The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Salvatore J. Stolfo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ouri Wolfson, Hasanat M. Dewan, Salvatore J. Stolfo, Yechiam Yemini
    Incremental Evaluation of Rules and its Relationship to Parallelism. [Citation Graph (8, 18)][DBLP]
    SIGMOD Conference, 1991, pp:78-87 [Conf]
  2. Salvatore J. Stolfo
    Five Parallel Algorithms for Production System Execution on the DADO Machine. [Citation Graph (5, 0)][DBLP]
    AAAI, 1984, pp:300-307 [Conf]
  3. Mauricio A. Hernández, Salvatore J. Stolfo
    The Merge/Purge Problem for Large Databases. [Citation Graph (5, 10)][DBLP]
    SIGMOD Conference, 1995, pp:127-138 [Conf]
  4. Hasanat M. Dewan, David Ohsie, Salvatore J. Stolfo, Ouri Wolfson, Sushil Da Silva
    Incremental Database Rule Processing In PARADISER. [Citation Graph (4, 0)][DBLP]
    J. Intell. Inf. Syst., 1992, v:1, n:2, pp:177-209 [Journal]
  5. Philip K. Chan, Salvatore J. Stolfo
    Experiments on Multi-Strategy Learning by Meta-Learning. [Citation Graph (3, 0)][DBLP]
    CIKM, 1993, pp:314-323 [Conf]
  6. David Elliot Shaw, Salvatore J. Stolfo, Hussein Ibrahim, Bruce Hillyer, Gio Wiederhold, J. A. Andrews
    The NON-VON Database Machine: A Brief Overview. [Citation Graph (3, 0)][DBLP]
    IEEE Database Eng. Bull., 1981, v:4, n:2, pp:41-52 [Journal]
  7. Salvatore J. Stolfo, David Elliot Shaw
    DADO: A Tree-Structured Machine Architecture for Production Systems. [Citation Graph (2, 0)][DBLP]
    AAAI, 1982, pp:242-246 [Conf]
  8. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    Mining Audit Data to Build Intrusion Detection Models. [Citation Graph (2, 0)][DBLP]
    KDD, 1998, pp:66-72 [Conf]
  9. Hasanat M. Dewan, Mauricio A. Hernández, Kui W. Mok, Salvatore J. Stolfo
    Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew. [Citation Graph (2, 3)][DBLP]
    PDIS, 1994, pp:40-49 [Conf]
  10. Stephen Taylor, Andy Lowry, Gerald Q. Maguire Jr., Salvatore J. Stolfo
    Logic Programming Using Parallel Associative Operations. [Citation Graph (2, 0)][DBLP]
    SLP, 1984, pp:58-68 [Conf]
  11. Philip K. Chan, Salvatore J. Stolfo
    On the Accuracy of Meta-Learning for Scalable Data Mining. [Citation Graph (2, 0)][DBLP]
    J. Intell. Inf. Syst., 1997, v:8, n:1, pp:5-28 [Journal]
  12. Michael van Biema, Daniel P. Miranker, Salvatore J. Stolfo
    The Do-loop Considered Harmful in Production System Programming. [Citation Graph (1, 0)][DBLP]
    Expert Database Conf., 1986, pp:177-190 [Conf]
  13. Gregg T. Vesonder, Salvatore J. Stolfo, John E. Zielinski, Fredrick D. Miller, David H. Copp
    ACE: An Expert System for Telephone Cable Maintenance. [Citation Graph (1, 0)][DBLP]
    IJCAI, 1983, pp:116-121 [Conf]
  14. Hasanat M. Dewan, Salvatore J. Stolfo
    System Reorganization and Load Balancing of Parallel Database Rule Processing. [Citation Graph (1, 0)][DBLP]
    ISMIS, 1993, pp:186-197 [Conf]
  15. Philip K. Chan, Salvatore J. Stolfo
    Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning. [Citation Graph (1, 0)][DBLP]
    KDD, 1995, pp:39-44 [Conf]
  16. Philip K. Chan, Salvatore J. Stolfo
    Sharing Learned Models among Remote Database Partitions by Local Meta-Learning. [Citation Graph (1, 0)][DBLP]
    KDD, 1996, pp:2-7 [Conf]
  17. Philip K. Chan, Salvatore J. Stolfo
    Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. [Citation Graph (1, 0)][DBLP]
    KDD, 1998, pp:164-168 [Conf]
  18. Andreas L. Prodromidis, Salvatore J. Stolfo
    Mining Databases with Different Schemas: Integrating Incompatible Classifiers. [Citation Graph (1, 0)][DBLP]
    KDD, 1998, pp:314-318 [Conf]
  19. Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan
    JAM: Java Agents for Meta-Learning over Distributed Databases. [Citation Graph (1, 0)][DBLP]
    KDD, 1997, pp:74-81 [Conf]
  20. Andreas L. Prodromidis, Salvatore J. Stolfo
    Minimal Cost Complexity Pruning of Meta-Classifiers. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 1999, pp:979- [Conf]
  21. Herbert Schorr, Salvatore J. Stolfo
    Towards the Digital Government of the 21st Century. [Citation Graph (0, 0)][DBLP]
    DG.O, 2002, pp:- [Conf]
  22. Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop
    A temporal based forensic analysis of electronic communication. [Citation Graph (0, 0)][DBLP]
    DG.O, 2006, pp:23-24 [Conf]
  23. Salvatore J. Stolfo, Shlomo Hershkop
