Year |
Citation |
Score |
2019 |
Voris J, Song Y, Salem MB, Hershkop S, Stolfo SJ. Active authentication using file system decoys and user behavior modeling: results of a large scale study Computers & Security. 87: 101412. DOI: 10.1016/J.Cose.2018.07.021 |
0.788 |
|
2015 |
Voris J, Jermyn J, Boggs N, Stolfo S. Fox in the trap: Thwarting masqueraders via automated decoy document deployment Proceedings of the 8th European Workshop On System Security, Eurosec 2015. DOI: 10.1145/2751323.2751326 |
0.326 |
|
2014 |
Whalen S, Boggs N, Stolfo SJ. Model aggregation for distributed content anomaly detection Proceedings of the Acm Conference On Computer and Communications Security. 2014: 61-71. DOI: 10.1145/2666652.2666660 |
0.31 |
|
2014 |
Tang A, Sethumadhavan S, Stolfo SJ. Unsupervised anomaly-based malware detection using hardware features Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 109-129. DOI: 10.1007/978-3-319-11379-1_6 |
0.308 |
|
2013 |
Song Y, Salem MB, Hershkop S, Stolfo SJ. System level user behavior biometrics using Fisher features and Gaussian mixture models Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2013. 52-59. DOI: 10.1109/SPW.2013.33 |
0.755 |
|
2013 |
Cui A, Kataria J, Stolfo SJ. Revisiting the myth of Cisco IOS diversity: Recent advances in reliable shellcode design Information Management and Computer Security. 21: 121-138. DOI: 10.1108/Imcs-09-2012-0046 |
0.329 |
|
2012 |
Bowen BM, Kemerlis VP, Prabhu P, Keromytis AD, Stolfo SJ. A system for generating and injecting indistinguishable network decoys Journal of Computer Security. 20: 199-221. DOI: 10.3233/Jcs-2011-0439 |
0.39 |
|
2012 |
Salem MB, Stolfo SJ. A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection Security and Communication Networks. 5: 863-872. DOI: 10.1002/Sec.311 |
0.468 |
|
2012 |
Ben Salem M, Stolfo SJ. Combining baiting and user search profiling techniques for masquerade detection Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 3: 13-29. |
0.668 |
|
2011 |
Boggs N, Hiremagalore S, Stavrou A, Stolfo SJ. Cross-domain collaborative anomaly detection: So far yet so close Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 142-160. DOI: 10.1007/978-3-642-23644-0_8 |
0.334 |
|
2011 |
Salem MB, Stolfo SJ. Modeling user search behavior for masquerade detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 181-200. DOI: 10.1007/978-3-642-23644-0_10 |
0.371 |
|
2011 |
Ben Salem M, Stolfo SJ. Decoy document deployment for effective masquerade attack detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 35-54. DOI: 10.1007/978-3-642-22424-9_3 |
0.666 |
|
2010 |
Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5 |
0.652 |
|
2010 |
Ben Salem M, Stolfo SJ. Detecting masqueraders: A comparison of one-class bag-of-words user behavior modeling techniques Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 1: 3-13. |
0.655 |
|
2009 |
Bowen BM, Ben Salem M, Hershkop S, Keromytis AD, Stolfo SJ. Designing host and network sensors to mitigate the insider threat Ieee Security and Privacy. 7: 22-29. DOI: 10.1109/MSP.2009.109 |
0.786 |
|
2009 |
Frias-Martinez V, Sherrick J, Stolfo SJ, Keromytis AD. A network access control mechanism based on behavior profiles Proceedings - Annual Computer Security Applications Conference, Acsac. 3-12. DOI: 10.1109/ACSAC.2009.10 |
0.724 |
|
2009 |
Creamer G, Stolfo S. A link mining algorithm for earnings forecast and trading Data Mining and Knowledge Discovery. 18: 419-445. DOI: 10.1007/S10618-008-0124-Z |
0.658 |
|
2009 |
Frias-Martinez V, Stolfo SJ, Keromytis AD. BARTER: Behavior profile exchange for behavior-based admission and access control in MANETs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5905: 193-207. DOI: 10.1007/978-3-642-10772-6_15 |
0.712 |
|
2009 |
Bowen BM, Hershkop S, Keromytis AD, Stolfo SJ. Baiting inside attackers using decoy documents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 51-70. DOI: 10.1007/978-3-642-05284-2_4 |
0.707 |
|
2009 |
