Shlomo Hershkop, Ph.D. - Publications

Affiliations: 
2006 Columbia University, New York, NY 
Area:
Computer Security, Intrusion and Anomaly Detection, Embedded Device Security, Data Mining/machine Learning

21 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Voris J, Song Y, Salem MB, Hershkop S, Stolfo SJ. Active authentication using file system decoys and user behavior modeling: results of a large scale study Computers & Security. 87: 101412. DOI: 10.1016/J.Cose.2018.07.021  0.723
2013 Song Y, Salem MB, Hershkop S, Stolfo SJ. System level user behavior biometrics using Fisher features and Gaussian mixture models Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2013. 52-59. DOI: 10.1109/SPW.2013.33  0.64
2009 Bowen BM, Ben Salem M, Hershkop S, Keromytis AD, Stolfo SJ. Designing host and network sensors to mitigate the insider threat Ieee Security and Privacy. 7: 22-29. DOI: 10.1109/MSP.2009.109  0.707
2009 Bowen BM, Hershkop S, Keromytis AD, Stolfo SJ. Baiting inside attackers using decoy documents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 51-70. DOI: 10.1007/978-3-642-05284-2_4  0.565
2009 Creamer G, Rowe R, Hershkop S, Stolfo SJ. Segmentation and automated social hierarchy detection through email network analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5439: 40-58. DOI: 10.1007/978-3-642-00528-2_3  0.75
2008 Salem MB, Hershkop S, Stolfo SJ. A Survey of Insider Attack Detection Research Advances in Information Security. 39: 69-70.  0.583
2008 Stolfo SJ, Bellovin SM, Hershkop S, Keromytis AD, Sinclair S, Smith SW. Insider attack and cyber security: Beyond the Hacker Advances in Information Security. 39.  0.538
2007 Rowe R, Creamer G, Hershkop S, Stolfo SJ. Automated social hierarchy detection through email network analysis Joint Ninth Webkdd and First Sna-Kdd 2007 Workshop On Web Mining and Social Network Analysis. 109-117. DOI: 10.1145/1348549.1348562  0.746
2006 Stolfo SJ, Hershkop S, Hu CW, Li WJ, Nimeskern O, Wang KE. Behavior-based modeling and its application to Email analysis Acm Transactions On Internet Technology. 6: 187-221. DOI: 10.1145/1149121.1149125  0.728
2006 Stolfo SJ, Creamer G, Hershkop S. A temporal based forensic analysis of electronic communication Acm International Conference Proceeding Series. 151: 23-24. DOI: 10.1145/1146598.1146609  0.721
2005 Stolfo SJ, Apap F, Eskin E, Heller K, Hershkop S, Honig A, Svore K. A comparative evaluation of two algorithms for Windows Registry Anomaly Detection Journal of Computer Security. 13: 659-693. DOI: 10.3233/Jcs-2005-13403  0.715
2005 Hershkop S, Stolfo SJ. Combining Email models for false positive reduction Proceedings of the Acm Sigkdd International Conference On Knowledge Discovery and Data Mining. 98-107. DOI: 10.1145/1081870.1081885  0.64
2005 Stolfo SJ, Hershkop S, Bui LH, Ferster R, Wang K. Anomaly detection in computer security and an application to file system accesses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3488: 14-28.  0.643
2004 Hershkop S, Stolfo SJ. Identifying spam without peeking at the contents Acm Crossroads Student Magazine. 11: 3-3. DOI: 10.1145/1144403.1144406  0.549
2004 Li WJ, Hershkop S, Stolfo SJ. Email archive analysis through graphical visualization Vizsec/Dmsec '04: Proceedings of the 2004 Acm Workshop On Visualization and Data Mining For Computer Security. 128-132.  0.616
2003 Stolfo SJ, Hershkop S, Wang K, Nimeskern O. EMT/MET: Systems for modeling and detecting errant email Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 290-295. DOI: 10.1109/DISCEX.2003.1194980  0.554
2003 Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW. A behavior-based approach to securing email systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2776: 57-81.  0.642
2003 Stolfo SJ, Hershkop S, Wang K, Nimeskern O, Hu CW. Behavior profiling of Email Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2665: 74-90.  0.547
2002 Apap F, Honig A, Hershkop S, Eskin E, Stolfo S. Detecting malicious software by monitoring anomalous windows registry accesses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 36-53. DOI: 10.1007/3-540-36084-0_3  0.716
2002 Bhattacharyya M, Hershkop S, Eskin E. MET: An experimental system for Malicious Email Tracking Proceedings New Security Paradigms Workshop. 3-10.  0.546
2001 Lee W, Stolfo SJ, Chan PK, Eskin E, Fan W, Miller M, Hershkop S, Zhang J. Real time data mining-based intrusion detection Proceedings - Darpa Information Survivability Conference and Exposition Ii, Discex 2001. 1: 89-100. DOI: 10.1109/DISCEX.2001.932195  0.698
Show low-probability matches.