Follow
shlomo hershkop
shlomo hershkop
University of Pennsylvania
Verified email at shlomohershkop.com
Title
Cited by
Year
Method and Apparatus for Evaluating Phishing Sites to Determine Their Level of Danger and Profile Phisher Behavior
SJ Stolfo, S Hershkop
US Patent App. 17/462,585, 2022
72022
Research Article Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case
GG Creamer, SJ Stolfo, M Creamer, S Hershkop, R Rowe
2022
Discovering organizational hierarchy through a corporate ranking algorithm: The Enron case
GG Creamer, SJ Stolfo, M Creamer, S Hershkop, R Rowe
Complexity 2022 (1), 8154476, 2022
52022
Systems and methods for protection from phishing attacks
SJ Stolfo, S Hershkop
US Patent App. 16/995,783, 2021
42021
DeepMatch: Practical deep packet inspection in the data plane using network processors
J Hypolite, J Sonchack, S Hershkop, N Dautenhahn, A DeHon, JM Smith
Proceedings of the 16th International Conference on emerging Networking …, 2020
472020
Active authentication using file system decoys and user behavior modeling: results of a large scale study
J Voris, Y Song, MB Salem, S Hershkop, S Stolfo
Computers & Security 87, 101412, 2019
222019
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,501,639, 2016
332016
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
SJ Stolfo, MB Salem, S Hershkop
US Patent App. 15/056,627, 2016
42016
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
SJ Stolfo, MB Salem, S Hershkop
US Patent 9,311,476, 2016
202016
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,009,829, 2015
4492015
Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data
S Stolfo, S Hershkop
2015
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
SJ Stolfo, MB Salem, S Hershkop
US Patent 8,769,684, 2014
3442014
System level user behavior biometrics using Fisher features and Gaussian mixture models
Y Song, MB Salem, S Hershkop, SJ Stolfo
2013 IEEE Security and Privacy Workshops, 52-59, 2013
552013
Anomaly Detection at Multiple Scales (ADAMS)
H Thompson, SJ Stolfo, AD Keromytis, S Hershkop
Defense Technical Information Center (DTIC): Fort Belvoir, VA, USA, 2011
32011
System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses
F Apap, A Honig, H Shlomo, E Eskin, SJ Stolfo
US Patent 7,913,306, 2011
3452011
Detecting spam email using multiple spam classifiers
VT Rajan, MN Wegman, RB Segal, JL Crawford, JO Kephart, S Hershkop
US Patent 7,882,192, 2011
262011
Designing host and network sensors to mitigate the insider threat
B Bowen, MB Salem, S Hershkop, A Keromytis, S Stolfo
IEEE security & privacy 7 (6), 22-29, 2009
1152009
Baiting inside attackers using decoy documents
BM Bowen, S Hershkop, AD Keromytis, SJ Stolfo
Security and Privacy in Communication Networks: 5th International ICST …, 2009
2802009
Segmentation and automated social hierarchy detection through email network analysis
G Creamer, R Rowe, S Hershkop, SJ Stolfo
Advances in Web Mining and Web Usage Analysis: 9th International Workshop on …, 2009
682009
System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses
F Apap, A Honig, H Shlomo, E Eskin, SJ Stolfo
US Patent 7,448,084, 2008
4032008
The system can't perform the operation now. Try again later.
Articles 1–20