2009 | ||
---|---|---|
102 | Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis: A Network Access Control Mechanism Based on Behavior Profiles. ACSAC 2009: 3-12 | |
101 | Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo: Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46 | |
100 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ICISS 2009: 193-207 | |
99 | Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo: Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. NDSS 2009 | |
98 | Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo: Brave New World: Pervasive Insecurity of Embedded Network Devices. RAID 2009: 378-380 | |
97 | Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo: Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60 | |
96 | Germán Creamer, Salvatore J. Stolfo: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 18(3): 419-445 (2009) | |
95 | Shari Lawrence Pfleeger, Salvatore J. Stolfo: Addressing the Insider Threat. IEEE Security & Privacy 7(6): 10-13 (2009) | |
94 | Brian Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo: Designing Host and Network Sensors to Mitigate the Insider Threat. IEEE Security & Privacy 7(6): 22-29 (2009) | |
2008 | ||
93 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ACSAC 2008: 367-376 | |
92 | Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95 | |
91 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190 | |
90 | Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 | |
2007 | ||
89 | Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551 | |
88 | Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis: A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250 | |
87 | Germán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo: Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. WebKDD/SNA-KDD 2007: 40-58 | |
2006 | ||
86 | Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop: A temporal based forensic analysis of electronic communication. DG.O 2006: 23-24 | |
85 | Ke Wang, Janak J. Parekh, Salvatore J. Stolfo: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248 | |
84 | Suhit Gupta, Hila Becker, Gail E. Kaiser, Salvatore J. Stolfo: Verifying genre-based clustering approach to content extraction. WWW 2006: 875-876 | |
83 | Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006) | |
2005 | ||
82 | Salvatore J. Stolfo, Shlomo Hershkop: Email mining toolkit supporting law enforcement forensic analyses. DG.O 2005: 221-222 | |
81 | Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28 | |
80 | Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 | |
79 | Shlomo Hershkop, Salvatore J. Stolfo: Combining email models for false positive reduction. KDD 2005: 98-107 | |
78 | Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo: Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246 | |
77 | Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 | |
76 | Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo: Extracting context to improve accuracy for HTML content extraction. WWW (Special interest tracks and posters) 2005: 1114-1115 | |
75 | Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta Marie Svore: A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. Journal of Computer Security 13(4): 659-693 (2005) | |
2004 | ||
74 | Ke Wang, Salvatore J. Stolfo: Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222 | |
73 | Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo: Email archive analysis through graphical visualization. VizSEC 2004: 128-132 | |
72 | Salvatore J. Stolfo: Worm and Attack Early Warning. IEEE Security & Privacy 2(3): 73-75 (2004) | |
71 | Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004) | |
2003 | ||
70 | Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicec, Stephen Jan: Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. DG.O 2003 | |
69 | Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo: Surveillance Detection in High Bandwidth Environments. DISCEX (1) 2003: 130- | |
68 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290- | |
67 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90 | |
66 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81 | |
2002 | ||
65 | Herbert Schorr, Salvatore J. Stolfo: Towards the Digital Government of the 21st Century. DG.O 2002 | |
64 | Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo: A Fully Distributed Framework for Cost-Sensitive Data Mining. ICDCS 2002: 445-446 | |
63 | Wei Fan, Haixun Wang, Philip S. Yu, Shaw-hwa Lo, Salvatore J. Stolfo: Progressive Modeling. ICDM 2002: 163-170 | |
62 | Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo: Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. RAID 2002: 36-53 | |
61 | Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo: A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. SDM 2002 | |
60 | Wei Fan, Salvatore J. Stolfo: Ensemble-based Adaptive Intrusion Detection. SDM 2002 | |
59 | Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002) | |
2001 | ||
58 | Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130 | |
57 | Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo: Data Mining Methods for Detection of New Malicious Executables. IEEE Symposium on Security and Privacy 2001: 38-49 | |
56 | Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Salvatore J. Stolfo: MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables. USENIX Annual Technical Conference, FREENIX Track 2001: 245-252 | |
55 | Andreas L. Prodromidis, Salvatore J. Stolfo: Cost Complexity-Based Pruning of Ensemble Classifiers. Knowl. Inf. Syst. 3(4): 449-469 (2001) | |
54 | Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001) | |
2000 | ||
53 | Herbert Schorr, Salvatore J. Stolfo: Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services. DG.O 2000 | |
52 | Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153 | |
51 | Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65 | |
50 | Wenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000) | |
49 | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000) | |
1999 | ||
48 | Andreas L. Prodromidis, Salvatore J. Stolfo: Minimal Cost Complexity Pruning of Meta-Classifiers. AAAI/IAAI 1999: 979 | |
47 | Wei Fan, Salvatore J. Stolfo, Junxin Zhang, Philip K. Chan: AdaCost: Misclassification Cost-Sensitive Boosting. ICML 1999: 97-105 | |
46 | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132 | |
45 | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124 | |
44 | Wei Fan, Salvatore J. Stolfo, Junxin Zhang: The Application of AdaBoost for Distributed, Scalable and On-Line Learning. KDD 1999: 362-366 | |
43 | Wenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999 | |
42 | Wenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72 | |
41 | Philip K. Chan, Salvatore J. Stolfo, David Wolpert: Guest Editors' Introduction. Machine Learning 36(1-2): 5-7 (1999) | |
1998 | ||
40 | Philip K. Chan, Salvatore J. Stolfo: Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. KDD 1998: 164-168 | |
39 | Andreas L. Prodromidis, Salvatore J. Stolfo: Mining Databases with Different Schemas: Integrating Incompatible Classifiers. KDD 1998: 314-318 | |
38 | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72 | |
37 | Tom Fawcett, Ira J. Haimowitz, Foster J. Provost, Salvatore J. Stolfo: AI Approaches to Fraud Detection and Risk Management. AI Magazine 19(2): 107-108 (1998) | |
36 | Herbert Schorr, Salvatore J. Stolfo: A Digital Government for the 21st Century. Commun. ACM 41(11): 15-19 (1998) | |
35 | Mauricio A. Hernández, Salvatore J. Stolfo: Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem. Data Min. Knowl. Discov. 2(1): 9-37 (1998) | |
34 | Shih-Fu Chang, Luis Gravano, Gail E. Kaiser, Kenneth A. Ross, Salvatore J. Stolfo: Database Research at Columbia University. SIGMOD Record 27(3): 75-80 (1998) | |
1997 | ||
33 | Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan: JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81 | |
32 | Philip K. Chan, Salvatore J. Stolfo: On the Accuracy of Meta-Learning for Scalable Data Mining. J. Intell. Inf. Syst. 8(1): 5-28 (1997) | |
1996 | ||
31 | Philip K. Chan, Salvatore J. Stolfo: Sharing Learned Models among Remote Database Partitions by Local Meta-Learning. KDD 1996: 2-7 | |
1995 | ||
30 | Philip K. Chan, Salvatore J. Stolfo: A Comparative Evaluation of Voting and Meta-learning on Partitioned Data. ICML 1995: 90-98 | |
29 | S. Kliger, Shaula Yemini, Yechiam Yemini, David Ohsie, Salvatore J. Stolfo: A coding approach to event correlation. Integrated Network Management 1995: 266-277 | |
28 | Philip K. Chan, Salvatore J. Stolfo: Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning. KDD 1995: 39-44 | |
27 | Mauricio A. Hernández, Salvatore J. Stolfo: The Merge/Purge Problem for Large Databases. SIGMOD Conference 1995: 127-138 | |
1994 | ||
