Salvatore J. Stolfo
American computer security expert
Salvatore J. Stolfo's AcademicInfluence.com Rankings
Download Badge
Criminal Justice Computer Science
Salvatore J. Stolfo's Degrees
- PhD Computer Science Columbia University
- Masters Computer Science Columbia University
- Bachelors Computer Science Columbia University
Similar Degrees You Can Earn
Why Is Salvatore J. Stolfo Influential?
(Suggest an Edit or Addition)According to Wikipedia, Salvatore J. Stolfo is an academic and professor of computer science at Columbia University, specializing in computer security. Early life Born in Brooklyn, New York, Stolfo received a Bachelor of Science degree in Computer Science and Mathematics from Brooklyn College in 1974. He received his Ph.D. from NYU Courant Institute in 1979 and has been on the faculty of Columbia ever since, where he's taught courses in Artificial Intelligence, Intrusion and Anomaly Detection Systems, Introduction to Programming, Fundamental Algorithms, Data Structures, and Knowledge-Based Expert Systems.
Salvatore J. Stolfo's Published Works
Published Works
- Data Mining Approaches for Intrusion Detection (1998) (1500)
- A data mining framework for building intrusion detection models (1999) (1395)
- Data mining methods for detection of new malicious executables (2001) (1101)
- A framework for constructing features and models for intrusion detection systems (2000) (1085)
- The merge/purge problem for large databases (1995) (1011)
- Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem (1998) (962)
- Anomalous Payload-Based Network Intrusion Detection (2004) (932)
- AdaCost: Misclassification Cost-Sensitive Boosting (1999) (681)
- Cost-based modeling for fraud and intrusion detection: results from the JAM project (2000) (646)
- A Geometric Framework for Unsupervised Anomaly Detection (2002) (634)
- Distributed data mining in credit card fraud detection (1999) (562)
- Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection (1998) (533)
- Adaptive Intrusion Detection: A Data Mining Approach (2000) (427)
- On the feasibility of online malware detection with performance counters (2013) (393)
- JAM: Java Agents for Meta-Learning over Distributed Databases (1997) (374)
- Anagram: A Content Anomaly Detector Resistant to Mimicry Attack (2006) (347)
- Learning Patterns from Unix Process Execution Traces for Intrusion Detection (1997) (338)
- Mining Audit Data to Build Intrusion Detection Models (1998) (326)
- Anomalous Payload-Based Worm Detection and Signature Generation (2005) (313)
- Toward Cost-Sensitive Modeling for Intrusion Detection and Response (2002) (312)
- A Survey of Insider Attack Detection Research (2008) (297)
- Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud (2012) (286)
- Using artificial anomalies to detect unknown and known network intrusions (2001) (275)
- Mining in a data-flow environment: experience in network intrusion detection (1999) (275)
- Real time data mining-based intrusion detection (2001) (267)
- A coding approach to event correlation (1995) (250)
- When Firmware Modifications Attack: A Case Study of Embedded Exploitation (2013) (218)
- A Comparative Evaluation of Voting and Meta-learning on Partitioned Data (1995) (217)
- Unsupervised Anomaly-Based Malware Detection Using Hardware Features (2014) (216)
- Experiments on multistrategy learning by meta-learning (1993) (215)
- Toward parallel and distributed learning by meta-learning (1993) (214)
- CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management (2017) (213)
- Casting out Demons: Sanitizing Training Data for Anomaly Sensors (2008) (207)
- Modeling system calls for intrusion detection with dynamic window sizes (2001) (202)
- Baiting Inside Attackers Using Decoy Documents (2009) (199)
- One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses (2003) (194)
- One-Class Training for Masquerade Detection (2003) (170)
- A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan (2010) (168)
- On the Accuracy of Meta-learning for Scalable Data Mining (2004) (163)
- Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 (1997) (157)
- Automated social hierarchy detection through email network analysis (2007) (156)
- On the infeasibility of modeling polymorphic shellcode (2007) (153)
- Modeling User Search Behavior for Masquerade Detection (2011) (142)
- Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic (2009) (131)
- The application of AdaBoost for distributed, scalable and on-line learning (1999) (129)
