Salvatore J. Stolfo
Orcid: 0000-0003-1611-0100Affiliations:
- Columbia University, New York City, USA
According to our database1,
Salvatore J. Stolfo
authored at least 174 papers
between 1979 and 2022.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2019, "For contributions to machine-learning-based cybersecurity and parallel hardware for database inference systems".
IEEE Fellow
IEEE Fellow 2018, "For contributions to machine learning-based computer security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2022
Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case.
Complex., 2022
2019
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Comput. Secur., 2019
2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
2017
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02354-5, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
2016
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
2015
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
Proceedings of the 2015 IEEE Hot Chips 27 Symposium (HCS), 2015
Proceedings of the Eighth European Workshop on System Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the Middleware Industry Track, Bordeaux, France, December 8-12, 2014, 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design.
Inf. Manag. Comput. Secur., 2013
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013
2012
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection.
Secur. Commun. Networks, 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Comput. Secur., 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Proceedings of the Moving Target Defense, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
From prey to hunter: transforming legacy embedded devices into exploitation sensor grids.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems.
Mach. Learn., 2010
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Data Min. Knowl. Discov., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
IEEE Secur. Priv., 2009
Data Min. Knowl. Discov., 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Segmentation and Automated Social Hierarchy Detection through Email Network Analysis.
Proceedings of the Advances in Web Mining and Web Usage Analysis, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
ACM Trans. Internet Techn., 2006
Proceedings of the 15th international conference on World Wide Web, 2006
Privacy-preserving payload-based correlation for accurate malicious traffic detection.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
2005
J. Comput. Secur., 2005
Proceedings of the 14th international conference on World Wide Web, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005
Proceedings of the 2005 National Conference on Digital Government Research, 2005
2004
Knowl. Inf. Syst., 2004
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
2002
J. Comput. Secur., 2002
A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits.
Proceedings of the Second SIAM International Conference on Data Mining, 2002
Proceedings of the Second SIAM International Conference on Data Mining, 2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002
Proceedings of the Applications of Data Mining in Computer Security, 2002
Proceedings of the Applications of Data Mining in Computer Security, 2002
2001
SIGMOD Rec., 2001
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
2000
ACM Trans. Inf. Syst. Secur., 2000
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Proceedings of the Machine Learning: ECML 2000, 11th European Conference on Machine Learning, Barcelona, Catalonia, Spain, May 31, 2000
Towards the digital government of the 21<sup>st</sup> century: a report from the workshop on research and development opportunities in federal information services.
Proceedings of the 2000 National Conference on Digital Government Research, 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999
AdaCost: Misclassification Cost-Sensitive Boosting.
Proceedings of the Sixteenth International Conference on Machine Learning (ICML 1999), Bled, Slovenia, June 27, 1999
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999
1998
Data Min. Knowl. Discov., 1998
Proceedings of the 7th USENIX Security Symposium, 1998
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection.
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998
1997
J. Intell. Inf. Syst., 1997
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (KDD-97), 1997
1996
Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), 1996
1995
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995
Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning.
Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD-95), 1995
A coding approach to event correlation.
Proceedings of the Integrated Network Management IV, 1995
Proceedings of the Machine Learning, 1995
1994
Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing.
J. Parallel Distributed Comput., 1994
Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing.
Proceedings of the 1994 ACM SIGMOD International Conference on Management of Data, 1994
Proceedings of the Fourth International Workshop on Research Issues in Data Engineering: Active Database Systems, 1994
Meta-level Control of Rule Execution in a Parallel and Distributed Expert Database System.
Proceedings of the Fourth International Workshop on Research Issues in Data Engineering: Active Database Systems, 1994
Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew.
Proceedings of the Third International Conference on Parallel and Distributed Information Systems (PDIS 94), 1994
1993
Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence.
IEEE Trans. Knowl. Data Eng., 1993
Proceedings of the 25th Winter Simulation Conference, 1993
Proceedings of the Methodologies for Intelligent Systems, 7th International Symposium, 1993
Proceedings of the 1st International Conference on Intelligent Systems for Molecular Biology, 1993
Proceedings of the CIKM 93, 1993
1992
Proceedings of the Fourth International Conference on Tools with Artificial Intelligence, 1992
1991
J. Parallel Distributed Comput., 1991
Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data, 1991
The PARULEL Parallel Rule Language.
Proceedings of the International Conference on Parallel Processing, 1991
1989
Proceedings of the Speech and Natural Language: Proceedings of a Workshop Held at Cape Cod, 1989
1987
1986
The Do-loop Considered Harmful in Production System Programming.
Proceedings of the Expert Database Systems, 1986
1985
Towards the Parallel Execution of Rules in Production System Programs.
Proceedings of the International Conference on Parallel Processing, 1985
1984
Logic Programming Using Parallel Associative Operations.
Proceedings of the 1984 International Symposium on Logic Programming, 1984
LPS Algorithms.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1984
Proceedings of the National Conference on Artificial Intelligence. Austin, 1984
1983
Proceedings of the 8th International Joint Conference on Artificial Intelligence. Karlsruhe, 1983
Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence.
Proceedings of the 8th International Joint Conference on Artificial Intelligence. Karlsruhe, 1983
1982
Proceedings of the National Conference on Artificial Intelligence, 1982
1981
1979
Automatic Discovery of Heuristics for Nondeterministic Programs from Sample Execution Traces.
PhD thesis, 1979
Automatic Discovery of Heuristics for Nondeterministic Programs.
Proceedings of the Sixth International Joint Conference on Artificial Intelligence, 1979