Salvatore J. Stolfo - Publications

Affiliations: 
Computer Science Columbia University, New York, NY 
Area:
Computer Security, Intrusion and Anomaly Detection, Embedded Device Security, Data Mining/machine Learning

57 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Voris J, Song Y, Salem MB, Hershkop S, Stolfo SJ. Active authentication using file system decoys and user behavior modeling: results of a large scale study Computers & Security. 87: 101412. DOI: 10.1016/J.Cose.2018.07.021  0.788
2015 Voris J, Jermyn J, Boggs N, Stolfo S. Fox in the trap: Thwarting masqueraders via automated decoy document deployment Proceedings of the 8th European Workshop On System Security, Eurosec 2015. DOI: 10.1145/2751323.2751326  0.326
2014 Whalen S, Boggs N, Stolfo SJ. Model aggregation for distributed content anomaly detection Proceedings of the Acm Conference On Computer and Communications Security. 2014: 61-71. DOI: 10.1145/2666652.2666660  0.31
2014 Tang A, Sethumadhavan S, Stolfo SJ. Unsupervised anomaly-based malware detection using hardware features Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 109-129. DOI: 10.1007/978-3-319-11379-1_6  0.308
2013 Song Y, Salem MB, Hershkop S, Stolfo SJ. System level user behavior biometrics using Fisher features and Gaussian mixture models Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2013. 52-59. DOI: 10.1109/SPW.2013.33  0.755
2013 Cui A, Kataria J, Stolfo SJ. Revisiting the myth of Cisco IOS diversity: Recent advances in reliable shellcode design Information Management and Computer Security. 21: 121-138. DOI: 10.1108/Imcs-09-2012-0046  0.329
2012 Bowen BM, Kemerlis VP, Prabhu P, Keromytis AD, Stolfo SJ. A system for generating and injecting indistinguishable network decoys Journal of Computer Security. 20: 199-221. DOI: 10.3233/Jcs-2011-0439  0.39
2012 Salem MB, Stolfo SJ. A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection Security and Communication Networks. 5: 863-872. DOI: 10.1002/Sec.311  0.468
2012 Ben Salem M, Stolfo SJ. Combining baiting and user search profiling techniques for masquerade detection Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 3: 13-29.  0.668
2011 Boggs N, Hiremagalore S, Stavrou A, Stolfo SJ. Cross-domain collaborative anomaly detection: So far yet so close Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 142-160. DOI: 10.1007/978-3-642-23644-0_8  0.334
2011 Salem MB, Stolfo SJ. Modeling user search behavior for masquerade detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 181-200. DOI: 10.1007/978-3-642-23644-0_10  0.371
2011 Ben Salem M, Stolfo SJ. Decoy document deployment for effective masquerade attack detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 35-54. DOI: 10.1007/978-3-642-22424-9_3  0.666
2010 Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5  0.652
2010 Ben Salem M, Stolfo SJ. Detecting masqueraders: A comparison of one-class bag-of-words user behavior modeling techniques Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 1: 3-13.  0.655
2009 Bowen BM, Ben Salem M, Hershkop S, Keromytis AD, Stolfo SJ. Designing host and network sensors to mitigate the insider threat Ieee Security and Privacy. 7: 22-29. DOI: 10.1109/MSP.2009.109  0.786
2009 Frias-Martinez V, Sherrick J, Stolfo SJ, Keromytis AD. A network access control mechanism based on behavior profiles Proceedings - Annual Computer Security Applications Conference, Acsac. 3-12. DOI: 10.1109/ACSAC.2009.10  0.724
2009 Creamer G, Stolfo S. A link mining algorithm for earnings forecast and trading Data Mining and Knowledge Discovery. 18: 419-445. DOI: 10.1007/S10618-008-0124-Z  0.658
2009 Frias-Martinez V, Stolfo SJ, Keromytis AD. BARTER: Behavior profile exchange for behavior-based admission and access control in MANETs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5905: 193-207. DOI: 10.1007/978-3-642-10772-6_15  0.712
2009 Bowen BM, Hershkop S, Keromytis AD, Stolfo SJ. Baiting inside attackers using decoy documents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 51-70. DOI: 10.1007/978-3-642-05284-2_4  0.707
2009 Creamer G, Rowe R, Hershkop S, Stolfo SJ. Segmentation and automated social hierarchy detection through email network analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5439: 40-58. DOI: 10.1007/978-3-642-00528-2_3  0.79
2008 Medard M, Fragouli C, Lee W, Maxion RA, Stolfo S, Tong L. Guest editorial special section on statistical methods for network security and forensics Ieee Transactions On Information Forensics and Security. 3: 345-346. DOI: 10.1109/Tifs.2008.928950  0.46
2008 Frias-Martinez V, Stolfo SJ, Keromytis AD. Behavior-profile clustering for false alert reduction in anomaly detection sensors Proceedings - Annual Computer Security Applications Conference, Acsac. 367-376. DOI: 10.1109/ACSAC.2008.30  0.689
2008 Frias-Martinez V, Stolfo SJ, Keromytis AD. Behavior-based network access control: A proof-of-concept Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5222: 175-190. DOI: 10.1007/978-3-540-85886-7_12  0.71
2008 Stolfo SJ, Bellovin SM, Hershkop S, Keromytis AD, Sinclair S, Smith SW. Insider attack and cyber security: Beyond the Hacker Advances in Information Security. 39.  0.693
2008 Salem MB, Hershkop S, Stolfo SJ. A Survey of Insider Attack Detection Research Advances in Information Security. 39: 69-70.  0.716
2007 Rowe R, Creamer G, Hershkop S, Stolfo SJ. Automated social hierarchy detection through email network analysis Joint Ninth Webkdd and First Sna-Kdd 2007 Workshop On Web Mining and Social Network Analysis. 109-117. DOI: 10.1145/1348549.1348562  0.788
2007 Li WJ, Stolfo S, Stavrou A, Androulaki E, Keromytis AD. A study of malcode-bearing documents Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4579: 231-250.  0.308
2006 Stolfo SJ, Hershkop S, Hu CW, Li WJ, Nimeskern O, Wang KE. Behavior-based modeling and its application to Email analysis Acm Transactions On Internet Technology. 6: 187-221. DOI: 10.1145/1149121.1149125  0.797
2006 Stolfo SJ, Creamer G, Hershkop S. A temporal based forensic analysis of electronic communication Acm International Conference Proceeding Series. 151: 23-24. DOI: 10.1145/1146598.1146609  0.768
2006 Wang K, Cretu G, Stolfo SJ. Anomalous payload-based worm detection and signature generation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 227-246.  0.336
2005 Stolfo SJ, Apap F, Eskin E, Heller K, Hershkop S, Honig A, Svore K. A comparative evaluation of two algorithms for Windows Registry Anomaly Detection Journal of Computer Security. 13: 659-693. DOI: 10.3233/Jcs-2005-13403  0.792
2005 Hershkop S, Stolfo SJ. Combining Email models for false positive reduction Proceedings of the Acm Sigkdd International Conference On Knowledge Discovery and Data Mining. 98-107. DOI: 10.1145/1081870.1081885  0.753
2005 Stolfo SJ, Hershkop S, Bui LH, Ferster R, Wang K. Anomaly detection in computer security and an application to file system accesses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3488: 14-28.  0.756
2004 Hershkop S, Stolfo SJ. Identifying spam without peeking at the contents Acm Crossroads Student Magazine. 11: 3-3. DOI: 10.1145/1144403.1144406  0.685
2004 Li WJ, Hershkop S, Stolfo SJ. Email archive analysis through graphical visualization Vizsec/Dmsec '04: Proceedings of the 2004 Acm Workshop On Visualization and Data Mining For Computer Security. 128-132.  0.734
2003 Stolfo SJ, Hershkop S, Wang K, Nimeskern O. EMT/MET: Systems for modeling and detecting errant email Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 290-295. DOI: 10.1109/DISCEX.2003.1194980  0.701
2003 Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW. A behavior-based approach to securing email systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2776: 57-81.  0.759
2003 Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW. Behavior profiling of Email Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2665: 74-90.  0.703
2002 Lee W, Fan W, Miller M, Stolfo SJ, Zadok E. Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security. 10: 5-22. DOI: 10.3233/Jcs-2002-101-202  0.565
2002 Apap F, Honig A, Hershkop S, Eskin E, Stolfo S. Detecting malicious software by monitoring anomalous windows registry accesses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 36-53. DOI: 10.1007/3-540-36084-0_3  0.791
2001 Eskin E, Lee W, Stolfo SJ. Modeling system calls for intrusion detection with dynamic window sizes Proceedings - Darpa Information Survivability Conference and Exposition Ii, Discex 2001. 1: 165-175. DOI: 10.1109/DISCEX.2001.932213  0.495
2001 Lee W, Stolfo SJ, Chan PK, Eskin E, Fan W, Miller M, Hershkop S, Zhang J. Real time data mining-based intrusion detection Proceedings - Darpa Information Survivability Conference and Exposition Ii, Discex 2001. 1: 89-100. DOI: 10.1109/DISCEX.2001.932195  0.78
2001 Prodromidis AL, Stolfo SJ. Cost Complexity-Based Pruning of Ensemble Classifiers Knowledge and Information Systems. 3: 449-469. DOI: 10.1007/Pl00011678  0.368
2001 Schultz MG, Eskin E, Zadok E, Stolfo SJ. Data mining methods for detection of new malicious executables Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 38-49.  0.56
2000 Lee W, Stolfo SJ. A framework for constructing features and models for intrusion detection systems Acm Transactions On Information and System Security. 3: 227-261. DOI: 10.1145/382912.382914  0.619
2000 Stolfo SJ, Fan W, Lee W, Prodromidis A, Chan PK. Cost-based modeling for fraud and intrusion detection: Results from the JAM project Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 130-144. DOI: 10.1109/DISCEX.2000.821515  0.326
2000 Lee W, Stolfo SJ, Mok KW. Adaptive intrusion detection: A data mining approach Artificial Intelligence Review. 14: 533-567. DOI: 10.1023/A:1006624031083  0.608
2000 Lee W, Nimbalkar RA, Yee KK, Patil SB, Desai PH, Tran TT, Stolfo SJ. A data mining and CIDF based approach for detecting novel and distributed intrusions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1907: 49-65.  0.321
1999 Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models Proceedings - Ieee Symposium On Security and Privacy. 1999: 120-132. DOI: 10.1109/SECPRI.1999.766909  0.308
1999 Chan PK, Fan W, Prodromidis AL, Stolfo SJ. Distributed data mining in credit card fraud detection Ieee Intelligent Systems and Their Applications. 14: 67-74. DOI: 10.1109/5254.809570  0.493
1998 Fawcett T, Haimowitz IJ, Provost FJ, Stolfo SJ. AI Approaches to Fraud Detection and Risk Management Ai Magazine. 19: 107-108. DOI: 10.1609/Aimag.V19I2.1372  0.314
1998 Hernández MA, Stolfo SJ. Real-world data is dirty: Data cleansing and the merge/purge problem Data Mining and Knowledge Discovery. 2: 9-37. DOI: 10.1023/A:1009761603038  0.343
1994 Dewan HM, Stolfo SJ, Woodbury L. Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing Journal of Parallel and Distributed Computing. 22: 506-522. DOI: 10.1006/Jpdc.1994.1107  0.304
1993 Wah BW, Aloimonos J, Bajcsy RK, Ballard D, DeGroot D, DeJong K, Dyer CR, Fahlman SE, Grishman R, Hirschman L, Korf RE, Levinson SE, Miranker DP, Morgan NH, Nirenburg S, ... ... Stolfo SJ, et al. Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence Ieee Transactions On Knowledge and Data Engineering. 5: 138-154. DOI: 10.1109/69.204098  0.608
1992 Dewan HM, Ohsie D, Stolfo SJ, Wolfson O, da Silva S. Incremental database rule processing in PARADISER Journal of Intelligent Information Systems. 1: 177-209. DOI: 10.1007/Bf00962282  0.344
1991 Stolfo SJ, Wolfson O, Chan PK, Dewan HM, Woodbury L, Glazier JS, Ohsie DA. PARULEL: Parallel rule processing using meta-rules for redaction Journal of Parallel and Distributed Computing. 13: 366-382. DOI: 10.1016/0743-7315(91)90097-S  0.302
1986 Stolfo SJ, Miranker DP. The DADO production system machine Journal of Parallel and Distributed Computing. 3: 269-296. DOI: 10.1016/0743-7315(86)90007-9  0.625
Show low-probability matches.