- Behavior-based modeling and its application to Email analysis (2006) (124)
- A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions (2000) (109)
- Data mining-based intrusion detectors: an overview of the columbia IDS project (2001) (106)
- Insider Attack and Cyber Security - Beyond the Hacker (2008) (105)
- FLIPS: Hybrid Adaptive Intrusion Prevention (2005) (103)
- Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads (2015) (101)
- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses (2002) (100)
- An extensible meta-learning approach for scalable and accurate inductive learning (1996) (100)
- Surveillance detection in high bandwidth environments (2003) (99)
- Towards the Parallel Execution of Rules in Production System Programs (1985) (99)
- Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection : Results from the JAM Project ∗ (2008) (97)
- ACE: An Expert System for Telephone Cable Maintenance (1983) (87)
- A Study of Malcode-Bearing Documents (2007) (87)
- Five Parallel Algorithms for Production System Execution on the DADO Machine (1984) (86)
- DADO: A Tree-Structured Machine Architecture for Production Systems (1982) (85)
- Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning (1995) (83)
- Learning Rules from System Call Arguments and Sequences for Anomaly 20 Detection (2003) (77)
- Towards Stealthy Malware Detection (2007) (76)
- Decoy Document Deployment for Effective Masquerade Attack Detection (2011) (76)
- DADO: A Parallel Processor for Expert Systems (1984) (74)
- Measuring Security (2011) (73)
- Measuring the human factor of cyber security (2011) (72)
- NEZHA: Efficient Domain-Independent Differential Testing (2017) (71)
- Cost Complexity-Based Pruning of Ensemble Classifiers (2001) (71)
- A Behavior-Based Approach to Securing Email Systems (2003) (71)
- Adaptive Model Generation for Intrusion Detection Systems (2000) (68)
- A Multiple Model Cost-Sensitive Approach for Intrusion Detection (2000) (66)
- Behavior Profiling of Email (2003) (66)
- Designing Host and Network Sensors to Mitigate the Insider Threat (2009) (63)
- A comparative evaluation of two algorithms for Windows Registry Anomaly Detection (2005) (63)
- Segmentation and Automated Social Hierarchy Detection through Email Network Analysis (2009) (62)
- Combining email models for false positive reduction (2005) (61)
- AI Approaches to Fraud Detection and Risk Management (1998) (60)
- MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables (2001) (59)
- Concurrency attacks (2012) (59)
- Sharing Learned Models among Remote Database Partitions by Local Meta-Learning (1996) (58)
- Collaborative Distributed Intrusion Detection (2004) (54)
- Agent-Based Distributed Learning Applied to Fraud Detection (1999) (52)
- Privacy-preserving payload-based correlation for accurate malicious traffic detection (2006) (50)
- System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models (2013) (49)
- Incremental evaluation of rules and its relationship to parallelism (1991) (47)
- Initial Performance of the DADO2 Prototype (1987) (47)
- Software decoys for insider threat (2012) (47)
- Defending Embedded Systems with Software Symbiotes (2011) (46)
- The DADO Production System Machine (1986) (45)
- Behavior-based email analysis with application to spam detection (2006) (44)
- Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks (2015) (44)
- Adaptive Anomaly Detection via Self-calibration and Dynamic Updating (2009) (43)
- The NON-VON Database Machine: A Brief Overview (1981) (43)
- Extracting context to improve accuracy for HTML content extraction (2005) (41)
- A Data Mining Framework for Adaptive Intrusion Detection ∗ (1998) (38)
- Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems (2002) (38)
- Brave New World: Pervasive Insecurity of Embedded Network Devices (2009) (36)
- Anomaly Detection in Computer Security and an Application to File System Accesses (2005) (36)
- PARULE: Parallel Rule Processing Using Meta-rules for Redaction (1991) (36)
- Addressing the Insider Threat (2009) (35)
- Algorithms for mining system audit data (2002) (35)
- Anomaly Detection as a Service: Challenges, Advances, and Opportunities (2017) (34)
- Lost in Translation: Improving Decoy Documents via Automated Translation (2012) (34)
- Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence (1983) (33)
- Masquerade Attack Detection Using a Search-Behavior Modeling Approach (2009) (33)
