Shlomo Hershkop, Ph.D.

Affiliations: 
2006 Columbia University, New York, NY 
Area:
Computer Security, Intrusion and Anomaly Detection, Embedded Device Security, Data Mining/machine Learning
Google:
"Shlomo Hershkop"

Parents

Sign in to add mentor
Salvatore J. Stolfo grad student 2006 Columbia
 (Behavior-based email analysis with application to spam detection.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Voris J, Song Y, Salem MB, et al. (2019) Active authentication using file system decoys and user behavior modeling: results of a large scale study Computers & Security. 87: 101412
Song Y, Salem MB, Hershkop S, et al. (2013) System level user behavior biometrics using Fisher features and Gaussian mixture models Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2013. 52-59
Bowen BM, Ben Salem M, Hershkop S, et al. (2009) Designing host and network sensors to mitigate the insider threat Ieee Security and Privacy. 7: 22-29
Bowen BM, Hershkop S, Keromytis AD, et al. (2009) Baiting inside attackers using decoy documents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 51-70
Creamer G, Rowe R, Hershkop S, et al. (2009) Segmentation and automated social hierarchy detection through email network analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5439: 40-58
Salem MB, Hershkop S, Stolfo SJ. (2008) A Survey of Insider Attack Detection Research Advances in Information Security. 39: 69-70
Stolfo SJ, Bellovin SM, Hershkop S, et al. (2008) Insider attack and cyber security: Beyond the Hacker Advances in Information Security. 39
Rowe R, Creamer G, Hershkop S, et al. (2007) Automated social hierarchy detection through email network analysis Joint Ninth Webkdd and First Sna-Kdd 2007 Workshop On Web Mining and Social Network Analysis. 109-117
Stolfo SJ, Hershkop S, Hu CW, et al. (2006) Behavior-based modeling and its application to Email analysis Acm Transactions On Internet Technology. 6: 187-221
Stolfo SJ, Creamer G, Hershkop S. (2006) A temporal based forensic analysis of electronic communication Acm International Conference Proceeding Series. 151: 23-24
See more...