    Email mining toolkit supporting law enforcement forensic analyses. [Citation Graph (0, 0)][DBLP]
    DG.O, 2005, pp:221-222 [Conf]
  24. Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicec, Stephen Jan
    Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. [Citation Graph (0, 0)][DBLP]
    DG.O, 2003, pp:- [Conf]
  25. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern
    EMT/MET: Systems for Modeling and Detecting Errant Email. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:290-0 [Conf]
  26. Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo
    Surveillance Detection in High Bandwidth Environments. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:130-0 [Conf]
  27. Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller
    A Multiple Model Cost-Sensitive Approach for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ECML, 2000, pp:142-153 [Conf]
  28. Andy Lowry, Stephen Taylor, Salvatore J. Stolfo
    LPS Algorithms. [Citation Graph (0, 0)][DBLP]
    FGCS, 1984, pp:436-448 [Conf]
  29. Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo
    A Fully Distributed Framework for Cost-Sensitive Data Mining. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:445-446 [Conf]
  30. Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan
    Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. [Citation Graph (0, 0)][DBLP]
    ICDM, 2001, pp:123-130 [Conf]
  31. Wei Fan, Haixun Wang, Philip S. Yu, Shaw-hwa Lo, Salvatore J. Stolfo
    Progressive Modeling. [Citation Graph (0, 0)][DBLP]
    ICDM, 2002, pp:163-170 [Conf]
  32. Philip K. Chan, Salvatore J. Stolfo
    A Comparative Evaluation of Voting and Meta-learning on Partitioned Data. [Citation Graph (0, 0)][DBLP]
    ICML, 1995, pp:90-98 [Conf]
  33. Wei Fan, Salvatore J. Stolfo, Junxin Zhang, Philip K. Chan
    AdaCost: Misclassification Cost-Sensitive Boosting. [Citation Graph (0, 0)][DBLP]
    ICML, 1999, pp:97-105 [Conf]
  34. Toru Ishida, Salvatore J. Stolfo
    Towards the Parallel Execution of Rules in Production System Programs. [Citation Graph (0, 0)][DBLP]
    ICPP, 1985, pp:568-575 [Conf]
  35. Salvatore J. Stolfo, Hasanat M. Dewan, Ouri Wolfson
    The PARULEL Parallel Rule Language. [Citation Graph (0, 0)][DBLP]
    ICPP (2), 1991, pp:36-45 [Conf]
  36. Mark Perlin, Jaime G. Carbonell, Daniel P. Miranker, Salvatore J. Stolfo, Milind Tambe
    Is Production System Match Interesting? [Citation Graph (0, 0)][DBLP]
    ICTAI, 1992, pp:2-3 [Conf]
  37. Wenke Lee, Christopher T. Park, Salvatore J. Stolfo
    Automated Intrusion Detection Using NFR: Methods and Experiences. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:63-72 [Conf]
  38. Salvatore J. Stolfo, Daniel P. Miranker, David Elliot Shaw
    Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1983, pp:850-854 [Conf]
  39. S. Kliger, Shaula Yemini, Yechiam Yemini, David Ohsie, Salvatore J. Stolfo
    A coding approach to event correlation. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1995, pp:266-277 [Conf]
  40. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
    Behavior Profiling of Email. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:74-90 [Conf]
  41. Philip K. Chan, Salvatore J. Stolfo
    Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis. [Citation Graph (0, 0)][DBLP]
    ISMB, 1993, pp:65-73 [Conf]
  42. Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang
    Anomaly Detection in Computer Security and an Application to File System Accesses. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2005, pp:14-28 [Conf]
  43. Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
    An Email Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:97-108 [Conf]
  44. Wei Fan, Salvatore J. Stolfo, Junxin Zhang
    The Application of AdaBoost for Distributed, Scalable and On-Line Learning. [Citation Graph (0, 0)][DBLP]
    KDD, 1999, pp:362-366 [Conf]
  45. Shlomo Hershkop, Salvatore J. Stolfo
    Combining email models for false positive reduction. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:98-107 [Conf]
  46. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    KDD, 1999, pp:114-124 [Conf]
  47. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
    A Behavior-Based Approach to Securing Email Systems. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:57-81 [Conf]
  48. Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo
    A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:49-65 [Conf]
  49. Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo
    Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:36-53 [Conf]
  50. Wenke Lee, Salvatore J. Stolfo
    Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  51. Ke Wang, Gabriela Cretu, Salvatore J. Stolfo
    Anomalous Payload-Based Worm Detection and Signature Generation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:227-246 [Conf]
  52. Ke Wang, Janak J. Parekh, Salvatore J. Stolfo
    Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:226-248 [Conf]
  53. Ke Wang, Salvatore J. Stolfo
    Anomalous Payload-Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:203-222 [Conf]
  54. Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
    FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:82-101 [Conf]
  55. Hasanat M. Dewan, Salvatore J. Stolfo
    Meta-level Control of Rule Execution in a Parallel and Distributed Expert Database System. [Citation Graph (0, 0)][DBLP]
    RIDE-ADS, 1994, pp:105-114 [Conf]
  56. David Ohsie, Hasanat M. Dewan, Salvatore J. Stolfo, Sushil Da Silva
    Performance of Incremental Update in Database Rule Processing. [Citation Graph (0, 0)][DBLP]
    RIDE-ADS, 1994, pp:10-18 [Conf]
  57. Wei Fan, Salvatore J. Stolfo
    Ensemble-based Adaptive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SDM, 2002, pp:- [Conf]
  58. Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo
    A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. [Citation Graph (0, 0)][DBLP]
    SDM, 2002, pp:- [Conf]
  59. Hasanat M. Dewan, Salvatore J. Stolfo, Mauricio A. Hernández, Jae-Jun Hwang
    Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing. [Citation Graph (0, 17)][DBLP]
    SIGMOD Conference, 1994, pp:277-288 [Conf]
  60. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    A Data Mining Framework for Building Intrusion Detection Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:120-132 [Conf]
  61. Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo
    Data Mining Methods for Detection of New Malicious Executables. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:38-49 [Conf]
  62. Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Salvatore J. Stolfo
    MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2001, pp:245-252 [Conf]
  63. Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
    Email archive analysis through graphical visualization. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:128-132 [Conf]
  64. Jason S. Glazier, Salvatore J. Stolfo
    Dynamic neighborhood bounding for Monte Carlo simulation. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1993, pp:466-473 [Conf]
  65. Suhit Gupta, Hila Becker, Gail E. Kaiser, Salvatore J. Stolfo
    Verifying genre-based clustering approach to content extraction. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:875-876 [Conf]
  66. Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo
    Extracting context to improve accuracy for HTML content extraction. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:1114-1115 [Conf]
  67. Tom Fawcett, Ira J. Haimowitz, Foster J. Provost, Salvatore J. Stolfo
    AI Approaches to Fraud Detection and Risk Management. [Citation Graph (0, 0)][DBLP]
    AI Magazine, 1998, v:19, n:2, pp:107-108 [Journal]
  68. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    Adaptive Intrusion Detection: A Data Mining Approach. [Citation Graph (0, 0)][DBLP]
    Artif. Intell. Rev., 2000, v:14, n:6, pp:533-567 [Journal]
  69. Herbert Schorr, Salvatore J. Stolfo
    A Digital Government for the 21st Century. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:11, pp:15-19 [Journal]
  70. Salvatore J. Stolfo
    Initial Performance of the DADO2 Prototype. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1987, v:20, n:1, pp:75-83 [Journal]
  71. Mauricio A. Hernández, Salvatore J. Stolfo
    Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 1998, v:2, n:1, pp:9-37 [Journal]
  72. Salvatore J. Stolfo
    Worm and Attack Early Warning. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:73-75 [Journal]
  73. Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok
    Toward Cost-Sensitive Modeling for Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:5-22 [Journal]
  74. Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta Marie Svore