- Bait and Snitch: Defending Computer Systems with Decoys (2013) (33)
- Fileprint analysis for Malware Detection 1 (2005) (32)
- A Network Access Control Mechanism Based on Behavior Profiles (2009) (31)
- Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques (2010) (31)
- An Email Worm Vaccine Architecture (2005) (31)
- Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close (2011) (30)
- Email archive analysis through graphical visualization (2004) (29)
- Research in Attacks, Intrusions, and Defenses (2013) (29)
- A Comparative Evaluation of Combiner and Stacked Generalization (2007) (29)
- Automating the injection of believable decoys to detect snooping (2010) (29)
- Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence (1993) (28)
- Detecting Viral Propagations Using Email Behavior Profiles (2003) (28)
- Worm and Attack Early Warning (2004) (27)
- The MEERKATS Cloud Security Architecture (2012) (27)
- Fox in the trap: thwarting masqueraders via automated decoy document deployment (2015) (27)
- Toward Cost-Sensitive Modeling for Intrusion Detection (2000) (26)
- Mining Databases with Different Schemas: Integrating Incompatible Classifiers (1998) (26)
- Automated Intrusion Detection Using NFR: Methods and Experiences (1999) (25)
- Intrusion and anomaly detection model exchange for mobile ad-hoc networks (2006) (25)
- Monitoring Technologies for Mitigating Insider Threats (2010) (24)
- The PARULEL Parallel Rule Language (1991) (24)
- A link mining algorithm for earnings forecast and trading (2009) (24)
- Combining Baiting and User Search Profiling Techniques for Masquerade Detection (2012) (24)
- Pruning Meta-Classifiers in a Distributed Data Mining System (1998) (23)
- Combining Knowledge Discovery and Knowledge Engineering to Build IDSs (1999) (23)
- Usable, Secure, Private Search (2012) (23)
- Logic Programming Using Parallel Associative Operations (1984) (23)
- Email mining toolkit supporting law enforcement forensic analyses (2005) (22)
- BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection (2010) (22)
- Pruning Classifiers in a Distributed Meta-Learning System (1998) (22)
- ACE: An Expert System Supporting Analysis and Management Decision Making (1982) (21)
- Cost-sensitive, scalable and adaptive learning using ensemble-based methods (2001) (21)
- Speech Recognition in Parallel (1989) (21)
- Improving Production System Performance on Parallel Architectures by Creating Constrained Copies of Rules (1987) (20)
- Symbiotes and defensive Mutualism: Moving Target Defense (2011) (20)
- Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes (2009) (20)
- Ethics in security vulnerability research (2010) (19)
- Ensemble-based Adaptive Intrusion Detection (2002) (19)
- A temporal based forensic analysis of electronic communication (2006) (18)
- Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design (2011) (17)
- Predictive dynamic load balancing of parallel and distributed rule and query processing (1994) (16)
- Synthetic Data Generation and Defense in Depth Measurement of Web Applications (2014) (16)
- A digital government for the 21st century (1998) (16)
- Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors (2008) (16)
- A simple preprocessing scheme to extract and balance implicit parallelism in the concurrent match of production rules (1986) (15)
- Guest Editors' Introduction: The Science of Security (2011) (15)
- Improving readiness for enterprise migration to the cloud (2014) (15)
- Anomaly Detection at Multiple Scales (ADAMS) (2011) (15)
- Simultaneous Firing of Production Rules on Tree Structured Machines (1984) (15)
- Identifying spam without peeking at the contents (2004) (15)
- Data sanitization: improving the forensic utility of anomaly detection systems (2007) (15)
- Toward multistrategy parallel and distributed learning in sequence analysis. (1993) (14)
- Model Aggregation for Distributed Content Anomaly Detection (2014) (14)
- The ALEXSYS Mortgage Pool Allocation Expert System : A Case Study of Speeding Up Rule-based Programs (1990) (13)
- Combining Behavior Models to Secure Email Systems (2003) (13)
- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs (2009) (13)
- Behavior-Based Network Access Control: A Proof-of-Concept (2008) (13)
- Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services (2000) (12)
- Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis (1993) (12)
- The DADO Parallel Computer (1983) (12)
