default search action
Salvatore J. Stolfo
Person information
- affiliation: Columbia University, New York City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j43]Germán Creamer, Salvatore J. Stolfo, Mateo Creamer, Shlomo Hershkop, Ryan Rowe:
Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case. Complex. 2022: 8154476:1-8154476:18 (2022)
2010 – 2019
- 2019
- [j42]Jonathan Voris, Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
Active authentication using file system decoys and user behavior modeling: results of a large scale study. Comput. Secur. 87 (2019) - 2018
- [j41]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Motivating Security-Aware Energy Management. IEEE Micro 38(3): 98-106 (2018) - [c121]Preetam Dutta, Gabriel Ryan, Aleksander Zieba, Salvatore J. Stolfo:
Simulated User Bots: Real Time Testing of Insider Threat Detection Systems. IEEE Symposium on Security and Privacy Workshops 2018: 228-236 - 2017
- [b2]Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo:
Anomaly Detection as a Service: Challenges, Advances, and Opportunities. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01226-6 - [c120]Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
NEZHA: Efficient Domain-Independent Differential Testing. IEEE Symposium on Security and Privacy 2017: 615-632 - [c119]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. USENIX Security Symposium 2017: 1057-1074 - [i2]Theofilos Petsios, Adrian Tang, Dimitris Mitropoulos, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
Tug-of-War: Observations on Unified Content Handling. CoRR abs/1708.09334 (2017) - 2016
- [c118]David M. Tagatac, Michalis Polychronakis, Salvatore J. Stolfo:
Using Diversity to Harden Multithreaded Programs Against Exploitation. BigDataSecurity/HPSC/IDS 2016: 208-213 - [c117]Jonathan Voris, Yingbo Song, Malek Ben Salem, Salvatore J. Stolfo:
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage. MobiCASE 2016: 51-61 - 2015
- [c116]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads. CCS 2015: 256-267 - [c115]Jonathan Voris, Jill Jermyn, Nathaniel Boggs, Salvatore J. Stolfo:
Fox in the trap: thwarting masqueraders via automated decoy document deployment. EUROSEC 2015: 3:1-3:7 - [c114]Adrian Tang, John Demme, Simha Sethumadhavan, Salvatore J. Stolfo:
A silicon anti-virus engine. Hot Chips Symposium 2015: 1 - [c113]Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin, Salvatore J. Stolfo:
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks. WOWMOM 2015: 1-9 - 2014
- [c112]Sean Whalen, Nathaniel Boggs, Salvatore J. Stolfo:
Model Aggregation for Distributed Content Anomaly Detection. AISec@CCS 2014: 61-71 - [c111]Jill Jermyn, Jinho Hwang, Kun Bai, Maja Vukovic, Nikos Anerousis, Salvatore J. Stolfo:
Improving readiness for enterprise migration to the cloud. Middleware (Industry Track) 2014: 5:1-5:7 - [c110]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Unsupervised Anomaly-Based Malware Detection Using Hardware Features. RAID 2014: 109-129 - [c109]Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo:
Measuring Drive-by Download Defense in Depth. RAID 2014: 172-191 - [c108]Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo:
Synthetic Data Generation and Defense in Depth Measurement of Web Applications. RAID 2014: 234-254 - [i1]Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Unsupervised Anomaly-based Malware Detection using Hardware Features. CoRR abs/1403.1631 (2014) - 2013
- [j40]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design. Inf. Manag. Comput. Secur. 21(2): 121-138 (2013) - [c107]John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, Salvatore J. Stolfo:
On the feasibility of online malware detection with performance counters. ISCA 2013: 559-570 - [c106]Ang Cui, Michael Costello, Salvatore J. Stolfo:
When Firmware Modifications Attack: A Case Study of Embedded Exploitation. NDSS 2013 - [c105]Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models. IEEE Symposium on Security and Privacy Workshops 2013: 52-59 - [e4]Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright:
Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science 8145, Springer 2013, ISBN 978-3-642-41283-7 [contents] - 2012
