wei-Jen Li grad student 2008 Columbia
Gabriela F. Ciocarlie grad student 2010 Columbia
Malek Ben Salem grad student 2012 Columbia
Yingbo Song grad student 2012 Columbia
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Voris J, Song Y, Salem MB, et al. (2019) Active authentication using file system decoys and user behavior modeling: results of a large scale study Computers & Security. 87: 101412
Voris J, Jermyn J, Boggs N, et al. (2015) Fox in the trap: Thwarting masqueraders via automated decoy document deployment Proceedings of the 8th European Workshop On System Security, Eurosec 2015
Whalen S, Boggs N, Stolfo SJ. (2014) Model aggregation for distributed content anomaly detection Proceedings of the Acm Conference On Computer and Communications Security. 2014: 61-71
Tang A, Sethumadhavan S, Stolfo SJ. (2014) Unsupervised anomaly-based malware detection using hardware features Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 109-129
Song Y, Salem MB, Hershkop S, et al. (2013) System level user behavior biometrics using Fisher features and Gaussian mixture models Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2013. 52-59
Cui A, Kataria J, Stolfo SJ. (2013) Revisiting the myth of Cisco IOS diversity: Recent advances in reliable shellcode design Information Management and Computer Security. 21: 121-138
Bowen BM, Kemerlis VP, Prabhu P, et al. (2012) A system for generating and injecting indistinguishable network decoys Journal of Computer Security. 20: 199-221
Salem MB, Stolfo SJ. (2012) A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection Security and Communication Networks. 5: 863-872
Ben Salem M, Stolfo SJ. (2012) Combining baiting and user search profiling techniques for masquerade detection Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 3: 13-29
Boggs N, Hiremagalore S, Stavrou A, et al. (2011) Cross-domain collaborative anomaly detection: So far yet so close Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 142-160
See more...