- Network payload-based anomaly detection and content-based alert correlation (2007) (12)
- Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner (2011) (12)
- The Do-loop Considered Harmful in Production System Programming (1986) (12)
- Privacy-Preserving Sharing of Sensitive Information (2010) (12)
- A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits (2002) (12)
- A fully distributed framework for cost-sensitive data mining (2002) (12)
- Predictive dynamic load balancing of parallel hash-joins over heterogeneous processors in the presence of data skew (1994) (12)
- Management of intelligent learning agents in distributed data mining systems (1999) (11)
- Adaptive Model Generation (2002) (11)
- From prey to hunter: transforming legacy embedded devices into exploitation sensor grids (2011) (11)
- Measuring Drive-by Download Defense in Depth (2014) (11)
- PROLOG on the DADO Machine: A Parallel System For High-Speed Logic Programming (1983) (11)
- The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security (2011) (11)
- Verifying genre-based clustering approach to content extraction (2006) (11)
- On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusi (2010) (11)
- Active authentication using file system decoys and user behavior modeling: results of a large scale study (2019) (10)
- Integrating multiple learned models for improving and scaling machine learning algorithms (1996) (10)
- Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned (2011) (10)
- A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection (2011) (10)
- Effective and Efficient Pruning of Meta-Classifiers in a Distributed Data Mining System (1998) (10)
- Print Me If You Dare: Firmware Modification Attacks and the Rise of Printer Malware (2011) (9)
- Performance of incremental update in database rule processing (1994) (9)
- Incremental database rule processing in PARADISER (1992) (9)
- Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing (1994) (9)
- On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection (2007) (9)
- A system for generating and injecting indistinguishable network decoys (2012) (8)
- Towards the digital government of the 21 st century (2002) (8)
- Automatic Discovery of Heuristics for Nondeterministic Programs (1979) (8)
- Markov Models for Network-Behavior Modeling and Anonymization (2011) (8)
- EMT/MET: systems for modeling and detecting errant email (2003) (8)
- Dado: A Tree-Structured Architecture for Artificial Intelligence Computation (1986) (8)
- Simulated User Bots: Real Time Testing of Insider Threat Detection Systems (2018) (8)
- A Comparative Evaluation of Meta-Learning Strategies over Large and Distributed Data Sets (2008) (8)
- Toward Scalable and Parallel Inductive Learning: A Case Study in Splice Junction Prediction (1994) (7)
- ALDR: A New Metric for Measuring Effective Layering of Defenses (2011) (7)
- Experimental results of cross-site exchange of web content Anomaly Detector alerts (2010) (7)
- On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned (2011) (7)
- System Reorganization and Load Balancing of Parallel Database Rule Processing (1993) (7)
- Quantifying Application Behavior Space for Detection and Self-Healing (2006) (7)
- Sparse sequence modeling with applications to computational biology and intrusion detection (2002) (7)
- Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study (2003) (7)
- Behavior-based network traffic synthesis (2011) (7)
- An overview of the DADO parallel computer (1984) (6)
- A parallel and distributed environment for database rule processing: open problems and future directions (1995) (6)
- Host-based Anomaly Detection Using Wrapping File Systems (2004) (6)
- You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage (2016) (6)
- Design and Analysis of Decoy Systems for Computer Security (2011) (5)
- More Rules May Mean Faster Parallel Execution (1985) (5)
- Specialized Hardware for Production Systems (1981) (5)
- Motivating Security-Aware Energy Management (2018) (5)
- The SPARCHS Project: Hardware Support for Software Security (2011) (5)
- Automatic Discovery of Heuristics for Nondeterministic Programs from Sample Execution Traces (2018) (5)
- Learning Control of Production Systems (1979) (5)
- Towards Effective Masquerade Attack Detection (2012) (5)
- The NON-VON Database Machine: An Overview (1981) (5)
- Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode (2009) (5)