- [j39]Shari Lawrence Pfleeger, Marc Rogers, Masooda N. Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo:
Does Profiling Make Us More Secure? IEEE Secur. Priv. 10(4): 10-15 (2012) - [j38]Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo:
Usable, Secure, Private Search. IEEE Secur. Priv. 10(5): 53-60 (2012) - [j37]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. J. Comput. Secur. 20(2-3): 199-221 (2012) - [j36]Malek Ben Salem, Salvatore J. Stolfo:
Combining Baiting and User Search Profiling Techniques for Masquerade Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 13-29 (2012) - [j35]Malek Ben Salem, Salvatore J. Stolfo:
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection. Secur. Commun. Networks 5(8): 863-872 (2012) - [c104]Young Hee Park, Salvatore J. Stolfo:
Software decoys for insider threat. AsiaCCS 2012: 93-94 - [c103]Junfeng Yang, Ang Cui, Salvatore J. Stolfo, Simha Sethumadhavan:
Concurrency Attacks. HotPar 2012 - [c102]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou:
The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450 - [c101]Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis:
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshops 2012: 125-128 - [c100]Jonathan Voris, Nathaniel Boggs, Salvatore J. Stolfo:
Lost in Translation: Improving Decoy Documents via Automated Translation. IEEE Symposium on Security and Privacy Workshops 2012: 129-133 - [e3]Davide Balzarotti, Salvatore J. Stolfo, Marco Cova:
Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings. Lecture Notes in Computer Science 7462, Springer 2012, ISBN 978-3-642-33337-8 [contents] - 2011
- [j34]David Evans, Salvatore J. Stolfo:
Guest Editors' Introduction: The Science of Security. IEEE Secur. Priv. 9(3): 16-17 (2011) - [j33]Salvatore J. Stolfo, Steven M. Bellovin, David Evans:
Measuring Security. IEEE Secur. Priv. 9(3): 60-65 (2011) - [c99]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. ACSAC 2011: 393-402 - [c98]Ang Cui, Salvatore J. Stolfo:
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner. BADGERS@EuroSys 2011: 8-18 - [c97]Malek Ben Salem, Salvatore J. Stolfo:
Decoy Document Deployment for Effective Masquerade Attack Detection. DIMVA 2011: 35-54 - [c96]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou, Anup K. Ghosh, Dawson R. Engler, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - [c95]Simha Sethumadhavan, Salvatore J. Stolfo, Angelos D. Keromytis, Junfeng Yang, David I. August:
The SPARCHS Project: Hardware Support for Software Security. SysSec@DIMVA 2011: 119-122 - [c94]Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo:
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. RAID 2011: 142-160 - [c93]Malek Ben Salem, Salvatore J. Stolfo:
Modeling User Search Behavior for Masquerade Detection. RAID 2011: 181-200 - [c92]Ang Cui, Salvatore J. Stolfo:
Defending Embedded Systems with Software Symbiotes. RAID 2011: 358-377 - [c91]Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. WOOT 2011: 19-27 - [c90]Malek Ben Salem, Salvatore J. Stolfo:
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned. CSET 2011 - [p6]Ang Cui, Salvatore J. Stolfo:
Symbiotes and defensive Mutualism: Moving Target Defense. Moving Target Defense 2011: 99-108 - [r1]Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem:
Insider Threat Defense. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 609-611 - 2010
- [j32]Germán Creamer, Salvatore J. Stolfo:
Erratum to: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 21(3): 542 (2010) - [j31]Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo:
Ethics in Security Vulnerability Research. IEEE Secur. Priv. 8(2): 67-72 (2010) - [j30]Salvatore J. Stolfo, Gene Tsudik:
Privacy-Preserving Sharing of Sensitive Information. IEEE Secur. Priv. 8(4): 16-17 (2010) - [j29]Malek Ben Salem, Salvatore J. Stolfo:
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 3-13 (2010) - [j28]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Mach. Learn. 81(2): 179-205 (2010) - [c89]Ang Cui, Salvatore J. Stolfo:
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. ACSAC 2010: 97-106 - [c88]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137 - [c87]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
Automating the injection of believable decoys to detect snooping. WISEC 2010: 81-86 - [p5]Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo:
Monitoring Technologies for Mitigating Insider Threats. Insider Threats in Cyber Security 2010: 197-217
2000 – 2009
- 2009
- [j27]Germán Creamer, Salvatore J. Stolfo:
A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 18(3): 419-445 (2009) - [j26]Shari Lawrence Pfleeger, Salvatore J. Stolfo:
Addressing the Insider Threat. IEEE Secur. Priv. 7(6): 10-13 (2009) - [j25]Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Designing Host and Network Sensors to Mitigate the Insider Threat. IEEE Secur. Priv. 7(6): 22-29 (2009) - [c86]Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis:
A Network Access Control Mechanism Based on Behavior Profiles. ACSAC 2009: 3-12 - [c85]Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo:
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46 - [c84]Salvatore J. Stolfo:
Polymorphic shellcode: the demise of signature-based detection. CSIIRW 2009: 7 - [c83]Doug Maughan, George Hull, Salvatore J. Stolfo, Robert J. Stratton III:
Keynote panel. CSIIRW 2009: 10 - [c82]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ICISS 2009: 193-207 - [c81]Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo:
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. NDSS 2009 - [c80]Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo:
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60 - [c79]Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo:
Brave New World: Pervasive Insecurity of Embedded Network Devices. RAID 2009: 378-380 - [c78]Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Baiting Inside Attackers Using Decoy Documents. SecureComm 2009: 51-70 - 2008
- [c77]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ACSAC 2008: 367-376 - [c76]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190 - [c75]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 - [c74]Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. SP 2008: 81-95 - [p4]Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
A Survey of Insider Attack Detection Research. Insider Attack and Cyber Security 2008: 69-90 - [e2]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents] - 2007
- [c73]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode. CCS 2007: 541-551 - [c72]Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis:
A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250 - [c71]Germán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo:
Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. WebKDD/SNA-KDD 2007: 40-58 - [p3]Salvatore J. Stolfo, Ke Wang, Wei-Jen Li:
Towards Stealthy Malware Detection. Malware Detection 2007: 231-249 - 2006
- [j24]Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang:
Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006) - [c70]Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo:
Intrusion and anomaly detection model exchange for mobile ad-hoc networks. CCNC 2006: 635-639 - [c69]Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop:
A temporal based forensic analysis of electronic communication. DG.O 2006: 23-24 - [c68]Ke Wang, Janak J. Parekh, Salvatore J. Stolfo:
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248 - [c67]Janak J. Parekh, Ke Wang, Salvatore J. Stolfo:
Privacy-preserving payload-based correlation for accurate malicious traffic detection. LSAD@SIGCOMM 2006: 99-106 - [c66]Suhit Gupta, Hila Becker, Gail E. Kaiser, Salvatore J. Stolfo:
Verifying genre-based clustering approach to content extraction. WWW 2006: 875-876 - 2005
- [j23]Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine A. Heller, Shlomo Hershkop, Andrew Honig, Krysta M. Svore:
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. J. Comput. Secur. 13(4): 659-693 (2005) - [c65]Salvatore J. Stolfo, Shlomo Hershkop:
Email mining toolkit supporting law enforcement forensic analyses. DG.O 2005: 221-222 - [c64]Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang:
Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28 - [c63]Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:
An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 - [c62]Shlomo Hershkop, Salvatore J. Stolfo:
