355 results on '"Stolfo, Salvatore J."'
Search Results
2. Program Analysis in Program Analysis in Detection
3. Exciting New Problems and Opportunities
4. Anomaly Detection on Network Traffic
5. Anomaly Detection from the Industry’s Perspective
6. Local vs. Global Program Anomaly Detection
7. Anomaly Detection in Cyber-Physical Systems
8. Introduction
9. Threat Models
10. Synthetic Data Generation and Defense in Depth Measurement of Web Applications
11. Measuring Drive-by Download Defense in Depth
12. Unsupervised Anomaly-Based Malware Detection Using Hardware Features
13. A Survey of Insider Attack Detection Research
14. Anomaly Detection as a Service
15. Some Initial Thoughts about Quantum Malware
16. Symbiotes and defensive Mutualism: Moving Target Defense
17. Defending Embedded Systems with Software Symbiotes
18. Modeling User Search Behavior for Masquerade Detection
19. Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close
20. Decoy Document Deployment for Effective Masquerade Attack Detection
21. Monitoring Technologies for Mitigating Insider Threats
22. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
23. Baiting Inside Attackers Using Decoy Documents
24. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
25. Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
26. Segmentation and Automated Social Hierarchy Detection through Email Network Analysis
27. Return Value Predictability Profiles for Self–healing
28. Behavior-Based Network Access Control: A Proof-of-Concept
29. Towards Stealthy Malware Detection
30. Cost-Sensitive Modeling for Intrusion Detection
31. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
32. Anomalous Payload-Based Worm Detection and Signature Generation
33. FLIPS: Hybrid Adaptive Intrusion Prevention
34. An Email Worm Vaccine Architecture
35. Anomaly Detection in Computer Security and an Application to File System Accesses
36. Anomalous Payload-Based Network Intrusion Detection
37. A Behavior-Based Approach to Securing Email Systems
38. Behavior Profiling of Email
39. Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design
40. Algorithms for Mining System Audit Data
41. Insider Threat Defense
42. A Multiple Model Cost-Sensitive Approach for Intrusion Detection
43. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions
44. Brave New World: Pervasive Insecurity of Embedded Network Devices
45. Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case
46. System reorganization and load balancing of parallel database rule processing
47. Synthetic Data Generation and Defense in Depth Measurement of Web Applications
48. Unsupervised Anomaly-Based Malware Detection Using Hardware Features
49. Measuring Drive-by Download Defense in Depth
50. Letters: Administrative Bloat
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.