- Agent-based fraud and intrusion detection in finan-cial information systems (1997) (5)
- A Genre-based Clustering Approach to Content Extraction (2005) (4)
- Distributed Data Mining: The JAM system architecture (2001) (4)
- Decoy Applications for Continuous Authentication on Mobile Devices (2014) (4)
- The constraint-based paradigm: integrating object-oriented and rule-based programming (1990) (4)
- Return Value Predictability Profiles for Self-healing (2008) (4)
- A Digital Government for the 21 st Century (1998) (4)
- On the Design of Parallel Production System Machines: What's in a LIP? (1983) (4)
- Cost-Sensitive Modeling for Intrusion Detection (2006) (4)
- Minimal Cost Complexity Pruning of Meta-Classifiers (1999) (4)
- Progressive modeling (2002) (4)
- Unification in a Parallel Environment (1984) (3)
- Programming the DADO Machine: An Introduction to PPL/M (1982) (3)
- PPL/M: The System Level Language for Programming the DADO Machine (1984) (3)
- Behavior-based admission and access control for network security (2008) (3)
- Parallel Programming of Rule-based Systems in PARULEL (1993) (3)
- Self-monitoring Monitors (2009) (3)
- ||PSL: A Parallel Lisp for the DADO Machine (1984) (3)
- SPARSE: A Hybrid System to Detect Malcode-Bearing Documents (2008) (2)
- A Note on Implementing OPS5 Production Systems on DADO (1984) (2)
- Explanation and Acquisition in Expert Systems Using Support Knowledge (1985) (2)
- Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems (2008) (2)
- Research in attacks, intrusions, and defenses : 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013 : proceedings (2013) (2)
- Genre Classification of Websites Using Search Engine Snippets (2005) (2)
- Baiting Inside Attackers using Decoy Documents Report Title (2009) (2)
- Automated Intrusion Detection Methods Using NFR (1999) (2)
- AFRL-IFRS-TR-2004-84 Final Technical Report March 2004 A DATA MINING APPROACH FOR BUILDING COST-SENSITIVE AND LIGHT INTRUSION DETECTION MODELS (2004) (2)
- Does Profiling Make Us More Secure? (2012) (2)
- Scalability of Hierarchical Meta-learning on Partitioned Data (1997) (2)
- Scalability of Learning Arbiter and Combiner Trees from Partitioned Data (1997) (2)
- Learning Meta-Rule Control of Production Systems from Execution Traces (1980) (2)
- The ALEXSYS mortgage pool allocation system (1991) (1)
- Developing Collaborative Profiles of Attackers: A Longitudinal Study (2007) (1)
- BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs (2007) (1)
- Keynote panel (2009) (1)
- Database research at Columbia University (1998) (1)
- One Class Model Training for Zero-Day Virus Detection (2004) (1)
- Are maintenance expert systems practical now (1985) (1)
- Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses (2012) (1)
- Thwarting Attacks in Malcode-Bearing Documents by Altering Data Sector Values (2009) (1)
- LPS Algorithms: A Detailed Examination (1984) (1)
- Meta-level control of rule execution in a parallel and distributed expert database system (1994) (1)
- Is CAD/CAM Ready for AI? (1985) (1)
- Insider Threat Defense (2011) (1)
- Mining databases with dierent schemas: Integrating incompatible classifers (1998) (1)
- A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization (2012) (1)
- User-Defined Predicates in OPS5: A Needed Language Extension for Financial Expert Systems (1989) (1)
- Application-Level Anomaly Detection for the Master Caution Panel (2005) (1)
- Analyzing prolog programs (1984) (1)
- LPS Algorithms: A Critical Analysis (1984) (1)
- A Hybrid Technique for Credit Card Fraud Detection (2016) (1)
- Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case (2022) (1)
- Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design (2013) (0)
- Heisenbyte (2015) (0)
- A silicon anti-virus engine (2015) (0)
- Online Training and Sanitization of AD Systems Extended (2007) (0)
- 1 ALGORITHMS FOR MINING SYSTEM AUDIT DATA ∗ Wenke (1999) (0)
- Dispositif, procede et support de detection d'anomalies de la charge utile a l'aide de la distribution n-gramme de donnees normales (2004) (0)
- SPARCHS: Symbiotic, Polymorphic, Automatic, Resilient, Clean-Slate, Host Security (2016) (0)
- Détection de logiciel malveillant reposant sur une anomalie non supervisée à l'aide de caractéristiques de matériel (2014) (0)
- Title: Recursive-stacking to Improve the Accuracy of Combined Classiiers Author(s) with Address(es): Multiple Submission Statement (if Applicable): N/a (2007) (0)