Creamer G, Rowe R, Hershkop S, Stolfo SJ. Segmentation and automated social hierarchy detection through email network analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5439: 40-58. DOI: 10.1007/978-3-642-00528-2_3 |
0.79 |
|
2008 |
Medard M, Fragouli C, Lee W, Maxion RA, Stolfo S, Tong L. Guest editorial special section on statistical methods for network security and forensics Ieee Transactions On Information Forensics and Security. 3: 345-346. DOI: 10.1109/Tifs.2008.928950 |
0.46 |
|
2008 |
Frias-Martinez V, Stolfo SJ, Keromytis AD. Behavior-profile clustering for false alert reduction in anomaly detection sensors Proceedings - Annual Computer Security Applications Conference, Acsac. 367-376. DOI: 10.1109/ACSAC.2008.30 |
0.689 |
|
2008 |
Frias-Martinez V, Stolfo SJ, Keromytis AD. Behavior-based network access control: A proof-of-concept Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5222: 175-190. DOI: 10.1007/978-3-540-85886-7_12 |
0.71 |
|
2008 |
Stolfo SJ, Bellovin SM, Hershkop S, Keromytis AD, Sinclair S, Smith SW. Insider attack and cyber security: Beyond the Hacker Advances in Information Security. 39. |
0.693 |
|
2008 |
Salem MB, Hershkop S, Stolfo SJ. A Survey of Insider Attack Detection Research Advances in Information Security. 39: 69-70. |
0.716 |
|
2007 |
Rowe R, Creamer G, Hershkop S, Stolfo SJ. Automated social hierarchy detection through email network analysis Joint Ninth Webkdd and First Sna-Kdd 2007 Workshop On Web Mining and Social Network Analysis. 109-117. DOI: 10.1145/1348549.1348562 |
0.788 |
|
2007 |
Li WJ, Stolfo S, Stavrou A, Androulaki E, Keromytis AD. A study of malcode-bearing documents Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4579: 231-250. |
0.308 |
|
2006 |
Stolfo SJ, Hershkop S, Hu CW, Li WJ, Nimeskern O, Wang KE. Behavior-based modeling and its application to Email analysis Acm Transactions On Internet Technology. 6: 187-221. DOI: 10.1145/1149121.1149125 |
0.797 |
|
2006 |
Stolfo SJ, Creamer G, Hershkop S. A temporal based forensic analysis of electronic communication Acm International Conference Proceeding Series. 151: 23-24. DOI: 10.1145/1146598.1146609 |
0.768 |
|
2006 |
Wang K, Cretu G, Stolfo SJ. Anomalous payload-based worm detection and signature generation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 227-246. |
0.336 |
|
2005 |
Stolfo SJ, Apap F, Eskin E, Heller K, Hershkop S, Honig A, Svore K. A comparative evaluation of two algorithms for Windows Registry Anomaly Detection Journal of Computer Security. 13: 659-693. DOI: 10.3233/Jcs-2005-13403 |
0.792 |
|
2005 |
Hershkop S, Stolfo SJ. Combining Email models for false positive reduction Proceedings of the Acm Sigkdd International Conference On Knowledge Discovery and Data Mining. 98-107. DOI: 10.1145/1081870.1081885 |
0.753 |
|
2005 |
Stolfo SJ, Hershkop S, Bui LH, Ferster R, Wang K. Anomaly detection in computer security and an application to file system accesses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3488: 14-28. |
0.756 |
|
2004 |
Hershkop S, Stolfo SJ. Identifying spam without peeking at the contents Acm Crossroads Student Magazine. 11: 3-3. DOI: 10.1145/1144403.1144406 |
0.685 |
|
2004 |
Li WJ, Hershkop S, Stolfo SJ. Email archive analysis through graphical visualization Vizsec/Dmsec '04: Proceedings of the 2004 Acm Workshop On Visualization and Data Mining For Computer Security. 128-132. |
0.734 |
|
2003 |
Stolfo SJ, Hershkop S, Wang K, Nimeskern O. EMT/MET: Systems for modeling and detecting errant email Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 290-295. DOI: 10.1109/DISCEX.2003.1194980 |
0.701 |
|
2003 |
Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW. A behavior-based approach to securing email systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2776: 57-81. |
0.759 |
|
2003 |
Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW. Behavior profiling of Email Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2665: 74-90. |
0.703 |
|
2002 |
Lee W, Fan W, Miller M, Stolfo SJ, Zadok E. Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security. 10: 5-22. DOI: 10.3233/Jcs-2002-101-202 |
