dblp.uni-trier.dewww.uni-trier.de

Salvatore J. Stolfo

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
93EEGermán Creamer, Salvatore J. Stolfo: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 18(3): 419-445 (2009)
2008
92EEGabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95
91EEVanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190
90EEMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166
2007
89EEYingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551
88EEWei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis: A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250
87EEGermán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo: Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. WebKDD/SNA-KDD 2007: 40-58
2006
86EESalvatore J. Stolfo, Germán Creamer, Shlomo Hershkop: A temporal based forensic analysis of electronic communication. DG.O 2006: 23-24
85EEKe Wang, Janak J. Parekh, Salvatore J. Stolfo: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248
84EESuhit Gupta, Hila Becker, Gail E. Kaiser, Salvatore J. Stolfo: Verifying genre-based clustering approach to content extraction. WWW 2006: 875-876
83EESalvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006)
2005
82EESalvatore J. Stolfo, Shlomo Hershkop: Email mining toolkit supporting law enforcement forensic analyses. DG.O 2005: 221-222
81EESalvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28
80EEStelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108
79EEShlomo Hershkop, Salvatore J. Stolfo: Combining email models for false positive reduction. KDD 2005: 98-107
78EEKe Wang, Gabriela F. Cretu, Salvatore J. Stolfo: Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246
77EEMichael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101
76EESuhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo: Extracting context to improve accuracy for HTML content extraction. WWW (Special interest tracks and posters) 2005: 1114-1115
75EESalvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta Marie Svore: A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. Journal of Computer Security 13(4): 659-693 (2005)
2004
74EEKe Wang, Salvatore J. Stolfo: Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222
73EEWei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo: Email archive analysis through graphical visualization. VizSEC 2004: 128-132
72EESalvatore J. Stolfo: Worm and Attack Early Warning. IEEE Security & Privacy 2(3): 73-75 (2004)
71EEWei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004)
2003
70EESalvatore J. Stolfo, Eric Johnson, Tomislav Pavlicec, Stephen Jan: Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. DG.O 2003
69EESeth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo: Surveillance Detection in High Bandwidth Environments. DISCEX (1) 2003: 130-
68EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290-
67EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90
66EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81
2002
65EEHerbert Schorr, Salvatore J. Stolfo: Towards the Digital Government of the 21st Century. DG.O 2002
64EEWei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo: A Fully Distributed Framework for Cost-Sensitive Data Mining. ICDCS 2002: 445-446
63EEWei Fan, Haixun Wang, Philip S. Yu, Shaw-hwa Lo, Salvatore J. Stolfo: Progressive Modeling. ICDM 2002: 163-170
62EEFrank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo: Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. RAID 2002: 36-53
61EEWei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo: A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. SDM 2002
60EEWei Fan, Salvatore J. Stolfo: Ensemble-based Adaptive Intrusion Detection. SDM 2002
