Home > Publications >
Documents
Selection | File type icon | File name | Description | Size | Revision | Time | User |
---|---|---|---|---|---|---|---|
ċ
|
View |
Salvatore J. Stolfo, L. Bui, Shlomo. Hershkop,"Unsupervised Anomaly Detection in Computer Security and an Application to File System Access", Proc. ISMIS, 2005 | Sep 8, 2008, 8:03 PM | Ang Cui | |||
ċ
|
View |
Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicic, and Stephen Jan. ``Citizen's Attitudes about Privacy While Accessing Government Websites: Results of an Online Study" | Sep 8, 2008, 8:10 PM | Ang Cui | |||
ċ
|
View |
Ke Wang, Janak J. Parekh, Salvatore J. Stolfo "Anagram: A Content Anomaly Detector Resistant To Mimicry Attack" In Proceedings of the Nineth International Symposium on Recent Advances in Intrusion Detection(RAID 2006) | Sep 8, 2008, 8:01 PM | Ang Cui | |||
ċ
|
View |
Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo "Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks" In Proceddings of IEEE Consumer Communications and Networking Conference. Jan 2006 | Sep 8, 2008, 8:02 PM | Ang Cui | |||
ċ
|
View |
Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis and Salvatore J. Stolfo "On the Infeasibility of Modeling Polymorphic Shellcode"" In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). October 2007, Alexandria, Virginia, USA. | Sep 8, 2008, 8:00 PM | Ang Cui | |||
ċ
|
View |
Michael E. Locasto, Janak J. Parekh, Salvatore J. Stolfo, Angelos D. Keromytis, Tal Malkin, Vishal Misra. "Collaborative Distributive Intrusion Detection". CU Tech Report CUCS-012-04, 2004. | Sep 8, 2008, 8:05 PM | Ang Cui | |||
ċ
|
View |
Ke Wang, Salvatore J. Stolfo. "One Class Training for Masquerade Detection ". 3rd IEEE Conf Data Mining Workshop on Data Mining for Computer Security, Florida, Nov. 19, 2003 | Sep 8, 2008, 8:09 PM | Ang Cui | |||
ċ
|
View |
Salvatore J. Stolfo,Shlomo Hershkop, Ke Wang, Olivier Nimeskern and Chia-Wei Hu. "A Behavior-based Approach to Securing Email Systems". "Mathematical Methods, Models and Architectures for Computer Networks Security", Proceedings published by Springer Verlag, Sept. 2003. | Sep 8, 2008, 8:09 PM | Ang Cui | |||
ċ
|
View |
Salvatore J. Stolfo, Chia-Wei Hu, Wei-Jen Li, Shlomo Hershkop, Ke Wang, and Olivier Nimeskern. "Combining Behavior Models to Secure Email Systems". CU Tech Report April 2003. | Sep 8, 2008, 8:09 PM | Ang Cui | |||
ċ
|
View |
Wei-Jen Li, Ke Wang, Salvatore J. Stolfo, "Fileprints: Identifying File Types by n-gram Analysis." 2005 IEEE Information Assurance Workshop. | Sep 8, 2008, 8:04 PM | Ang Cui | |||
ċ
|
View |
Shlomo Hershkop, Ryan Ferster, Linh H. Bui, Ke Wang and Salvatore J. Stolfo. "Host-based Anomaly Detection Using Wrapping File Systems". CU Tech Report April 2004. | Sep 8, 2008, 8:07 PM | Ang Cui | |||
ċ
|
View |
Gabriela F. Cretu, Angelos Stavrou, Salvatore J. Stolfo, Angelos D. Keromytis "Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems" In the Proceedings of the Third Workshop on Hot Topics in System Dependability, June 2007, Edinburgh, UK | Sep 8, 2008, 7:56 PM | Ang Cui | |||
ċ
|
View |
Janak J. Parekh, Ke Wang, Salvatore J. Stolfo " Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection " In SIGCOMM Workshop on Large Scale Attack Defence 2006 | Sep 8, 2008, 8:01 PM | Ang Cui | |||
ċ
|
View |
Michael Locasto, Ke Wang, Angelos Keromytis, Sal Stolfo. "FLIPS: Hybrid Adaptive Intrusion Prevention", Recent Advance in Intrusion Detection (RAID), Sept. 2005. | Sep 8, 2008, 8:05 PM | Ang Cui | |||
ċ
|
View |
M. Locasto, J. Parekh, A. Keromytis, S. Stolfo. "Towards Collaborative Security and P2P Intrusion Detection." In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, June 2005 | Sep 8, 2008, 8:04 PM | Ang Cui | |||
