Home‎ > ‎Publications‎ > ‎

Documents

SelectionFile type iconFile nameDescriptionSizeRevisionTimeUser
ċ

View
Salvatore J. Stolfo, L. Bui, Shlomo. Hershkop,"Unsupervised Anomaly Detection in Computer Security and an Application to File System Access", Proc. ISMIS, 2005  Sep 8, 2008, 8:03 PM Ang Cui
ċ

View
Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicic, and Stephen Jan. ``Citizen's Attitudes about Privacy While Accessing Government Websites: Results of an Online Study"  Sep 8, 2008, 8:10 PM Ang Cui
ċ

View
Ke Wang, Janak J. Parekh, Salvatore J. Stolfo "Anagram: A Content Anomaly Detector Resistant To Mimicry Attack" In Proceedings of the Nineth International Symposium on Recent Advances in Intrusion Detection(RAID 2006)  Sep 8, 2008, 8:01 PM Ang Cui
ċ

View
Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo "Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks" In Proceddings of IEEE Consumer Communications and Networking Conference. Jan 2006  Sep 8, 2008, 8:02 PM Ang Cui
ċ

View
Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis and Salvatore J. Stolfo "On the Infeasibility of Modeling Polymorphic Shellcode"" In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). October 2007, Alexandria, Virginia, USA.  Sep 8, 2008, 8:00 PM Ang Cui
ċ

View
Michael E. Locasto, Janak J. Parekh, Salvatore J. Stolfo, Angelos D. Keromytis, Tal Malkin, Vishal Misra. "Collaborative Distributive Intrusion Detection". CU Tech Report CUCS-012-04, 2004.  Sep 8, 2008, 8:05 PM Ang Cui
ċ

View
Ke Wang, Salvatore J. Stolfo. "One Class Training for Masquerade Detection ". 3rd IEEE Conf Data Mining Workshop on Data Mining for Computer Security, Florida, Nov. 19, 2003  Sep 8, 2008, 8:09 PM Ang Cui
ċ

View
Salvatore J. Stolfo,Shlomo Hershkop, Ke Wang, Olivier Nimeskern and Chia-Wei Hu. "A Behavior-based Approach to Securing Email Systems". "Mathematical Methods, Models and Architectures for Computer Networks Security", Proceedings published by Springer Verlag, Sept. 2003.  Sep 8, 2008, 8:09 PM Ang Cui
ċ

View
Salvatore J. Stolfo, Chia-Wei Hu, Wei-Jen Li, Shlomo Hershkop, Ke Wang, and Olivier Nimeskern. "Combining Behavior Models to Secure Email Systems". CU Tech Report April 2003.  Sep 8, 2008, 8:09 PM Ang Cui
ċ

View
Wei-Jen Li, Ke Wang, Salvatore J. Stolfo, "Fileprints: Identifying File Types by n-gram Analysis." 2005 IEEE Information Assurance Workshop.  Sep 8, 2008, 8:04 PM Ang Cui
ċ

View
Shlomo Hershkop, Ryan Ferster, Linh H. Bui, Ke Wang and Salvatore J. Stolfo. "Host-based Anomaly Detection Using Wrapping File Systems". CU Tech Report April 2004.  Sep 8, 2008, 8:07 PM Ang Cui
ċ

View
Gabriela F. Cretu, Angelos Stavrou, Salvatore J. Stolfo, Angelos D. Keromytis "Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems" In the Proceedings of the Third Workshop on Hot Topics in System Dependability, June 2007, Edinburgh, UK  Sep 8, 2008, 7:56 PM Ang Cui
ċ

View
Janak J. Parekh, Ke Wang, Salvatore J. Stolfo " Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection " In SIGCOMM Workshop on Large Scale Attack Defence 2006  Sep 8, 2008, 8:01 PM Ang Cui
ċ

View
Michael Locasto, Ke Wang, Angelos Keromytis, Sal Stolfo. "FLIPS: Hybrid Adaptive Intrusion Prevention", Recent Advance in Intrusion Detection (RAID), Sept. 2005.  Sep 8, 2008, 8:05 PM Ang Cui
ċ