59 Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002)
2001
58EEWei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130
57EEMatthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo: Data Mining Methods for Detection of New Malicious Executables. IEEE Symposium on Security and Privacy 2001: 38-49
56EEMatthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Salvatore J. Stolfo: MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables. USENIX Annual Technical Conference, FREENIX Track 2001: 245-252
55EEAndreas L. Prodromidis, Salvatore J. Stolfo: Cost Complexity-Based Pruning of Ensemble Classifiers. Knowl. Inf. Syst. 3(4): 449-469 (2001)
54EESalvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001)
2000
53EEHerbert Schorr, Salvatore J. Stolfo: Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services. DG.O 2000
52EEWei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153
51EEWenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65
50EEWenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000)
49 Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000)
1999
48 Andreas L. Prodromidis, Salvatore J. Stolfo: Minimal Cost Complexity Pruning of Meta-Classifiers. AAAI/IAAI 1999: 979
47 Wei Fan, Salvatore J. Stolfo, Junxin Zhang, Philip K. Chan: AdaCost: Misclassification Cost-Sensitive Boosting. ICML 1999: 97-105
46EEWenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132
45EEWenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124
44EEWei Fan, Salvatore J. Stolfo, Junxin Zhang: The Application of AdaBoost for Distributed, Scalable and On-Line Learning. KDD 1999: 362-366
43EEWenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999
42EEWenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72
41 Philip K. Chan, Salvatore J. Stolfo, David Wolpert: Guest Editors' Introduction. Machine Learning 36(1-2): 5-7 (1999)
1998
40 Philip K. Chan, Salvatore J. Stolfo: Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. KDD 1998: 164-168
39 Andreas L. Prodromidis, Salvatore J. Stolfo: Mining Databases with Different Schemas: Integrating Incompatible Classifiers. KDD 1998: 314-318
38 Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72
37 Tom Fawcett, Ira J. Haimowitz, Foster J. Provost, Salvatore J. Stolfo: AI Approaches to Fraud Detection and Risk Management. AI Magazine 19(2): 107-108 (1998)
36 Herbert Schorr, Salvatore J. Stolfo: A Digital Government for the 21st Century. Commun. ACM 41(11): 15-19 (1998)
35 Mauricio A. Hernández, Salvatore J. Stolfo: Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem. Data Min. Knowl. Discov. 2(1): 9-37 (1998)
34EEShih-Fu Chang, Luis Gravano, Gail E. Kaiser, Kenneth A. Ross, Salvatore J. Stolfo: Database Research at Columbia University. SIGMOD Record 27(3): 75-80 (1998)
1997
33 Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan: JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81
32 Philip K. Chan, Salvatore J. Stolfo: On the Accuracy of Meta-Learning for Scalable Data Mining. J. Intell. Inf. Syst. 8(1): 5-28 (1997)
1996
31 Philip K. Chan, Salvatore J. Stolfo: Sharing Learned Models among Remote Database Partitions by Local Meta-Learning. KDD 1996: 2-7
1995
30 Philip K. Chan, Salvatore J. Stolfo: A Comparative Evaluation of Voting and Meta-learning on Partitioned Data. ICML 1995: 90-98
29 S. Kliger, Shaula Yemini, Yechiam Yemini, David Ohsie, Salvatore J. Stolfo: A coding approach to event correlation. Integrated Network Management 1995: 266-277
28 Philip K. Chan, Salvatore J. Stolfo: Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning. KDD 1995: 39-44
27EEMauricio A. Hernández, Salvatore J. Stolfo: The Merge/Purge Problem for Large Databases. SIGMOD Conference 1995: 127-138
1994
