dblp.uni-trier.dewww.uni-trier.de

Shlomo Hershkop

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
12EEGermán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo: Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. WebKDD/SNA-KDD 2007: 40-58
2006
11EESalvatore J. Stolfo, Germán Creamer, Shlomo Hershkop: A temporal based forensic analysis of electronic communication. DG.O 2006: 23-24
10EESalvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006)
2005
9EESalvatore J. Stolfo, Shlomo Hershkop: Email mining toolkit supporting law enforcement forensic analyses. DG.O 2005: 221-222
8EESalvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28
7EEShlomo Hershkop, Salvatore J. Stolfo: Combining email models for false positive reduction. KDD 2005: 98-107
6EESalvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta Marie Svore: A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. Journal of Computer Security 13(4): 659-693 (2005)
2004
5EEWei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo: Email archive analysis through graphical visualization. VizSEC 2004: 128-132
2003
4EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290-
3EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90
2EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81
2002
1EEFrank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo: Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. RAID 2002: 36-53

Coauthor Index

1Frank Apap [1] [6]
2Linh H. Bui [8]
3Germán Creamer [11] [12]
4Eleazar Eskin [1] [6]
5Ryan Ferster [8]
6Katherine Heller [6]
7Andrew Honig [1] [6]
8Chia-Wei Hu [2] [3] [10]
9Wei-Jen Li [5] [10]
10Olivier Nimeskern [2] [3] [4] [10]
11Ryan Rowe [12]
12Salvatore J. Stolfo [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12]
13Krysta Marie Svore [6]
14Ke Wang [2] [3] [4] [8] [10]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)