26 | Hasanat M. Dewan, Mauricio A. Hernández, Kui W. Mok, Salvatore J. Stolfo: Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew. PDIS 1994: 40-49 | |
25 | David Ohsie, Hasanat M. Dewan, Salvatore J. Stolfo, Sushil Da Silva: Performance of Incremental Update in Database Rule Processing. RIDE-ADS 1994: 10-18 | |
24 | Hasanat M. Dewan, Salvatore J. Stolfo: Meta-level Control of Rule Execution in a Parallel and Distributed Expert Database System. RIDE-ADS 1994: 105-114 | |
23 | Hasanat M. Dewan, Salvatore J. Stolfo, Mauricio A. Hernández, Jae-Jun Hwang: Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing. SIGMOD Conference 1994: 277-288 | |
22 | Hasanat M. Dewan, Salvatore J. Stolfo, Leland Woodbury: Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing. J. Parallel Distrib. Comput. 22(3): 506-522 (1994) | |
1993 | ||
21 | Philip K. Chan, Salvatore J. Stolfo: Experiments on Multi-Strategy Learning by Meta-Learning. CIKM 1993: 314-323 | |
20 | Philip K. Chan, Salvatore J. Stolfo: Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis. ISMB 1993: 65-73 | |
19 | Hasanat M. Dewan, Salvatore J. Stolfo: System Reorganization and Load Balancing of Parallel Database Rule Processing. ISMIS 1993: 186-197 | |
18 | Jason S. Glazier, Salvatore J. Stolfo: Dynamic neighborhood bounding for Monte Carlo simulation. Winter Simulation Conference 1993: 466-473 | |
17 | Benjamin W. Wah, Thomas S. Huang, Aravind K. Joshi, Dan I. Moldovan, Yiannis Aloimonos, Ruzena Bajcsy, Dana H. Ballard, Doug DeGroot, Kenneth DeJong, Charles R. Dyer, Scott E. Fahlman, Ralph Grishman, Lynette Hirschman, Richard E. Korf, Stephen E. Levinson, Daniel P. Miranker, N. H. Morgan, Sergei Nirenburg, Tomaso Poggio, Edward M. Riseman, Craig Stanfil, Salvatore J. Stolfo, Steven L. Tanimoto, Charles C. Weems: Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. IEEE Trans. Knowl. Data Eng. 5(1): 138-154 (1993) | |
1992 | ||
16 | Mark Perlin, Jaime G. Carbonell, Daniel P. Miranker, Salvatore J. Stolfo, Milind Tambe: Is Production System Match Interesting? ICTAI 1992: 2-3 | |
15 | Hasanat M. Dewan, David Ohsie, Salvatore J. Stolfo, Ouri Wolfson, Sushil Da Silva: Incremental Database Rule Processing In PARADISER. J. Intell. Inf. Syst. 1(2): 177-209 (1992) | |
1991 | ||
14 | Salvatore J. Stolfo, Hasanat M. Dewan, Ouri Wolfson: The PARULEL Parallel Rule Language. ICPP (2) 1991: 36-45 | |
13 | Ouri Wolfson, Hasanat M. Dewan, Salvatore J. Stolfo, Yechiam Yemini: Incremental Evaluation of Rules and its Relationship to Parallelism. SIGMOD Conference 1991: 78-87 | |
12 | Salvatore J. Stolfo, Ouri Wolfson, Philip K. Chan, Hasanat M. Dewan, Leland Woodbury, Jason S. Glazier, David Ohsie: PARULE: Parallel Rule Processing Using Meta-rules for Redaction. J. Parallel Distrib. Comput. 13(4): 366-382 (1991) | |
1987 | ||
11 | Salvatore J. Stolfo: Initial Performance of the DADO2 Prototype. IEEE Computer 20(1): 75-83 (1987) | |
1986 | ||
10 | Michael van Biema, Daniel P. Miranker, Salvatore J. Stolfo: The Do-loop Considered Harmful in Production System Programming. Expert Database Conf. 1986: 177-190 | |
9 | Salvatore J. Stolfo, Daniel P. Miranker: The DADO Production System Machine. J. Parallel Distrib. Comput. 3(2): 269-296 (1986) | |
1985 | ||
8 | Toru Ishida, Salvatore J. Stolfo: Towards the Parallel Execution of Rules in Production System Programs. ICPP 1985: 568-575 | |
1984 | ||
7 | Salvatore J. Stolfo: Five Parallel Algorithms for Production System Execution on the DADO Machine. AAAI 1984: 300-307 | |
6 | Andy Lowry, Stephen Taylor, Salvatore J. Stolfo: LPS Algorithms. FGCS 1984: 436-448 | |
5 | Stephen Taylor, Andy Lowry, Gerald Q. Maguire Jr., Salvatore J. Stolfo: Logic Programming Using Parallel Associative Operations. SLP 1984: 58-68 | |
1983 | ||
4 | Gregg T. Vesonder, Salvatore J. Stolfo, John E. Zielinski, Frederick D. Miller, David H. Copp: ACE: An Expert System for Telephone Cable Maintenance. IJCAI 1983: 116-121 | |
3 | Salvatore J. Stolfo, Daniel P. Miranker, David Elliot Shaw: Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence. IJCAI 1983: 850-854 | |
1982 | ||
2 | Salvatore J. Stolfo, David Elliot Shaw: DADO: A Tree-Structured Machine Architecture for Production Systems. AAAI 1982: 242-246 | |
1981 | ||
1 | David Elliot Shaw, Salvatore J. Stolfo, Hussein Ibrahim, Bruce Hillyer, Gio Wiederhold, J. A. Andrews: The NON-VON Database Machine: A Brief Overview. IEEE Database Eng. Bull. 4(2): 41-52 (1981) |