26EEHasanat M. Dewan, Mauricio A. Hernández, Kui W. Mok, Salvatore J. Stolfo: Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew. PDIS 1994: 40-49
25 David Ohsie, Hasanat M. Dewan, Salvatore J. Stolfo, Sushil Da Silva: Performance of Incremental Update in Database Rule Processing. RIDE-ADS 1994: 10-18
24 Hasanat M. Dewan, Salvatore J. Stolfo: Meta-level Control of Rule Execution in a Parallel and Distributed Expert Database System. RIDE-ADS 1994: 105-114
23EEHasanat M. Dewan, Salvatore J. Stolfo, Mauricio A. Hernández, Jae-Jun Hwang: Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing. SIGMOD Conference 1994: 277-288
22 Hasanat M. Dewan, Salvatore J. Stolfo, Leland Woodbury: Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing. J. Parallel Distrib. Comput. 22(3): 506-522 (1994)
1993
21EEPhilip K. Chan, Salvatore J. Stolfo: Experiments on Multi-Strategy Learning by Meta-Learning. CIKM 1993: 314-323
20 Philip K. Chan, Salvatore J. Stolfo: Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis. ISMB 1993: 65-73
19 Hasanat M. Dewan, Salvatore J. Stolfo: System Reorganization and Load Balancing of Parallel Database Rule Processing. ISMIS 1993: 186-197
18EEJason S. Glazier, Salvatore J. Stolfo: Dynamic neighborhood bounding for Monte Carlo simulation. Winter Simulation Conference 1993: 466-473
17EEBenjamin W. Wah, Thomas S. Huang, Aravind K. Joshi, Dan I. Moldovan, Yiannis Aloimonos, Ruzena Bajcsy, Dana H. Ballard, Doug DeGroot, Kenneth DeJong, Charles R. Dyer, Scott E. Fahlman, Ralph Grishman, Lynette Hirschman, Richard E. Korf, Stephen E. Levinson, Daniel P. Miranker, N. H. Morgan, Sergei Nirenburg, Tomaso Poggio, Edward M. Riseman, Craig Stanfil, Salvatore J. Stolfo, Steven L. Tanimoto, Charles C. Weems: Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. IEEE Trans. Knowl. Data Eng. 5(1): 138-154 (1993)
1992
16 Mark Perlin, Jaime G. Carbonell, Daniel P. Miranker, Salvatore J. Stolfo, Milind Tambe: Is Production System Match Interesting? ICTAI 1992: 2-3
15 Hasanat M. Dewan, David Ohsie, Salvatore J. Stolfo, Ouri Wolfson, Sushil Da Silva: Incremental Database Rule Processing In PARADISER. J. Intell. Inf. Syst. 1(2): 177-209 (1992)
1991
14 Salvatore J. Stolfo, Hasanat M. Dewan, Ouri Wolfson: The PARULEL Parallel Rule Language. ICPP (2) 1991: 36-45
13EEOuri Wolfson, Hasanat M. Dewan, Salvatore J. Stolfo, Yechiam Yemini: Incremental Evaluation of Rules and its Relationship to Parallelism. SIGMOD Conference 1991: 78-87
12 Salvatore J. Stolfo, Ouri Wolfson, Philip K. Chan, Hasanat M. Dewan, Leland Woodbury, Jason S. Glazier, David Ohsie: PARULE: Parallel Rule Processing Using Meta-rules for Redaction. J. Parallel Distrib. Comput. 13(4): 366-382 (1991)
1987
11 Salvatore J. Stolfo: Initial Performance of the DADO2 Prototype. IEEE Computer 20(1): 75-83 (1987)
1986
10 Michael van Biema, Daniel P. Miranker, Salvatore J. Stolfo: The Do-loop Considered Harmful in Production System Programming. Expert Database Conf. 1986: 177-190
9 Salvatore J. Stolfo, Daniel P. Miranker: The DADO Production System Machine. J. Parallel Distrib. Comput. 3(2): 269-296 (1986)
1985
8 Toru Ishida, Salvatore J. Stolfo: Towards the Parallel Execution of Rules in Production System Programs. ICPP 1985: 568-575
1984
7 Salvatore J. Stolfo: Five Parallel Algorithms for Production System Execution on the DADO Machine. AAAI 1984: 300-307
6 Andy Lowry, Stephen Taylor, Salvatore J. Stolfo: LPS Algorithms. FGCS 1984: 436-448
5 Stephen Taylor, Andy Lowry, Gerald Q. Maguire Jr., Salvatore J. Stolfo: Logic Programming Using Parallel Associative Operations. SLP 1984: 58-68
1983
4 Gregg T. Vesonder, Salvatore J. Stolfo, John E. Zielinski, Frederick D. Miller, David H. Copp: ACE: An Expert System for Telephone Cable Maintenance. IJCAI 1983: 116-121
