Follow
Salvatore Stolfo
Salvatore Stolfo
Professor of Computer Science, Columbia University
Verified email at columbia.edu - Homepage
Title
Cited by
Cited by
Year
Data mining approaches for intrusion detection
W Lee, S Stolfo
21731998
A data mining framework for building intrusion detection models
W Lee, SJ Stolfo, KW Mok
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
20301999
Data mining methods for detection of new malicious executables
MG Schultz, E Eskin, F Zadok, SJ Stolfo
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 38-49, 2000
16552000
Intrusion Detection with unlabeled data using clustering
L Portnoy, E Eskin, SJ Stolfo
ACM CCS Workshop on Management of Data, 2001
14542001
Distributed data mining in credit card fraud detection
PK Chan, W Fan, AL Prodromidis, SJ Stolfo
IEEE Intelligent Systems and Their Applications 14 (6), 67-74, 1999
14471999
Real-world data is dirty: Data cleansing and the merge/purge problem
MA Hernández, SJ Stolfo
Data mining and knowledge discovery 2, 9-37, 1998
14311998
The merge/purge problem for large databases
MA Hernández, SJ Stolfo
ACM Sigmod Record 24 (2), 127-138, 1995
14191995
Anomalous payload-based network intrusion detection
K Wang, SJ Stolfo
International workshop on recent advances in intrusion detection, 203-222, 2004
13192004
A framework for constructing features and models for intrusion detection systems
W Lee, SJ Stolfo
ACM transactions on Information and system security (TiSSEC) 3 (4), 227-261, 2000
12972000
AdaCost: misclassification cost-sensitive boosting
W Fan, SJ Stolfo, J Zhang, PK Chan
Icml 99, 97-105, 1999
10001999
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
8792000
Method and system for using intelligent agents for financial transactions, services, accounting, and advice
D Schutzer, WH Forster Jr, H Hu, W Lee, SJ Stolfo, W Fan
US Patent 5,920,848, 1999
7811999
Adaptive intrusion detection: A data mining approach
W Lee, SJ Stolfo, KW Mok
Artificial Intelligence Review 14, 533-567, 2000
5892000
On the feasibility of online malware detection with performance counters
J Demme, M Maycock, J Schmitz, A Tang, A Waksman, S Sethumadhavan, ...
ACM SIGARCH computer architecture news 41 (3), 559-570, 2013
5842013
Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party
SJ Stolfo, Y Yemini, LP Shaykin
US Patent 7,069,249, 2006
5762006
Learning patterns from unix process execution traces for intrusion detection
W Lee, SJ Stolfo, PK Chan
AAAI workshop on AI approaches to fraud detection and risk management, 50-56, 1997
5291997
JAM: Java Agents for Meta-Learning over Distributed Databases.
SJ Stolfo, AL Prodromidis, S Tselepis, W Lee, DW Fan, PK Chan
KDD 97, 74-81, 1997
5041997
Method and apparatus for imaging, image processing and data compression
SJ Stolfo
US Patent 5,748,780, 1998
4891998
Anagram: A content anomaly detector resistant to mimicry attack
K Wang, JJ Parekh, SJ Stolfo
International workshop on recent advances in intrusion detection, 226-248, 2006
4872006
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
4772013
The system can't perform the operation now. Try again later.
Articles 1–20