Salvatore J. Stolfo

Results: 29



#Item
11Guest Editors’ Introduction  Addressing the Insider Threat A

Guest Editors’ Introduction Addressing the Insider Threat A

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
12The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-03-22 16:55:00
13Insider Threats  Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
14Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
15On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
16Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University  Abstract. The insider threat remains one of th

Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University Abstract. The insider threat remains one of th

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
17A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

Add to Reading List

Source URL: www.gatsby.ucl.ac.uk

Language: English - Date: 2006-10-19 19:27:44
18When Firmware Modifications Attack: A Case Study of Embedded Exploitation Ang Cui, Michael Costello and Salvatore J. Stolfo Department of Computer Science Columbia University New York, US

When Firmware Modifications Attack: A Case Study of Embedded Exploitation Ang Cui, Michael Costello and Salvatore J. Stolfo Department of Computer Science Columbia University New York, US

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2012-12-05 15:06:13