3 Salvatore J. Stolfo, Daniel P. Miranker, David Elliot Shaw: Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence. IJCAI 1983: 850-854
1982
2 Salvatore J. Stolfo, David Elliot Shaw: DADO: A Tree-Structured Machine Architecture for Production Systems. AAAI 1982: 242-246
1981
1EEDavid Elliot Shaw, Salvatore J. Stolfo, Hussein Ibrahim, Bruce Hillyer, Gio Wiederhold, J. A. Andrews: The NON-VON Database Machine: A Brief Overview. IEEE Database Eng. Bull. 4(2): 41-52 (1981)

Coauthor Index

1Yiannis Aloimonos [17]
2J. A. Andrews [1]
3Elli Androulaki [88]
4Frank Apap [62] [75]
5Ruzena Bajcsy [17]
6Dana H. Ballard [17]
7Hila Becker [84]
8Manasi Bhattacharyya [56]
9Michael van Biema [10]
10Linh H. Bui [81]
11Jaime G. Carbonell [16]
12Philip K. Chan [12] [20] [21] [28] [30] [31] [32] [33] [40] [41] [47] [54] [58] [71]
13Shih-Fu Chang [34]
14David H. Copp [4]
15Germán Creamer [86] [87] [93]
16Gabriela F. Cretu [78] [90] [92]
17Doug DeGroot [17]
18Kenneth DeJong [17]
19Pragneshkumar H. Desai [51]
20Hasanat M. Dewan [12] [13] [14] [15] [19] [22] [23] [24] [25] [26]
21Charles R. Dyer [17]
22Eleazar Eskin [54] [56] [57] [62] [75]
23Scott E. Fahlman [17]
24Dave W. Fan [33]
25Wei Fan [44] [47] [52] [54] [58] [59] [60] [61] [63] [64] [71]
26Tom Fawcett [37]
27Ryan Ferster [81]
28Vanessa Frías-Martínez [91]
29Jason S. Glazier [12] [18]
30Luis Gravano [34]
31Ralph Grishman [17]
32Suhit Gupta [76] [84]
33Ira J. Haimowitz [37]
34Katherine Heller [75]
35Mauricio A. Hernández [23] [26] [27] [35]
36Shlomo Hershkop [62] [66] [67] [68] [73] [75] [79] [81] [82] [83] [86] [87]
37Bruce Hillyer [1]
38Lynette Hirschman [17]
39Andrew Honig [62] [75]
40Chia-Wei Hu [66] [67] [83]
41Thomas S. Huang [17]
42Jae-Jun Hwang [23]
43Hussein Ibrahim [1]
44John Ioannidis [80]
45Toru Ishida [8]
46Stephen Jan [70]
47Eric Johnson [70]
48Aravind K. Joshi [17]
49Gail E. Kaiser [34] [76] [84]
50Angelos D. Keromytis [77] [80] [88] [89] [90] [91] [92]
51S. Kliger [29]
52Richard E. Korf [17]
53Wenke Lee [33] [38] [42] [43] [45] [46] [49] [50] [51] [52] [54] [58] [59] [71]
54Stephen E. Levinson [17]
55Wei-Jen Li [73] [83] [88]
56Shaw-hwa Lo [63]
57Michael E. Locasto [77] [89] [90] [92]
58Andy Lowry [5] [6]
59Gerald Q. Maguire Jr. [5]
60Frederick D. Miller [4]
61Matthew Miller [52] [58] [59] [69] [71]
62Daniel P. Miranker (Dan Miranker) [3] [9] [10] [16] [17]
63Kui W. Mok [26] [38] [45] [46] [49]
64Dan I. Moldovan [17]
65N. H. Morgan [17]
66Rahul A. Nimbalkar [51]
67Olivier Nimeskern [66] [67] [68] [83]
68Sergei Nirenburg [17]
69David Ohsie [12] [15] [25] [29]
70Janak J. Parekh [85]
71Christopher T. Park [42]
72Sunil B. Patil [51]
73Tomislav Pavlicec [70]
74Mark Perlin [16]
75Tomaso Poggio [17]
76Andreas L. Prodromidis [33] [39] [48] [55]
77Foster J. Provost [37]
78Edward M. Riseman [17]
79Seth Robertson [69]
80Kenneth A. Ross [34]
81Ryan Rowe [87]
82Herbert Schorr [36] [53] [65]
83Matthew G. Schultz [56] [57]
84David Elliot Shaw [1] [2] [3]
85Stelios Sidiroglou [80]
86Eric V. Siegel [69]
87Sushil Da Silva [15] [25]
88Yingbo Song [89]
89Craig Stanfil [17]
90Angelos Stavrou [88] [89] [90] [92]
91Krysta Marie Svore [75]
92Milind Tambe [16]
93Steven L. Tanimoto [17]
94Stephen Taylor [5] [6]
95Thuan T. Tran [51]
96Shelley Tselepis [33]
97Gregg T. Vesonder [4]
98Benjamin W. Wah [17]
99Haixun Wang [61] [63] [64]
100Ke Wang [66] [67] [68] [74] [77] [78] [81] [83] [85]
101Charles C. Weems [17]
102Gio Wiederhold [1]
103Ouri Wolfson [12] [13] [14] [15]
104David Wolpert (David H. Wolpert) [41]
105Leland Woodbury [12] [22]
106Kam K. Yee [51]
107Shaula Yemini [29]
108Yechiam Yemini [13] [29]
109Philip S. Yu [61] [63] [64]
110Erez Zadok [56] [57] [59]
111Junxin Zhang [44] [47]
112John E. Zielinski [4]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)