    A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:4, pp:659-693 [Journal]
  75. Hasanat M. Dewan, Salvatore J. Stolfo, Leland Woodbury
    Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1994, v:22, n:3, pp:506-522 [Journal]
  76. Salvatore J. Stolfo, Daniel P. Miranker
    The DADO Production System Machine. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1986, v:3, n:2, pp:269-296 [Journal]
  77. Salvatore J. Stolfo, Ouri Wolfson, Philip K. Chan, Hasanat M. Dewan, Leland Woodbury, Jason S. Glazier, David Ohsie
    PARULE: Parallel Rule Processing Using Meta-rules for Redaction. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1991, v:13, n:4, pp:366-382 [Journal]
  78. Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan
    Using artificial anomalies to detect unknown and known network intrusions. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2004, v:6, n:5, pp:507-527 [Journal]
  79. Andreas L. Prodromidis, Salvatore J. Stolfo
    Cost Complexity-Based Pruning of Ensemble Classifiers. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2001, v:3, n:4, pp:449-469 [Journal]
  80. Philip K. Chan, Salvatore J. Stolfo, David Wolpert
    Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 1999, v:36, n:1-2, pp:5-7 [Journal]
  81. Shih-Fu Chang, Luis Gravano, Gail E. Kaiser, Kenneth A. Ross, Salvatore J. Stolfo
    Database Research at Columbia University. [Citation Graph (0, 33)][DBLP]
    SIGMOD Record, 1998, v:27, n:3, pp:75-80 [Journal]
  82. Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin
    Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2001, v:30, n:4, pp:5-14 [Journal]
  83. Wenke Lee, Salvatore J. Stolfo
    A framework for constructing features and models for intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:227-261 [Journal]
  84. Benjamin W. Wah, Thomas S. Huang, Aravind K. Joshi, Dan I. Moldovan, Yiannis Aloimonos, Ruzena Bajcsy, Dana H. Ballard, Doug DeGroot, Kenneth DeJong, Charles R. Dyer, Scott E. Fahlman, Ralph Grishman, Lynette Hirschman, Richard E. Korf, Stephen E. Levinson, Daniel P. Miranker, N. H. Morgan, Sergei Nirenburg, Tomaso Poggio, Edward M. Riseman, Craig Stanfil, Salvatore J. Stolfo, Steven L. Tanimoto, Charles C. Weems
    Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1993, v:5, n:1, pp:138-154 [Journal]
  85. Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang
    Behavior-based modeling and its application to Email analysis. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2006, v:6, n:2, pp:187-221 [Journal]
  86. Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
    A Study of Malcode-Bearing Documents. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:231-250 [Conf]

  87. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. [Citation Graph (, )][DBLP]


  88. A Network Access Control Mechanism Based on Behavior Profiles. [Citation Graph (, )][DBLP]


  89. On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]


  90. Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. [Citation Graph (, )][DBLP]


  91. Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services. [Citation Graph (, )][DBLP]


  92. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. [Citation Graph (, )][DBLP]


  93. Behavior-Based Network Access Control: A Proof-of-Concept. [Citation Graph (, )][DBLP]


  94. Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]


  95. Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. [Citation Graph (, )][DBLP]


  96. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. [Citation Graph (, )][DBLP]


  97. Brave New World: Pervasive Insecurity of Embedded Network Devices. [Citation Graph (, )][DBLP]


  98. Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. [Citation Graph (, )][DBLP]


  99. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. [Citation Graph (, )][DBLP]


  100. Casting out Demons: Sanitizing Training Data for Anomaly Sensors. [Citation Graph (, )][DBLP]


  101. Automating the injection of believable decoys to detect snooping. [Citation Graph (, )][DBLP]


  102. Identifying spam without peeking at the contents. [Citation Graph (, )][DBLP]


  103. A link mining algorithm for earnings forecast and trading. [Citation Graph (, )][DBLP]


Search in 0.694secs, Finished in 0.698secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002