shlomo hershkop
shlomo hershkop
University of Pennsylvania
Verified email at shlomohershkop.com
Title
Cited by
Cited by
Year
Real time data mining-based intrusion detection
W Lee, SJ Stolfo, PK Chan, E Eskin, W Fan, M Miller, S Hershkop, ...
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
4002001
A survey of insider attack detection research
MB Salem, S Hershkop, SJ Stolfo
Insider Attack and Cyber Security, 69-90, 2008
3482008
System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses
F Apap, A Honig, H Shlomo, E Eskin, SJ Stolfo
US Patent 7,448,084, 2008
3002008
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,009,829, 2015
2952015
System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses
F Apap, A Honig, H Shlomo, E Eskin, SJ Stolfo
US Patent 7,913,306, 2011
2682011
Baiting inside attackers using decoy documents
BM Bowen, S Hershkop, AD Keromytis, SJ Stolfo
International Conference on Security and Privacy in Communication Systems, 51-70, 2009
2032009
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
SJ Stolfo, MB Salem, S Hershkop
US Patent 8,769,684, 2014
1882014
Detecting malicious software by monitoring anomalous windows registry accesses
F Apap, A Honig, S Hershkop, E Eskin, S Stolfo
International Workshop on Recent Advances in Intrusion Detection, 36-53, 2002
1742002
Automated social hierarchy detection through email network analysis
R Rowe, G Creamer, S Hershkop, SJ Stolfo
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining …, 2007
1612007
Behavior-based modeling and its application to email analysis
SJ Stolfo, S Hershkop, CW Hu, WJ Li, O Nimeskern, K Wang
ACM Transactions on Internet Technology (TOIT) 6 (2), 187-221, 2006
1192006
Met: An experimental system for malicious email tracking
M Bhattacharyya, S Hershkop, E Eskin
Proceedings of the 2002 workshop on New security paradigms, 3-10, 2002
1102002
Designing host and network sensors to mitigate the insider threat
B Bowen, MB Salem, S Hershkop, A Keromytis, S Stolfo
IEEE security & privacy 7 (6), 22-29, 2009
1022009
A comparative evaluation of two algorithms for windows registry anomaly detection
SJ Stolfo, F Apap, E Eskin, K Heller, S Hershkop, A Honig, K Svore
Journal of Computer Security 13 (4), 659-693, 2005
882005
Detecting spam email using multiple spam classifiers
V Rajan, M Wegman, R Segal, J Crawford, J Kephart, S Hershkop
US Patent App. 11/029,069, 2006
872006
Insider attack and cyber security: beyond the hacker
SJ Stolfo, SM Bellovin, S Hershkop, AD Keromytis, S Sinclair, SW Smith
Springer Science & Business Media, 2008
842008
Behavior profiling of email
SJ Stolfo, S Hershkop, K Wang, O Nimeskern, CW Hu
International Conference on Intelligence and Security Informatics, 74-90, 2003
812003
A behavior-based approach to securing email systems
SJ Stolfo, S Hershkop, K Wang, O Nimeskern, CW Hu
International Workshop on Mathematical Methods, Models, and Architectures …, 2003
792003
Combining email models for false positive reduction
S Hershkop, SJ Stolfo
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge …, 2005
772005
Behavior-based email analysis with application to spam detection
S Hershkop
Columbia University, 2006
652006
Anomaly detection in computer security and an application to file system accesses
SJ Stolfo, S Hershkop, LH Bui, R Ferster, K Wang
International Symposium on Methodologies for Intelligent Systems, 14-28, 2005
622005
The system can't perform the operation now. Try again later.
Articles 1–20