ċ
|
View |
Steve Ulfelder. "Spam-busters". Network World March 22, 2004 | Sep 8, 2008, 8:06 PM | Ang Cui | |||
ċ
|
View |
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo "Extended Abstract: Online Training and Sanitization of AD Systems" NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security, December 2007, Vancouver, B.C., Canada | Sep 8, 2008, 8:00 PM | Ang Cui | |||
ċ
|
View |
Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, and Chia-Wei Hu. ``Behavior Profiling of Email" 1st NSF/NIJ Symposium on Intelligence & Security Informatics(ISI 2003). June 2-3,2003,Tucson,Arizona,USA | Sep 8, 2008, 8:10 PM | Ang Cui | |||
ċ
|
View |
Katherine A Heller, Krysta M Svore, Angelos D. Keromytis, and Salvatore J. Stolfo. "One Class Support Vector Machines for Detecting Anomalous Window Registry Accesses". 3rd IEEE Conference Data Mining Workshop on Data Mining for Computer Security, Florida, November 19, 2003. | Sep 8, 2008, 8:10 PM | Ang Cui | |||
ċ
|
View |
Ke Wang, Salvatore J. Stolfo. "Anomalous Payload-based Network Intrusion Detection". RAID, Sept., 2004. | Sep 8, 2008, 8:07 PM | Ang Cui | |||
ċ
|
View |
Ke Wang, Gabriela Cretu, Salvatore J. Stolfo "Anomalous Payload-based Worm Detection and Signature Generation" Proceedings of the Eighth International Symposium on Recent Advances in Intrusion Detection(RAID 2005) | Sep 8, 2008, 8:03 PM | Ang Cui | |||
ċ
|
View |
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo, "Email Archive Analysis Through Graphical Visualization." ACM CCS VizSEC/DMSEC'04 | Sep 8, 2008, 8:05 PM | Ang Cui | |||
ċ
|
View |
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis "Casting out Demons: Sanitizing Training Data for Anomaly Sensors" To appear in the Proceedings of the IEEE Symposium on Security & Privacy. May 2008, Oakland, CA. | Sep 8, 2008, 7:55 PM | Ang Cui | |||
ċ
|
View |
Seth Robertson, Eric V. Siegel, Matt Miller, and Salvatore J. Stolfo. ``Surveillance Detection in High Bandwidth Environments.'' In Proceedings of the 2003 DARPA DISCEX III Conference. April, 2003. | Sep 8, 2008, 8:11 PM | Ang Cui | |||
ċ
|
View |
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos Keromytis "A Study of Malcode-Bearing Documents" In the Proceedings of 4th GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, July 2007, Lucerne, Switzerland. | Sep 8, 2008, 7:58 PM | Ang Cui | |||
ċ
|
View |
Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, and Angelos D. Keromytis "From STEM to SEAD: Speculative Execution for Automated Defense" In the Proceedings of the USENIX Annual Technical Conference. June 2007, Santa Clara, CA | Sep 8, 2008, 7:57 PM | Ang Cui | |||
ċ
|
View |
Eric Roston. "The Code Warriors". Time Magazine Nov. 10, 2003 Vol. 162, Iss. 19; pg. S2. | Sep 8, 2008, 8:08 PM | Ang Cui | |||
ċ
|
View |
Salvatore J. Stolfo, Wei-Jen Li, Shlomo Hershkop, Ke Wang, Chia-Wei Hu, Olivier Nimeskern. "Detecting Viral Propagations Using Email Behavior Profiles". CU Tech Report 2003. | Sep 8, 2008, 8:08 PM | Ang Cui | |||
ċ
|
View |
Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang "Behavior-based Modeling and its Application to Email Analysis" ACM Transactions on Internet Technology (TOIT) , Feb 2006. | Sep 8, 2008, 8:02 PM | Ang Cui | |||
ċ
|
View |
Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore. "A comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection". Journal of Computer Security, Vol 13, No. 4, 2005 | Sep 8, 2008, 8:02 PM | Ang Cui | |||
ċ
|
View |
Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore. "A comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection". CU Tech Report Feb. 23, 2004 | Sep 8, 2008, 8:06 PM | Ang Cui |