Salvatore J. Stolfo
Affiliations: | Computer Science | Columbia University, New York, NY |
Area:
Computer Security, Intrusion and Anomaly Detection, Embedded Device Security, Data Mining/machine LearningGoogle:
"Salvatore Stolfo"Bio:
http://www.cs.columbia.edu/documents/cv/sal/CV_Stolfo.pdf
https://www.genealogy.math.ndsu.nodak.edu/id.php?id=125122
Parents
Sign in to add mentorMalcom Harrison | grad student | NYU Courant | |
Jacob T. Schwartz | grad student | 1975-1979 | NYU Courant (Neurotree) |
Children
Sign in to add traineeDaniel P. Miranker | grad student | 1980-1985 | UT Austin |
Philip Chan | grad student | 1997 | Florida Tech |
Wenke Lee | grad student | 1994-1999 | Georgia Tech |
Wei Fan | grad student | 2001 | Columbia |
Eleazar Eskin | grad student | 2002 | Columbia |
Shlomo Hershkop | grad student | 2006 | Columbia |
German Creamer | grad student | 2007 | Columbia |
Vanessa Frias-Martinez | grad student | 2008 | Columbia |
Wei-Jen Li | grad student | 2008 | Columbia |
Gabriela F. Ciocarlie | grad student | 2010 | Columbia |
Malek Ben Salem | grad student | 2012 | Columbia |
Yingbo Song | grad student | 2012 | Columbia |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Voris J, Song Y, Salem MB, et al. (2019) Active authentication using file system decoys and user behavior modeling: results of a large scale study Computers & Security. 87: 101412 |
Voris J, Jermyn J, Boggs N, et al. (2015) Fox in the trap: Thwarting masqueraders via automated decoy document deployment Proceedings of the 8th European Workshop On System Security, Eurosec 2015 |
Whalen S, Boggs N, Stolfo SJ. (2014) Model aggregation for distributed content anomaly detection Proceedings of the Acm Conference On Computer and Communications Security. 2014: 61-71 |
Tang A, Sethumadhavan S, Stolfo SJ. (2014) Unsupervised anomaly-based malware detection using hardware features Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 109-129 |
Song Y, Salem MB, Hershkop S, et al. (2013) System level user behavior biometrics using Fisher features and Gaussian mixture models Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2013. 52-59 |
Cui A, Kataria J, Stolfo SJ. (2013) Revisiting the myth of Cisco IOS diversity: Recent advances in reliable shellcode design Information Management and Computer Security. 21: 121-138 |
Bowen BM, Kemerlis VP, Prabhu P, et al. (2012) A system for generating and injecting indistinguishable network decoys Journal of Computer Security. 20: 199-221 |
Salem MB, Stolfo SJ. (2012) A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection Security and Communication Networks. 5: 863-872 |
Ben Salem M, Stolfo SJ. (2012) Combining baiting and user search profiling techniques for masquerade detection Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 3: 13-29 |
Boggs N, Hiremagalore S, Stavrou A, et al. (2011) Cross-domain collaborative anomaly detection: So far yet so close Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 142-160 |