Combining email models for false positive reduction. KDD 2005: 98-107 - [c61]Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 - [c60]Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo:
Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246 - [c59]Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo:
Extracting context to improve accuracy for HTML content extraction. WWW (Special interest tracks and posters) 2005: 1114-1115 - 2004
- [j22]Shlomo Hershkop, Salvatore J. Stolfo:
Identifying spam without peeking at the contents. ACM Crossroads 11(2): 3 (2004) - [j21]Salvatore J. Stolfo:
Worm and Attack Early Warning. IEEE Secur. Priv. 2(3): 73-75 (2004) - [j20]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan:
Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004) - [c58]Ke Wang, Salvatore J. Stolfo:
Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222 - [c57]Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo:
Email archive analysis through graphical visualization. VizSEC 2004: 128-132 - 2003
- [c56]Angelos D. Keromytis, Janak J. Parekh, Philip Gross, Gail E. Kaiser, Vishal Misra, Jason Nieh, Dan Rubenstein, Salvatore J. Stolfo:
A holistic approach to service survivability. SSRS@CCS 2003: 11-22 - [c55]Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicec, Stephen Jan:
Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. DG.O 2003 - [c54]Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo:
Surveillance Detection in High Bandwidth Environments. DISCEX (1) 2003: 130- - [c53]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern:
EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290- - [c52]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
Behavior Profiling of Email. ISI 2003: 74-90 - [c51]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81 - 2002
- [j19]Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok:
Toward Cost-Sensitive Modeling for Intrusion Detection and Response. J. Comput. Secur. 10(1/2): 5-22 (2002) - [c50]Herbert Schorr, Salvatore J. Stolfo:
Towards the Digital Government of the 21st Century. DG.O 2002 - [c49]Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo:
A Fully Distributed Framework for Cost-Sensitive Data Mining. ICDCS 2002: 445-446 - [c48]Wei Fan, Haixun Wang, Philip S. Yu, Shaw-Hwa Lo, Salvatore J. Stolfo:
Progressive Modeling. ICDM 2002: 163-170 - [c47]Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo:
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. RAID 2002: 36-53 - [c46]Wei Fan, Salvatore J. Stolfo:
Ensemble-based Adaptive Intrusion Detection. SDM 2002: 41-58 - [c45]Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo:
A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. SDM 2002: 437-453 - [p2]Eleazar Eskin, Andrew Arnold, Michael J. Prerau, Leonid Portnoy, Salvatore J. Stolfo:
A Geometric Framework for Unsupervised Anomaly Detection. Applications of Data Mining in Computer Security 2002: 77-101 - [p1]Andrew Honig, Andrew Howard, Eleazar Eskin, Salvatore J. Stolfo:
Adaptive Model Generation. Applications of Data Mining in Computer Security 2002: 153-193 - 2001
- [j18]Andreas L. Prodromidis, Salvatore J. Stolfo:
Cost Complexity-Based Pruning of Ensemble Classifiers. Knowl. Inf. Syst. 3(4): 449-469 (2001) - [j17]Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin:
Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Rec. 30(4): 5-14 (2001) - [c44]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan:
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130 - [c43]Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:
Data Mining Methods for Detection of New Malicious Executables. S&P 2001: 38-49 - [c42]Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Salvatore J. Stolfo:
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables. USENIX ATC, FREENIX Track 2001: 245-252 - 2000
- [j16]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000) - [j15]Wenke Lee, Salvatore J. Stolfo:
A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000) - [c41]Herbert Schorr, Salvatore J. Stolfo:
Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services. DG.O 2000 - [c40]Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller:
A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153 - [c39]Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo:
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65 - [e1]Raghu Ramakrishnan, Salvatore J. Stolfo, Roberto J. Bayardo, Ismail Parsa:
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, Boston, MA, USA, August 20-23, 2000. ACM 2000, ISBN 1-58113-233-6 [contents]
1990 – 1999
- 1999
- [j14]Philip Chan, Wei Fan, Andreas L. Prodromidis, Salvatore J. Stolfo:
Distributed data mining in credit card fraud detection. IEEE Intell. Syst. 14(6): 67-74 (1999) - [j13]Philip K. Chan, Salvatore J. Stolfo, David H. Wolpert:
Guest Editors' Introduction. Mach. Learn. 36(1-2): 5-7 (1999) - [c38]Andreas L. Prodromidis, Salvatore J. Stolfo:
Minimal Cost Complexity Pruning of Meta-Classifiers. AAAI/IAAI 1999: 979 - [c37]Wei Fan, Salvatore J. Stolfo, Junxin Zhang, Philip K. Chan:
AdaCost: Misclassification Cost-Sensitive Boosting. ICML 1999: 97-105 - [c36]Wenke Lee, Christopher T. Park, Salvatore J. Stolfo:
Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72 - [c35]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124 - [c34]Wei Fan, Salvatore J. Stolfo, Junxin Zhang:
The Application of AdaBoost for Distributed, Scalable and On-Line Learning. KDD 1999: 362-366 - [c33]Wenke Lee, Salvatore J. Stolfo:
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999 - [c32]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
A Data Mining Framework for Building Intrusion Detection Models. S&P 1999: 120-132 - 1998
- [j12]Tom Fawcett, Ira J. Haimowitz, Foster J. Provost, Salvatore J. Stolfo:
AI Approaches to Fraud Detection and Risk Management. AI Mag. 19(2): 107-108 (1998) - [j11]Herbert Schorr, Salvatore J. Stolfo:
A Digital Government for the 21st Century. Commun. ACM 41(11): 15-19 (1998) - [j10]Mauricio A. Hernández, Salvatore J. Stolfo:
Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem. Data Min. Knowl. Discov. 2(1): 9-37 (1998) - [j9]Shih-Fu Chang, Luis Gravano, Gail E. Kaiser, Kenneth A. Ross, Salvatore J. Stolfo:
Database Research at Columbia University. SIGMOD Rec. 27(3): 75-80 (1998) - [c31]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72 - [c30]Philip K. Chan, Salvatore J. Stolfo:
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. KDD 1998: 164-168 - [c29]Andreas L. Prodromidis, Salvatore J. Stolfo:
Mining Databases with Different Schemas: Integrating Incompatible Classifiers. KDD 1998: 314-318 - [c28]Wenke Lee, Salvatore J. Stolfo:
Data Mining Approaches for Intrusion Detection. USENIX Security Symposium 1998 - [d1]Salvatore J. Stolfo, Wei Fan, Wenke Lee, Andreas L. Prodromidis, Philip Chan:
KDD Cup 1999 Data. UCI Machine Learning Repository, 1998 - 1997
- [j8]Philip K. Chan, Salvatore J. Stolfo:
On the Accuracy of Meta-Learning for Scalable Data Mining. J. Intell. Inf. Syst. 8(1): 5-28 (1997) - [c27]Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan:
JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81 - 1996
- [c26]Philip K. Chan, Salvatore J. Stolfo:
Sharing Learned Models among Remote Database Partitions by Local Meta-Learning. KDD 1996: 2-7 - 1995
- [c25]Philip K. Chan, Salvatore J. Stolfo:
A Comparative Evaluation of Voting and Meta-learning on Partitioned Data. ICML 1995: 90-98 - [c24]Shmuel Kliger, Shaula Yemini, Yechiam Yemini, David Ohsie, Salvatore J. Stolfo:
A coding approach to event correlation. Integrated Network Management 1995: 266-277 - [c23]Philip K. Chan, Salvatore J. Stolfo:
Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning. KDD 1995: 39-44 - [c22]Mauricio A. Hernández, Salvatore J. Stolfo:
The Merge/Purge Problem for Large Databases. SIGMOD Conference 1995: 127-138 - 1994
- [j7]Hasanat M. Dewan, Salvatore J. Stolfo, Leland Woodbury:
Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing. J. Parallel Distributed Comput. 22(3): 506-522 (1994) - [c21]Hasanat M. Dewan, Mauricio A. Hernández, Kui W. Mok, Salvatore J. Stolfo:
Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew. PDIS 1994: 40-49 - [c20]David Ohsie, Hasanat M. Dewan, Salvatore J. Stolfo, Sushil Da Silva:
Performance of Incremental Update in Database Rule Processing. RIDE-ADS 1994: 10-18 - [c19]Hasanat M. Dewan, Salvatore J. Stolfo:
