1![Anomalous Payload-based Network Intrusion Detection Ke Wang, Salvatore J. Stolfo Computer Science Department, Columbia University 500 West 120th Street, New York, NY, 10027 {kewang, sal}@cs.columbia.edu Anomalous Payload-based Network Intrusion Detection Ke Wang, Salvatore J. Stolfo Computer Science Department, Columbia University 500 West 120th Street, New York, NY, 10027 {kewang, sal}@cs.columbia.edu](https://www.pdfsearch.io/img/e92a67701e6d79af8d3a32a049fb92be.jpg) | Add to Reading ListSource URL: cs.fit.edu- Date: 2004-07-14 14:20:58
|
---|
2![ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs, Salvatore J. Stolfo Columbia University ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs, Salvatore J. Stolfo Columbia University](https://www.pdfsearch.io/img/c43ed79633183e5ac41d655713b0e2b1.jpg) | Add to Reading ListSource URL: fm.csl.sri.comLanguage: English - Date: 2011-12-15 18:21:31
|
---|
3![On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University](https://www.pdfsearch.io/img/3177d2820788703e607ebc42cd00dea1.jpg) | Add to Reading ListSource URL: static.usenix.orgLanguage: English - Date: 2011-07-08 13:42:25
|
---|
4![Roxana Geambasu Columbia University Department of Computer Science 1214 Amsterdam Avenue, New York, NYOffice: Roxana Geambasu Columbia University Department of Computer Science 1214 Amsterdam Avenue, New York, NYOffice:](https://www.pdfsearch.io/img/38a7eefba1c1b5a7b204134bb4f32260.jpg) | Add to Reading ListSource URL: roxanageambasu.github.ioLanguage: English - Date: 2016-04-03 19:38:14
|
---|
5![Lost in Translation: Improving Decoy Documents via Automated Translation Jonathan Voris, Nathaniel Boggs, and Salvatore J. Stolfo Department of Computer Science Columbia University New York, NY 10027, USA {jvoris,boggs,s Lost in Translation: Improving Decoy Documents via Automated Translation Jonathan Voris, Nathaniel Boggs, and Salvatore J. Stolfo Department of Computer Science Columbia University New York, NY 10027, USA {jvoris,boggs,s](https://www.pdfsearch.io/img/ff2c3e0829fcd9c163589652fff8d31f.jpg) | Add to Reading ListSource URL: ids.cs.columbia.eduLanguage: English - Date: 2012-04-13 15:14:00
|
---|
6![Monitoring Technologies for Mitigating Insider Threats Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo, Department of Computer Science Columbia University August 21, Monitoring Technologies for Mitigating Insider Threats Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo, Department of Computer Science Columbia University August 21,](https://www.pdfsearch.io/img/8c2ba954492a6100f3fd72148073f99a.jpg) | Add to Reading ListSource URL: ids.cs.columbia.eduLanguage: English - Date: 2011-09-04 10:44:36
|
---|
7![Software Decoys for Insider Threat Younghee Park Salvatore J. Stolfo Department of Computer Science Software Decoys for Insider Threat Younghee Park Salvatore J. Stolfo Department of Computer Science](https://www.pdfsearch.io/img/1c6ee56cea8faeb4dc9920660cebe1c7.jpg) | Add to Reading ListSource URL: ids.cs.columbia.eduLanguage: English - Date: 2012-10-25 22:04:37
|
---|
8![BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection! Brian M. Bowen 1 , Pratap Prabhu 1 , Vasileios P. Kemerlis 1 , Stelios Sidiroglou 2 , Angelos D. Keromytis 1 , and S BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection! Brian M. Bowen 1 , Pratap Prabhu 1 , Vasileios P. Kemerlis 1 , Stelios Sidiroglou 2 , Angelos D. Keromytis 1 , and S](https://www.pdfsearch.io/img/f8dee9013a997ad40cbccc0cb198c9ee.jpg) | Add to Reading ListSource URL: ids.cs.columbia.eduLanguage: English - Date: 2011-09-04 10:44:35
|
---|
9![Bait and Snitch: Defending Computer Systems with Decoys Jonathan Voris, Jill Jermyn, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science Columbia University, New York, NY 10027 {jvoris@cs., jj260 Bait and Snitch: Defending Computer Systems with Decoys Jonathan Voris, Jill Jermyn, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science Columbia University, New York, NY 10027 {jvoris@cs., jj260](https://www.pdfsearch.io/img/3babdd0ac20ada83127ff559d3edd023.jpg) | Add to Reading ListSource URL: ids.cs.columbia.eduLanguage: English - Date: 2012-12-05 15:53:47
|
---|
10![JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in](https://www.pdfsearch.io/img/07d40fce959c530f18a103807363ebf4.jpg) | Add to Reading ListSource URL: www.cs.umd.eduLanguage: English - Date: 2014-03-28 12:39:15
|
---|