The SCEAS System
Navigation Menu

Search the dblp DataBase


Shlomo Hershkop: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop
    A temporal based forensic analysis of electronic communication. [Citation Graph (0, 0)][DBLP]
    DG.O, 2006, pp:23-24 [Conf]
  2. Salvatore J. Stolfo, Shlomo Hershkop
    Email mining toolkit supporting law enforcement forensic analyses. [Citation Graph (0, 0)][DBLP]
    DG.O, 2005, pp:221-222 [Conf]
  3. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern
    EMT/MET: Systems for Modeling and Detecting Errant Email. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:290-0 [Conf]
  4. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
    Behavior Profiling of Email. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:74-90 [Conf]
  5. Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang
    Anomaly Detection in Computer Security and an Application to File System Accesses. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2005, pp:14-28 [Conf]
  6. Shlomo Hershkop, Salvatore J. Stolfo
    Combining email models for false positive reduction. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:98-107 [Conf]
  7. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
    A Behavior-Based Approach to Securing Email Systems. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:57-81 [Conf]
  8. Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo
    Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:36-53 [Conf]
  9. Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
    Email archive analysis through graphical visualization. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:128-132 [Conf]
  10. Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta Marie Svore
    A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:4, pp:659-693 [Journal]
  11. Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang
    Behavior-based modeling and its application to Email analysis. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2006, v:6, n:2, pp:187-221 [Journal]

  12. Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. [Citation Graph (, )][DBLP]

  13. Identifying spam without peeking at the contents. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002