- Sparse: a hybrid system for malcode-bearing document detection (2008) (0)
- Apparatus, method and means for detecting an abnormality payload distribution using n-gram normal data (2004) (0)
- Using Arti ial Anomalies to Dete tUnknown and Known (2008) (0)
- A Parallel and Distributed Environment for Knowledge-base Processing: Open Problems and Future Directions (1993) (0)
- STAND: Sanitization Tool for ANomaly Detection (2007) (0)
- Tug-of-War: Observations on Unified Content Handling (2017) (0)
- LPS Algorithms (1984) (0)
- Processeur parallele a arbre binaire (1987) (0)
- Machine Learning, 1{27 () Learning with Non-uniform Class and Cost Distributions: Eeects and a Multi-classiier Approach (1998) (0)
- Procedes, supports et systemes permettant de detecter une sequence anormale d'appels de fonction (2007) (0)
- Erratum to: A link mining algorithm for earnings forecast and trading (2010) (0)
- A Simple Scheme for a Fault Tolerant DADO Machine (1985) (0)
- Letters: Administrative Bloat (1996) (0)
- Towards Stealthy Malware Detection 1 (2005) (0)
- A Parallel and Distributed Environment for Knowledgebase Processing : Open Problems and Future Directions (1993) (0)
- Parallel processor with binary tree structure. (1987) (0)
- DADO Parallel Computer Stolfo and students (2011) (0)
- Cost Complexity Pruning of Ensemble Classifiers (2000) (0)
- Using Diversity to Harden Multithreaded Programs Against Exploitation (2016) (0)
- United States Patent ( 19 ) Stolfo ( 54 ) METHOD AND APPARATUS FOR IMAGING , IMAGE PROCESSING AND DATA COMPRESSION 76 Inventor : (2017) (0)
- Guest Editors' Introduction (2004) (0)
- Systèmes, méthodes et support pour engendrer des informations pièges pour les moyens de défense basés sur un piégeage (2007) (0)
- Citizen ’ s Attitudes About Privacy : Results 1 Citizen ’ s Attitudes about Privacy While Accessing Government Websites : Results of an Online Study Type : Long Paper (2003) (0)
- Unsupervised detection of anomalous processes using hardware features (2014) (0)
- Achat electronique de biens sur un reseau de communication comprenant une livraison physique tout en assurant la securite des informations privees et a caractere personnel (2000) (0)
- Exploration anonyme et privee de sites web a travers des portails prives (2001) (0)
- Systèmes et procédés pour inhiber les attaques d'applications (2006) (0)
- Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 8145 (2013) (0)
- Is production system matching interesting? (1992) (0)
- Åùðøøôðð Åóð Ó×ø¹ëëò××øøú Ôôöóó Óö Áòøöù××óò Øø Blockinøøóò (2000) (0)
- Procédés, média et systèmes de détection d'une attaque sur un dispositif numérique de traitement (2007) (0)
- Procedes, supports et systemes de detection d'executions de programme anormales (2006) (0)
- Procédés, supports et systèmes pour détecter une attaque sur un dispositif de traitement numérique (2009) (0)
- Procédés et systèmes pour présenter des défenses à base de pièges (2008) (0)
- Anti-Virus in Silicon (2015) (0)
- DADO: ATREE-STRUCXUREDMACRINE ARCRITECTURE FoRERODUcTIONSYSTEMS* (1982) (0)
- Software-based Decoy System for Insider Threats (2012) (0)
- Large Scale System Defense (2008) (0)
- Dynamic Neighborhood Bounding for Monte Carlo Simulation (1993) (0)
- Polymorphic shellcode: the demise of signature-based detection (2009) (0)
- Systèmes, procédés, et support pour sortir un ensemble de données sur la base de la détection d'anomalies (2007) (0)
- LPS Algorithms : A Detalled Examination (2004) (0)
- Systèmes, procédés, et supports pour sortir des données fondées sur la détection d'anomalies (2007) (0)
- Citizen's Attitudes about Privacy While Accessing Government Websites: Results of an Online Study (2003) (0)
- The Design and Implementation of System Level Language for the DADO Parallel Machine (1987) (0)
- Chapter 5 Symbiotes and defensive Mutualism : Moving Target Defense (0)
- Online Training and Sanitization of AD Systems (2007) (0)
- Approximate String Matching on the DADO2 Parallel Computer (1988) (0)
- WORMS 2005 Columbia IDS Lab June 19 , 2005 1 Review Draft Fileprint analysis for Malware Detection (2005) (0)
- AFRL-RY-WP-TR-2015-0002 MINESTRONE (2015) (0)
- DADO: A Parallel Computer for Artificial Intelligence (1985) (0)
This paper list is powered by the following services:
Other Resources About Salvatore J. Stolfo
What Schools Are Affiliated With Salvatore J. Stolfo?
Salvatore J. Stolfo is affiliated with the following schools: