Year |
Citation |
Score |
2019 |
Voris J, Song Y, Salem MB, Hershkop S, Stolfo SJ. Active authentication using file system decoys and user behavior modeling: results of a large scale study Computers & Security. 87: 101412. DOI: 10.1016/J.Cose.2018.07.021 |
0.723 |
|
2013 |
Song Y, Salem MB, Hershkop S, Stolfo SJ. System level user behavior biometrics using Fisher features and Gaussian mixture models Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2013. 52-59. DOI: 10.1109/SPW.2013.33 |
0.64 |
|
2009 |
Bowen BM, Ben Salem M, Hershkop S, Keromytis AD, Stolfo SJ. Designing host and network sensors to mitigate the insider threat Ieee Security and Privacy. 7: 22-29. DOI: 10.1109/MSP.2009.109 |
0.707 |
|
2009 |
Bowen BM, Hershkop S, Keromytis AD, Stolfo SJ. Baiting inside attackers using decoy documents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 51-70. DOI: 10.1007/978-3-642-05284-2_4 |
0.565 |
|
2009 |
Creamer G, Rowe R, Hershkop S, Stolfo SJ. Segmentation and automated social hierarchy detection through email network analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5439: 40-58. DOI: 10.1007/978-3-642-00528-2_3 |
0.75 |
|
2008 |
Salem MB, Hershkop S, Stolfo SJ. A Survey of Insider Attack Detection Research Advances in Information Security. 39: 69-70. |
0.583 |
|
2008 |
Stolfo SJ, Bellovin SM, Hershkop S, Keromytis AD, Sinclair S, Smith SW. Insider attack and cyber security: Beyond the Hacker Advances in Information Security. 39. |
0.538 |
|
2007 |
Rowe R, Creamer G, Hershkop S, Stolfo SJ. Automated social hierarchy detection through email network analysis Joint Ninth Webkdd and First Sna-Kdd 2007 Workshop On Web Mining and Social Network Analysis. 109-117. DOI: 10.1145/1348549.1348562 |
0.746 |
|
2006 |
Stolfo SJ, Hershkop S, Hu CW, Li WJ, Nimeskern O, Wang KE. Behavior-based modeling and its application to Email analysis Acm Transactions On Internet Technology. 6: 187-221. DOI: 10.1145/1149121.1149125 |
0.728 |
|
2006 |
Stolfo SJ, Creamer G, Hershkop S. A temporal based forensic analysis of electronic communication Acm International Conference Proceeding Series. 151: 23-24. DOI: 10.1145/1146598.1146609 |
0.721 |
|
2005 |
Stolfo SJ, Apap F, Eskin E, Heller K, Hershkop S, Honig A, Svore K. A comparative evaluation of two algorithms for Windows Registry Anomaly Detection Journal of Computer Security. 13: 659-693. DOI: 10.3233/Jcs-2005-13403 |
0.715 |
|
2005 |
Hershkop S, Stolfo SJ. Combining Email models for false positive reduction Proceedings of the Acm Sigkdd International Conference On Knowledge Discovery and Data Mining. 98-107. DOI: 10.1145/1081870.1081885 |
0.64 |
|
2005 |
Stolfo SJ, Hershkop S, Bui LH, Ferster R, Wang K. Anomaly detection in computer security and an application to file system accesses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3488: 14-28. |
0.643 |
|
2004 |
Hershkop S, Stolfo SJ. Identifying spam without peeking at the contents Acm Crossroads Student Magazine. 11: 3-3. DOI: 10.1145/1144403.1144406 |
0.549 |
|
2004 |
Li WJ, Hershkop S, Stolfo SJ. Email archive analysis through graphical visualization Vizsec/Dmsec '04: Proceedings of the 2004 Acm Workshop On Visualization and Data Mining For Computer Security. 128-132. |
0.616 |
|
2003 |
Stolfo SJ, Hershkop S, Wang K, Nimeskern O. EMT/MET: Systems for modeling and detecting errant email Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 290-295. DOI: 10.1109/DISCEX.2003.1194980 |
0.554 |
|
2003 |
Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW. A behavior-based approach to securing email systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2776: 57-81. |
0.642 |
|
2003 |
Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW. Behavior profiling of Email Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2665: 74-90. |
0.547 |
|
2002 |
Apap F, Honig A, Hershkop S, Eskin E, Stolfo S. Detecting malicious software by monitoring anomalous windows registry accesses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 36-53. DOI: 10.1007/3-540-36084-0_3 |
0.716 |
|
2002 |
Bhattacharyya M, Hershkop S, Eskin E. MET: An experimental system for Malicious Email Tracking Proceedings New Security Paradigms Workshop. 3-10. |
0.546 |
|
2001 |
Lee W, Stolfo SJ, Chan PK, Eskin E, Fan W, Miller M, Hershkop S, Zhang J. Real time data mining-based intrusion detection Proceedings - Darpa Information Survivability Conference and Exposition Ii, Discex 2001. 1: 89-100. DOI: 10.1109/DISCEX.2001.932195 |
0.698 |
|
Show low-probability matches. |