Salvatore J. Stolfo

Results: 29



#Item
1

Anomalous Payload-based Network Intrusion Detection Ke Wang, Salvatore J. Stolfo Computer Science Department, Columbia University 500 West 120th Street, New York, NY, 10027 {kewang, sal}@cs.columbia.edu

Add to Reading List

Source URL: cs.fit.edu

- Date: 2004-07-14 14:20:58
    2Computer security / Computer network security / Security / Data security / Salvatore J. Stolfo / Defense in depth

    ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs, Salvatore J. Stolfo Columbia University

    Add to Reading List

    Source URL: fm.csl.sri.com

    Language: English - Date: 2011-12-15 18:21:31
    3Computing / Software / Application software / Scientific method / Salvatore J. Stolfo / User / Milgram experiment / Statistics / ROOT / Internet privacy / Data analysis / Windows Vista

    On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-07-08 13:42:25
    4Computing / Software / System administration / USENIX / Unix / Salvatore J. Stolfo / Roger Needham / Cloud computing / Internet privacy / Big data

    Roxana Geambasu Columbia University Department of Computer Science 1214 Amsterdam Avenue, New York, NYOffice:

    Add to Reading List

    Source URL: roxanageambasu.github.io

    Language: English - Date: 2016-04-03 19:38:14
    5Computer-assisted translation / Decoy / Salvatore J. Stolfo / Machine translation / Translation / Google Translate

    Lost in Translation: Improving Decoy Documents via Automated Translation Jonathan Voris, Nathaniel Boggs, and Salvatore J. Stolfo Department of Computer Science Columbia University New York, NY 10027, USA {jvoris,boggs,s

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2012-04-13 15:14:00
    6Computer network security / Security / Cyberwarfare / Decoy / Salvatore J. Stolfo / Honeypot / Computer security

    Monitoring Technologies for Mitigating Insider Threats Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo, Department of Computer Science Columbia University August 21,

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2011-09-04 10:44:36
    7Free software / Computer science / Computing / Software / Source code / GNU General Public License / Open-source software

    Software Decoys for Insider Threat Younghee Park Salvatore J. Stolfo Department of Computer Science

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2012-10-25 22:04:37
    8Computer network security / Spamming / Cyberwarfare / Cybercrime / Spyware / Salvatore J. Stolfo / Simulation / VM / Computer virus / Hypervisor / Malware / Keystroke logging

    BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection! Brian M. Bowen 1 , Pratap Prabhu 1 , Vasileios P. Kemerlis 1 , Stelios Sidiroglou 2 , Angelos D. Keromytis 1 , and S

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2011-09-04 10:44:35
    9Computer network security / Decoy / Cryptography / Salvatore J. Stolfo / Honeypot / Computer security

    Bait and Snitch: Defending Computer Systems with Decoys Jonathan Voris, Jill Jermyn, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science Columbia University, New York, NY 10027 {jvoris@cs., jj260

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2012-12-05 15:53:47
    10Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

    JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2014-03-28 12:39:15
    UPDATE