Meta-level Control of Rule Execution in a Parallel and Distributed Expert Database System. RIDE-ADS 1994: 105-114 - [c18]Hasanat M. Dewan, Salvatore J. Stolfo, Mauricio A. Hernández, Jae-Jun Hwang:
Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing. SIGMOD Conference 1994: 277-288 - 1993
- [j6]Benjamin W. Wah, Thomas S. Huang, Aravind K. Joshi, Dan I. Moldovan, Yiannis Aloimonos, Ruzena Bajcsy, Dana H. Ballard, Doug DeGroot, Kenneth A. De Jong, Charles R. Dyer, Scott E. Fahlman, Ralph Grishman, Lynette Hirschman, Richard E. Korf, Stephen E. Levinson, Daniel P. Miranker, N. H. Morgan, Sergei Nirenburg, Tomaso A. Poggio, Edward M. Riseman, Craig Stanfil, Salvatore J. Stolfo, Steven L. Tanimoto, Charles C. Weems:
Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. IEEE Trans. Knowl. Data Eng. 5(1): 138-154 (1993) - [c17]Philip K. Chan, Salvatore J. Stolfo:
Experiments on Multi-Strategy Learning by Meta-Learning. CIKM 1993: 314-323 - [c16]Philip K. Chan, Salvatore J. Stolfo:
Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis. ISMB 1993: 65-73 - [c15]Hasanat M. Dewan, Salvatore J. Stolfo:
System Reorganization and Load Balancing of Parallel Database Rule Processing. ISMIS 1993: 186-197 - [c14]Jason S. Glazier, Salvatore J. Stolfo:
Dynamic neighborhood bounding for Monte Carlo simulation. WSC 1993: 466-473 - 1992
- [j5]Hasanat M. Dewan, David Ohsie, Salvatore J. Stolfo, Ouri Wolfson, Sushil Da Silva:
Incremental Database Rule Processing In PARADISER. J. Intell. Inf. Syst. 1(2): 177-209 (1992) - [c13]Mark Perlin, Jaime G. Carbonell, Daniel P. Miranker, Salvatore J. Stolfo, Milind Tambe:
Is Production System Match Interesting? ICTAI 1992: 2-3 - 1991
- [j4]Salvatore J. Stolfo, Ouri Wolfson, Philip K. Chan, Hasanat M. Dewan, Leland Woodbury, Jason S. Glazier, David Ohsie:
PARULE: Parallel Rule Processing Using Meta-rules for Redaction. J. Parallel Distributed Comput. 13(4): 366-382 (1991) - [c12]Salvatore J. Stolfo, Hasanat M. Dewan, Ouri Wolfson:
The PARULEL Parallel Rule Language. ICPP (2) 1991: 36-45 - [c11]Ouri Wolfson, Hasanat M. Dewan, Salvatore J. Stolfo, Yechiam Yemini:
Incremental Evaluation of Rules and its Relationship to Parallelism. SIGMOD Conference 1991: 78-87
1980 – 1989
- 1989
- [c10]Salvatore J. Stolfo, Zvi Galil, Kathleen R. McKeown, Russell Mills:
Speech Recognition in Parallel. HLT (2) 1989 - 1987
- [j3]Salvatore J. Stolfo:
Initial Performance of the DADO2 Prototype. Computer 20(1): 75-83 (1987) - 1986
- [j2]Salvatore J. Stolfo, Daniel P. Miranker:
The DADO Production System Machine. J. Parallel Distributed Comput. 3(2): 269-296 (1986) - [c9]Michael van Biema, Daniel P. Miranker, Salvatore J. Stolfo:
The Do-loop Considered Harmful in Production System Programming. Expert Database Conf. 1986: 177-190 - 1985
- [c8]Toru Ishida, Salvatore J. Stolfo:
Towards the Parallel Execution of Rules in Production System Programs. ICPP 1985: 568-575 - 1984
- [c7]Salvatore J. Stolfo:
Five Parallel Algorithms for Production System Execution on the DADO Machine. AAAI 1984: 300-307 - [c6]Andy Lowry, Stephen Taylor, Salvatore J. Stolfo:
LPS Algorithms. FGCS 1984: 436-448 - [c5]Stephen Taylor, Andy Lowry, Gerald Q. Maguire Jr., Salvatore J. Stolfo:
Logic Programming Using Parallel Associative Operations. SLP 1984: 58-68 - 1983
- [c4]Gregg T. Vesonder, Salvatore J. Stolfo, John E. Zielinski, Frederick D. Miller, David H. Copp:
ACE: An Expert System for Telephone Cable Maintenance. IJCAI 1983: 116-121 - [c3]Salvatore J. Stolfo, Daniel P. Miranker, David Elliot Shaw:
Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence. IJCAI 1983: 850-854 - 1982
- [c2]Salvatore J. Stolfo, David Elliot Shaw:
DADO: A Tree-Structured Machine Architecture for Production Systems. AAAI 1982: 242-246 - 1981
- [j1]David Elliot Shaw, Salvatore J. Stolfo, Hussein Ibrahim, Bruce Hillyer, Gio Wiederhold, J. A. Andrews:
The NON-VON Database Machine: A Brief Overview. IEEE Database Eng. Bull. 4(2): 41-52 (1981)
1970 – 1979
- 1979
- [b1]Salvatore J. Stolfo:
Automatic Discovery of Heuristics for Nondeterministic Programs from Sample Execution Traces. New York University, USA, 1979 - [c1]Salvatore J. Stolfo, Malcolm C. Harrison:
Automatic Discovery of Heuristics for Nondeterministic Programs. IJCAI 1979: 853-855
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint