Method and Apparatus for Evaluating Phishing Sites to Determine Their Level of Danger and Profile Phisher Behavior SJ Stolfo, S Hershkop US Patent App. 17/462,585, 2022 | 7 | 2022 |
Research Article Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case GG Creamer, SJ Stolfo, M Creamer, S Hershkop, R Rowe | | 2022 |
Discovering organizational hierarchy through a corporate ranking algorithm: The Enron case GG Creamer, SJ Stolfo, M Creamer, S Hershkop, R Rowe Complexity 2022 (1), 8154476, 2022 | 5 | 2022 |
Systems and methods for protection from phishing attacks SJ Stolfo, S Hershkop US Patent App. 16/995,783, 2021 | 4 | 2021 |
DeepMatch: Practical deep packet inspection in the data plane using network processors J Hypolite, J Sonchack, S Hershkop, N Dautenhahn, A DeHon, JM Smith Proceedings of the 16th International Conference on emerging Networking …, 2020 | 47 | 2020 |
Active authentication using file system decoys and user behavior modeling: results of a large scale study J Voris, Y Song, MB Salem, S Hershkop, S Stolfo Computers & Security 87, 101412, 2019 | 22 | 2019 |
Methods, systems, and media for baiting inside attackers SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ... US Patent 9,501,639, 2016 | 33 | 2016 |
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior SJ Stolfo, MB Salem, S Hershkop US Patent App. 15/056,627, 2016 | 4 | 2016 |
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior SJ Stolfo, MB Salem, S Hershkop US Patent 9,311,476, 2016 | 20 | 2016 |
Methods, systems, and media for baiting inside attackers SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ... US Patent 9,009,829, 2015 | 449 | 2015 |
Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data S Stolfo, S Hershkop | | 2015 |
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior SJ Stolfo, MB Salem, S Hershkop US Patent 8,769,684, 2014 | 344 | 2014 |
System level user behavior biometrics using Fisher features and Gaussian mixture models Y Song, MB Salem, S Hershkop, SJ Stolfo 2013 IEEE Security and Privacy Workshops, 52-59, 2013 | 55 | 2013 |
Anomaly Detection at Multiple Scales (ADAMS) H Thompson, SJ Stolfo, AD Keromytis, S Hershkop Defense Technical Information Center (DTIC): Fort Belvoir, VA, USA, 2011 | 3 | 2011 |
System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses F Apap, A Honig, H Shlomo, E Eskin, SJ Stolfo US Patent 7,913,306, 2011 | 345 | 2011 |
Detecting spam email using multiple spam classifiers VT Rajan, MN Wegman, RB Segal, JL Crawford, JO Kephart, S Hershkop US Patent 7,882,192, 2011 | 26 | 2011 |
Designing host and network sensors to mitigate the insider threat B Bowen, MB Salem, S Hershkop, A Keromytis, S Stolfo IEEE security & privacy 7 (6), 22-29, 2009 | 115 | 2009 |
Baiting inside attackers using decoy documents BM Bowen, S Hershkop, AD Keromytis, SJ Stolfo Security and Privacy in Communication Networks: 5th International ICST …, 2009 | 280 | 2009 |
Segmentation and automated social hierarchy detection through email network analysis G Creamer, R Rowe, S Hershkop, SJ Stolfo Advances in Web Mining and Web Usage Analysis: 9th International Workshop on …, 2009 | 68 | 2009 |
System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses F Apap, A Honig, H Shlomo, E Eskin, SJ Stolfo US Patent 7,448,084, 2008 | 403 | 2008 |