0.565 |
|
2002 |
Apap F, Honig A, Hershkop S, Eskin E, Stolfo S. Detecting malicious software by monitoring anomalous windows registry accesses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 36-53. DOI: 10.1007/3-540-36084-0_3 |
0.791 |
|
2001 |
Eskin E, Lee W, Stolfo SJ. Modeling system calls for intrusion detection with dynamic window sizes Proceedings - Darpa Information Survivability Conference and Exposition Ii, Discex 2001. 1: 165-175. DOI: 10.1109/DISCEX.2001.932213 |
0.495 |
|
2001 |
Lee W, Stolfo SJ, Chan PK, Eskin E, Fan W, Miller M, Hershkop S, Zhang J. Real time data mining-based intrusion detection Proceedings - Darpa Information Survivability Conference and Exposition Ii, Discex 2001. 1: 89-100. DOI: 10.1109/DISCEX.2001.932195 |
0.78 |
|
2001 |
Prodromidis AL, Stolfo SJ. Cost Complexity-Based Pruning of Ensemble Classifiers Knowledge and Information Systems. 3: 449-469. DOI: 10.1007/Pl00011678 |
0.368 |
|
2001 |
Schultz MG, Eskin E, Zadok E, Stolfo SJ. Data mining methods for detection of new malicious executables Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 38-49. |
0.56 |
|
2000 |
Lee W, Stolfo SJ. A framework for constructing features and models for intrusion detection systems Acm Transactions On Information and System Security. 3: 227-261. DOI: 10.1145/382912.382914 |
0.619 |
|
2000 |
Stolfo SJ, Fan W, Lee W, Prodromidis A, Chan PK. Cost-based modeling for fraud and intrusion detection: Results from the JAM project Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 130-144. DOI: 10.1109/DISCEX.2000.821515 |
0.326 |
|
2000 |
Lee W, Stolfo SJ, Mok KW. Adaptive intrusion detection: A data mining approach Artificial Intelligence Review. 14: 533-567. DOI: 10.1023/A:1006624031083 |
0.608 |
|
2000 |
Lee W, Nimbalkar RA, Yee KK, Patil SB, Desai PH, Tran TT, Stolfo SJ. A data mining and CIDF based approach for detecting novel and distributed intrusions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1907: 49-65. |
0.321 |
|
1999 |
Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models Proceedings - Ieee Symposium On Security and Privacy. 1999: 120-132. DOI: 10.1109/SECPRI.1999.766909 |
0.308 |
|
1999 |
Chan PK, Fan W, Prodromidis AL, Stolfo SJ. Distributed data mining in credit card fraud detection Ieee Intelligent Systems and Their Applications. 14: 67-74. DOI: 10.1109/5254.809570 |
0.493 |
|
1998 |
Fawcett T, Haimowitz IJ, Provost FJ, Stolfo SJ. AI Approaches to Fraud Detection and Risk Management Ai Magazine. 19: 107-108. DOI: 10.1609/Aimag.V19I2.1372 |
0.314 |
|
1998 |
Hernández MA, Stolfo SJ. Real-world data is dirty: Data cleansing and the merge/purge problem Data Mining and Knowledge Discovery. 2: 9-37. DOI: 10.1023/A:1009761603038 |
0.343 |
|
1994 |
Dewan HM, Stolfo SJ, Woodbury L. Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing Journal of Parallel and Distributed Computing. 22: 506-522. DOI: 10.1006/Jpdc.1994.1107 |
0.304 |
|
1993 |
Wah BW, Aloimonos J, Bajcsy RK, Ballard D, DeGroot D, DeJong K, Dyer CR, Fahlman SE, Grishman R, Hirschman L, Korf RE, Levinson SE, Miranker DP, Morgan NH, Nirenburg S, ... ... Stolfo SJ, et al. Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence Ieee Transactions On Knowledge and Data Engineering. 5: 138-154. DOI: 10.1109/69.204098 |
0.608 |
|
1992 |
Dewan HM, Ohsie D, Stolfo SJ, Wolfson O, da Silva S. Incremental database rule processing in PARADISER Journal of Intelligent Information Systems. 1: 177-209. DOI: 10.1007/Bf00962282 |
0.344 |
|
1991 |
Stolfo SJ, Wolfson O, Chan PK, Dewan HM, Woodbury L, Glazier JS, Ohsie DA. PARULEL: Parallel rule processing using meta-rules for redaction Journal of Parallel and Distributed Computing. 13: 366-382. DOI: 10.1016/0743-7315(91)90097-S |
0.302 |
|
1986 |
Stolfo SJ, Miranker DP. The DADO production system machine Journal of Parallel and Distributed Computing. 3: 269-296. DOI: 10.1016/0743-7315(86)90007-9 |
0.625 |
|
Show low-probability matches. |