View
M. Locasto, J. Parekh, A. Keromytis, S. Stolfo. "Towards Collaborative Security and P2P Intrusion Detection." In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, June 2005  Sep 8, 2008, 8:04 PM Ang Cui
ċ

View
Steve Ulfelder. "Spam-busters". Network World March 22, 2004  Sep 8, 2008, 8:06 PM Ang Cui
ċ

View
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo "Extended Abstract: Online Training and Sanitization of AD Systems" NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security, December 2007, Vancouver, B.C., Canada  Sep 8, 2008, 8:00 PM Ang Cui
ċ

View
Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, and Chia-Wei Hu. ``Behavior Profiling of Email" 1st NSF/NIJ Symposium on Intelligence & Security Informatics(ISI 2003). June 2-3,2003,Tucson,Arizona,USA  Sep 8, 2008, 8:10 PM Ang Cui
ċ

View
Katherine A Heller, Krysta M Svore, Angelos D. Keromytis, and Salvatore J. Stolfo. "One Class Support Vector Machines for Detecting Anomalous Window Registry Accesses". 3rd IEEE Conference Data Mining Workshop on Data Mining for Computer Security, Florida, November 19, 2003.  Sep 8, 2008, 8:10 PM Ang Cui
ċ

View
Ke Wang, Salvatore J. Stolfo. "Anomalous Payload-based Network Intrusion Detection". RAID, Sept., 2004.  Sep 8, 2008, 8:07 PM Ang Cui
ċ

View
Ke Wang, Gabriela Cretu, Salvatore J. Stolfo "Anomalous Payload-based Worm Detection and Signature Generation" Proceedings of the Eighth International Symposium on Recent Advances in Intrusion Detection(RAID 2005)  Sep 8, 2008, 8:03 PM Ang Cui
ċ

View
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo, "Email Archive Analysis Through Graphical Visualization." ACM CCS VizSEC/DMSEC'04  Sep 8, 2008, 8:05 PM Ang Cui
ċ

View
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis "Casting out Demons: Sanitizing Training Data for Anomaly Sensors" To appear in the Proceedings of the IEEE Symposium on Security & Privacy. May 2008, Oakland, CA.  Sep 8, 2008, 7:55 PM Ang Cui
ċ

View
Seth Robertson, Eric V. Siegel, Matt Miller, and Salvatore J. Stolfo. ``Surveillance Detection in High Bandwidth Environments.'' In Proceedings of the 2003 DARPA DISCEX III Conference. April, 2003.  Sep 8, 2008, 8:11 PM Ang Cui
ċ

View
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos Keromytis "A Study of Malcode-Bearing Documents" In the Proceedings of 4th GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, July 2007, Lucerne, Switzerland.  Sep 8, 2008, 7:58 PM Ang Cui
ċ

View
Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, and Angelos D. Keromytis "From STEM to SEAD: Speculative Execution for Automated Defense" In the Proceedings of the USENIX Annual Technical Conference. June 2007, Santa Clara, CA  Sep 8, 2008, 7:57 PM Ang Cui
ċ

View
Eric Roston. "The Code Warriors". Time Magazine Nov. 10, 2003 Vol. 162, Iss. 19; pg. S2.  Sep 8, 2008, 8:08 PM Ang Cui
ċ

View
Salvatore J. Stolfo, Wei-Jen Li, Shlomo Hershkop, Ke Wang, Chia-Wei Hu, Olivier Nimeskern. "Detecting Viral Propagations Using Email Behavior Profiles". CU Tech Report 2003.  Sep 8, 2008, 8:08 PM Ang Cui
ċ

View
Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang "Behavior-based Modeling and its Application to Email Analysis" ACM Transactions on Internet Technology (TOIT) , Feb 2006.  Sep 8, 2008, 8:02 PM Ang Cui
ċ

View
Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore. "A comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection". Journal of Computer Security, Vol 13, No. 4, 2005  Sep 8, 2008, 8:02 PM Ang Cui
ċ

View
Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore. "A comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection". CU Tech Report Feb. 23, 2004  Sep 8, 2008, 8:06 PM Ang Cui
Comments