Search the dblp DataBase
Salvatore J. Stolfo :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ouri Wolfson , Hasanat M. Dewan , Salvatore J. Stolfo , Yechiam Yemini Incremental Evaluation of Rules and its Relationship to Parallelism. [Citation Graph (8, 18)][DBLP ] SIGMOD Conference, 1991, pp:78-87 [Conf ] Salvatore J. Stolfo Five Parallel Algorithms for Production System Execution on the DADO Machine. [Citation Graph (5, 0)][DBLP ] AAAI, 1984, pp:300-307 [Conf ] Mauricio A. Hernández , Salvatore J. Stolfo The Merge/Purge Problem for Large Databases. [Citation Graph (5, 10)][DBLP ] SIGMOD Conference, 1995, pp:127-138 [Conf ] Hasanat M. Dewan , David Ohsie , Salvatore J. Stolfo , Ouri Wolfson , Sushil Da Silva Incremental Database Rule Processing In PARADISER. [Citation Graph (4, 0)][DBLP ] J. Intell. Inf. Syst., 1992, v:1, n:2, pp:177-209 [Journal ] Philip K. Chan , Salvatore J. Stolfo Experiments on Multi-Strategy Learning by Meta-Learning. [Citation Graph (3, 0)][DBLP ] CIKM, 1993, pp:314-323 [Conf ] David Elliot Shaw , Salvatore J. Stolfo , Hussein Ibrahim , Bruce Hillyer , Gio Wiederhold , J. A. Andrews The NON-VON Database Machine: A Brief Overview. [Citation Graph (3, 0)][DBLP ] IEEE Database Eng. Bull., 1981, v:4, n:2, pp:41-52 [Journal ] Salvatore J. Stolfo , David Elliot Shaw DADO: A Tree-Structured Machine Architecture for Production Systems. [Citation Graph (2, 0)][DBLP ] AAAI, 1982, pp:242-246 [Conf ] Wenke Lee , Salvatore J. Stolfo , Kui W. Mok Mining Audit Data to Build Intrusion Detection Models. [Citation Graph (2, 0)][DBLP ] KDD, 1998, pp:66-72 [Conf ] Hasanat M. Dewan , Mauricio A. Hernández , Kui W. Mok , Salvatore J. Stolfo Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew. [Citation Graph (2, 3)][DBLP ] PDIS, 1994, pp:40-49 [Conf ] Stephen Taylor , Andy Lowry , Gerald Q. Maguire Jr. , Salvatore J. Stolfo Logic Programming Using Parallel Associative Operations. [Citation Graph (2, 0)][DBLP ] SLP, 1984, pp:58-68 [Conf ] Philip K. Chan , Salvatore J. Stolfo On the Accuracy of Meta-Learning for Scalable Data Mining. [Citation Graph (2, 0)][DBLP ] J. Intell. Inf. Syst., 1997, v:8, n:1, pp:5-28 [Journal ] Michael van Biema , Daniel P. Miranker , Salvatore J. Stolfo The Do-loop Considered Harmful in Production System Programming. [Citation Graph (1, 0)][DBLP ] Expert Database Conf., 1986, pp:177-190 [Conf ] Gregg T. Vesonder , Salvatore J. Stolfo , John E. Zielinski , Fredrick D. Miller , David H. Copp ACE: An Expert System for Telephone Cable Maintenance. [Citation Graph (1, 0)][DBLP ] IJCAI, 1983, pp:116-121 [Conf ] Hasanat M. Dewan , Salvatore J. Stolfo System Reorganization and Load Balancing of Parallel Database Rule Processing. [Citation Graph (1, 0)][DBLP ] ISMIS, 1993, pp:186-197 [Conf ] Philip K. Chan , Salvatore J. Stolfo Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning. [Citation Graph (1, 0)][DBLP ] KDD, 1995, pp:39-44 [Conf ] Philip K. Chan , Salvatore J. Stolfo Sharing Learned Models among Remote Database Partitions by Local Meta-Learning. [Citation Graph (1, 0)][DBLP ] KDD, 1996, pp:2-7 [Conf ] Philip K. Chan , Salvatore J. Stolfo Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. [Citation Graph (1, 0)][DBLP ] KDD, 1998, pp:164-168 [Conf ] Andreas L. Prodromidis , Salvatore J. Stolfo Mining Databases with Different Schemas: Integrating Incompatible Classifiers. [Citation Graph (1, 0)][DBLP ] KDD, 1998, pp:314-318 [Conf ] Salvatore J. Stolfo , Andreas L. Prodromidis , Shelley Tselepis , Wenke Lee , Dave W. Fan , Philip K. Chan JAM: Java Agents for Meta-Learning over Distributed Databases. [Citation Graph (1, 0)][DBLP ] KDD, 1997, pp:74-81 [Conf ] Andreas L. Prodromidis , Salvatore J. Stolfo Minimal Cost Complexity Pruning of Meta-Classifiers. [Citation Graph (0, 0)][DBLP ] AAAI/IAAI, 1999, pp:979- [Conf ] Herbert Schorr , Salvatore J. Stolfo Towards the Digital Government of the 21st Century. [Citation Graph (0, 0)][DBLP ] DG.O, 2002, pp:- [Conf ] Salvatore J. Stolfo , Germán Creamer , Shlomo Hershkop A temporal based forensic analysis of electronic communication. [Citation Graph (0, 0)][DBLP ] DG.O, 2006, pp:23-24 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop Email mining toolkit supporting law enforcement forensic analyses. [Citation Graph (0, 0)][DBLP ] DG.O, 2005, pp:221-222 [Conf ] Salvatore J. Stolfo , Eric Johnson , Tomislav Pavlicec , Stephen Jan Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. [Citation Graph (0, 0)][DBLP ] DG.O, 2003, pp:- [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern EMT/MET: Systems for Modeling and Detecting Errant Email. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:290-0 [Conf ] Seth Robertson , Eric V. Siegel , Matthew Miller , Salvatore J. Stolfo Surveillance Detection in High Bandwidth Environments. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:130-0 [Conf ] Wei Fan , Wenke Lee , Salvatore J. Stolfo , Matthew Miller A Multiple Model Cost-Sensitive Approach for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ECML, 2000, pp:142-153 [Conf ] Andy Lowry , Stephen Taylor , Salvatore J. Stolfo LPS Algorithms. [Citation Graph (0, 0)][DBLP ] FGCS, 1984, pp:436-448 [Conf ] Wei Fan , Haixun Wang , Philip S. Yu , Salvatore J. Stolfo A Fully Distributed Framework for Cost-Sensitive Data Mining. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:445-446 [Conf ] Wei Fan , Matthew Miller , Salvatore J. Stolfo , Wenke Lee , Philip K. Chan Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. [Citation Graph (0, 0)][DBLP ] ICDM, 2001, pp:123-130 [Conf ] Wei Fan , Haixun Wang , Philip S. Yu , Shaw-hwa Lo , Salvatore J. Stolfo Progressive Modeling. [Citation Graph (0, 0)][DBLP ] ICDM, 2002, pp:163-170 [Conf ] Philip K. Chan , Salvatore J. Stolfo A Comparative Evaluation of Voting and Meta-learning on Partitioned Data. [Citation Graph (0, 0)][DBLP ] ICML, 1995, pp:90-98 [Conf ] Wei Fan , Salvatore J. Stolfo , Junxin Zhang , Philip K. Chan AdaCost: Misclassification Cost-Sensitive Boosting. [Citation Graph (0, 0)][DBLP ] ICML, 1999, pp:97-105 [Conf ] Toru Ishida , Salvatore J. Stolfo Towards the Parallel Execution of Rules in Production System Programs. [Citation Graph (0, 0)][DBLP ] ICPP, 1985, pp:568-575 [Conf ] Salvatore J. Stolfo , Hasanat M. Dewan , Ouri Wolfson The PARULEL Parallel Rule Language. [Citation Graph (0, 0)][DBLP ] ICPP (2), 1991, pp:36-45 [Conf ] Mark Perlin , Jaime G. Carbonell , Daniel P. Miranker , Salvatore J. Stolfo , Milind Tambe Is Production System Match Interesting? [Citation Graph (0, 0)][DBLP ] ICTAI, 1992, pp:2-3 [Conf ] Wenke Lee , Christopher T. Park , Salvatore J. Stolfo Automated Intrusion Detection Using NFR: Methods and Experiences. [Citation Graph (0, 0)][DBLP ] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:63-72 [Conf ] Salvatore J. Stolfo , Daniel P. Miranker , David Elliot Shaw Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence. [Citation Graph (0, 0)][DBLP ] IJCAI, 1983, pp:850-854 [Conf ] S. Kliger , Shaula Yemini , Yechiam Yemini , David Ohsie , Salvatore J. Stolfo A coding approach to event correlation. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 1995, pp:266-277 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern , Chia-Wei Hu Behavior Profiling of Email. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:74-90 [Conf ] Philip K. Chan , Salvatore J. Stolfo Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis. [Citation Graph (0, 0)][DBLP ] ISMB, 1993, pp:65-73 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Linh H. Bui , Ryan Ferster , Ke Wang Anomaly Detection in Computer Security and an Application to File System Accesses. [Citation Graph (0, 0)][DBLP ] ISMIS, 2005, pp:14-28 [Conf ] Stelios Sidiroglou , John Ioannidis , Angelos D. Keromytis , Salvatore J. Stolfo An Email Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:97-108 [Conf ] Wei Fan , Salvatore J. Stolfo , Junxin Zhang The Application of AdaBoost for Distributed, Scalable and On-Line Learning. [Citation Graph (0, 0)][DBLP ] KDD, 1999, pp:362-366 [Conf ] Shlomo Hershkop , Salvatore J. Stolfo Combining email models for false positive reduction. [Citation Graph (0, 0)][DBLP ] KDD, 2005, pp:98-107 [Conf ] Wenke Lee , Salvatore J. Stolfo , Kui W. Mok Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] KDD, 1999, pp:114-124 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern , Chia-Wei Hu A Behavior-Based Approach to Securing Email Systems. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:57-81 [Conf ] Wenke Lee , Rahul A. Nimbalkar , Kam K. Yee , Sunil B. Patil , Pragneshkumar H. Desai , Thuan T. Tran , Salvatore J. Stolfo A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2000, pp:49-65 [Conf ] Frank Apap , Andrew Honig , Shlomo Hershkop , Eleazar Eskin , Salvatore J. Stolfo Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:36-53 [Conf ] Wenke Lee , Salvatore J. Stolfo Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Ke Wang , Gabriela Cretu , Salvatore J. Stolfo Anomalous Payload-Based Worm Detection and Signature Generation. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:227-246 [Conf ] Ke Wang , Janak J. Parekh , Salvatore J. Stolfo Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:226-248 [Conf ] Ke Wang , Salvatore J. Stolfo Anomalous Payload-Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:203-222 [Conf ] Michael E. Locasto , Ke Wang , Angelos D. Keromytis , Salvatore J. Stolfo FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:82-101 [Conf ] Hasanat M. Dewan , Salvatore J. Stolfo Meta-level Control of Rule Execution in a Parallel and Distributed Expert Database System. [Citation Graph (0, 0)][DBLP ] RIDE-ADS, 1994, pp:105-114 [Conf ] David Ohsie , Hasanat M. Dewan , Salvatore J. Stolfo , Sushil Da Silva Performance of Incremental Update in Database Rule Processing. [Citation Graph (0, 0)][DBLP ] RIDE-ADS, 1994, pp:10-18 [Conf ] Wei Fan , Salvatore J. Stolfo Ensemble-based Adaptive Intrusion Detection. [Citation Graph (0, 0)][DBLP ] SDM, 2002, pp:- [Conf ] Wei Fan , Haixun Wang , Philip S. Yu , Salvatore J. Stolfo A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. [Citation Graph (0, 0)][DBLP ] SDM, 2002, pp:- [Conf ] Hasanat M. Dewan , Salvatore J. Stolfo , Mauricio A. Hernández , Jae-Jun Hwang Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing. [Citation Graph (0, 17)][DBLP ] SIGMOD Conference, 1994, pp:277-288 [Conf ] Wenke Lee , Salvatore J. Stolfo , Kui W. Mok A Data Mining Framework for Building Intrusion Detection Models. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:120-132 [Conf ] Matthew G. Schultz , Eleazar Eskin , Erez Zadok , Salvatore J. Stolfo Data Mining Methods for Detection of New Malicious Executables. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:38-49 [Conf ] Matthew G. Schultz , Eleazar Eskin , Erez Zadok , Manasi Bhattacharyya , Salvatore J. Stolfo MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, FREENIX Track, 2001, pp:245-252 [Conf ] Wei-Jen Li , Shlomo Hershkop , Salvatore J. Stolfo Email archive analysis through graphical visualization. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:128-132 [Conf ] Jason S. Glazier , Salvatore J. Stolfo Dynamic neighborhood bounding for Monte Carlo simulation. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 1993, pp:466-473 [Conf ] Suhit Gupta , Hila Becker , Gail E. Kaiser , Salvatore J. Stolfo Verifying genre-based clustering approach to content extraction. [Citation Graph (0, 0)][DBLP ] WWW, 2006, pp:875-876 [Conf ] Suhit Gupta , Gail E. Kaiser , Salvatore J. Stolfo Extracting context to improve accuracy for HTML content extraction. [Citation Graph (0, 0)][DBLP ] WWW (Special interest tracks and posters), 2005, pp:1114-1115 [Conf ] Tom Fawcett , Ira J. Haimowitz , Foster J. Provost , Salvatore J. Stolfo AI Approaches to Fraud Detection and Risk Management. [Citation Graph (0, 0)][DBLP ] AI Magazine, 1998, v:19, n:2, pp:107-108 [Journal ] Wenke Lee , Salvatore J. Stolfo , Kui W. Mok Adaptive Intrusion Detection: A Data Mining Approach. [Citation Graph (0, 0)][DBLP ] Artif. Intell. Rev., 2000, v:14, n:6, pp:533-567 [Journal ] Herbert Schorr , Salvatore J. Stolfo A Digital Government for the 21st Century. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:11, pp:15-19 [Journal ] Salvatore J. Stolfo Initial Performance of the DADO2 Prototype. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1987, v:20, n:1, pp:75-83 [Journal ] Mauricio A. Hernández , Salvatore J. Stolfo Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 1998, v:2, n:1, pp:9-37 [Journal ] Salvatore J. Stolfo Worm and Attack Early Warning. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:3, pp:73-75 [Journal ] Wenke Lee , Wei Fan , Matthew Miller , Salvatore J. Stolfo , Erez Zadok Toward Cost-Sensitive Modeling for Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:1/2, pp:5-22 [Journal ] Salvatore J. Stolfo , Frank Apap , Eleazar Eskin , Katherine Heller , Shlomo Hershkop , Andrew Honig , Krysta Marie Svore A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:4, pp:659-693 [Journal ] Hasanat M. Dewan , Salvatore J. Stolfo , Leland Woodbury Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1994, v:22, n:3, pp:506-522 [Journal ] Salvatore J. Stolfo , Daniel P. Miranker The DADO Production System Machine. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1986, v:3, n:2, pp:269-296 [Journal ] Salvatore J. Stolfo , Ouri Wolfson , Philip K. Chan , Hasanat M. Dewan , Leland Woodbury , Jason S. Glazier , David Ohsie PARULE: Parallel Rule Processing Using Meta-rules for Redaction. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1991, v:13, n:4, pp:366-382 [Journal ] Wei Fan , Matthew Miller , Salvatore J. Stolfo , Wenke Lee , Philip K. Chan Using artificial anomalies to detect unknown and known network intrusions. [Citation Graph (0, 0)][DBLP ] Knowl. Inf. Syst., 2004, v:6, n:5, pp:507-527 [Journal ] Andreas L. Prodromidis , Salvatore J. Stolfo Cost Complexity-Based Pruning of Ensemble Classifiers. [Citation Graph (0, 0)][DBLP ] Knowl. Inf. Syst., 2001, v:3, n:4, pp:449-469 [Journal ] Philip K. Chan , Salvatore J. Stolfo , David Wolpert Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP ] Machine Learning, 1999, v:36, n:1-2, pp:5-7 [Journal ] Shih-Fu Chang , Luis Gravano , Gail E. Kaiser , Kenneth A. Ross , Salvatore J. Stolfo Database Research at Columbia University. [Citation Graph (0, 33)][DBLP ] SIGMOD Record, 1998, v:27, n:3, pp:75-80 [Journal ] Salvatore J. Stolfo , Wenke Lee , Philip K. Chan , Wei Fan , Eleazar Eskin Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2001, v:30, n:4, pp:5-14 [Journal ] Wenke Lee , Salvatore J. Stolfo A framework for constructing features and models for intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:227-261 [Journal ] Benjamin W. Wah , Thomas S. Huang , Aravind K. Joshi , Dan I. Moldovan , Yiannis Aloimonos , Ruzena Bajcsy , Dana H. Ballard , Doug DeGroot , Kenneth DeJong , Charles R. Dyer , Scott E. Fahlman , Ralph Grishman , Lynette Hirschman , Richard E. Korf , Stephen E. Levinson , Daniel P. Miranker , N. H. Morgan , Sergei Nirenburg , Tomaso Poggio , Edward M. Riseman , Craig Stanfil , Salvatore J. Stolfo , Steven L. Tanimoto , Charles C. Weems Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 1993, v:5, n:1, pp:138-154 [Journal ] Salvatore J. Stolfo , Shlomo Hershkop , Chia-Wei Hu , Wei-Jen Li , Olivier Nimeskern , Ke Wang Behavior-based modeling and its application to Email analysis. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2006, v:6, n:2, pp:187-221 [Journal ] Wei-Jen Li , Salvatore J. Stolfo , Angelos Stavrou , Elli Androulaki , Angelos D. Keromytis A Study of Malcode-Bearing Documents. [Citation Graph (0, 0)][DBLP ] DIMVA, 2007, pp:231-250 [Conf ] Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. [Citation Graph (, )][DBLP ] A Network Access Control Mechanism Based on Behavior Profiles. [Citation Graph (, )][DBLP ] On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP ] Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. [Citation Graph (, )][DBLP ] Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services. [Citation Graph (, )][DBLP ] BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. [Citation Graph (, )][DBLP ] Behavior-Based Network Access Control: A Proof-of-Concept. [Citation Graph (, )][DBLP ] Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP ] Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. [Citation Graph (, )][DBLP ] Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. [Citation Graph (, )][DBLP ] Brave New World: Pervasive Insecurity of Embedded Network Devices. [Citation Graph (, )][DBLP ] Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. [Citation Graph (, )][DBLP ] BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. [Citation Graph (, )][DBLP ] Casting out Demons: Sanitizing Training Data for Anomaly Sensors. [Citation Graph (, )][DBLP ] Automating the injection of believable decoys to detect snooping. [Citation Graph (, )][DBLP ] Identifying spam without peeking at the contents. [Citation Graph (, )][DBLP ] A link mining algorithm for earnings forecast and trading. [Citation Graph (, )][DBLP ] Search in 0.010secs, Finished in 0.014secs