Data mining approaches for intrusion detection W Lee, S Stolfo | 2165 | 1998 |
A data mining framework for building intrusion detection models W Lee, SJ Stolfo, KW Mok Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999 | 2083 | 1999 |
Data mining methods for detection of new malicious executables MG Schultz, E Eskin, F Zadok, SJ Stolfo Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 38-49, 2000 | 1659 | 2000 |
Intrusion Detection with unlabeled data using clustering L Portnoy, E Eskin, SJ Stolfo ACM CCS Workshop on Management of Data, 2001 | 1443 | 2001 |
Real-world data is dirty: Data cleansing and the merge/purge problem MA Hernández, SJ Stolfo Data mining and knowledge discovery 2, 9-37, 1998 | 1429 | 1998 |
The merge/purge problem for large databases MA Hernández, SJ Stolfo ACM Sigmod Record 24 (2), 127-138, 1995 | 1425 | 1995 |
Anomalous payload-based network intrusion detection K Wang, SJ Stolfo International workshop on recent advances in intrusion detection, 203-222, 2004 | 1322 | 2004 |
A framework for constructing features and models for intrusion detection systems W Lee, SJ Stolfo ACM transactions on Information and system security (TiSSEC) 3 (4), 227-261, 2000 | 1295 | 2000 |
AdaCost: misclassification cost-sensitive boosting W Fan, SJ Stolfo, J Zhang, PK Chan Icml 99, 97-105, 1999 | 1000 | 1999 |
Cost-based modeling for fraud and intrusion detection: Results from the JAM project SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 868 | 2000 |
Distributed data mining in credit card fraud detection PK Chan, W Fan, AL Prodromidis, SJ Stolfo IEEE Intelligent Systems and Their Applications 14 (6), 67-74, 1999 | 810 | 1999 |
Method and system for using intelligent agents for financial transactions, services, accounting, and advice D Schutzer, WH Forster Jr, H Hu, W Lee, SJ Stolfo, W Fan US Patent 5,920,848, 1999 | 782 | 1999 |
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. PK Chan, SJ Stolfo KDD 98, 164-168, 1998 | 732 | 1998 |
On the feasibility of online malware detection with performance counters J Demme, M Maycock, J Schmitz, A Tang, A Waksman, S Sethumadhavan, ... ACM SIGARCH computer architecture news 41 (3), 559-570, 2013 | 590 | 2013 |
Adaptive intrusion detection: A data mining approach W Lee, SJ Stolfo, KW Mok Artificial Intelligence Review 14, 533-567, 2000 | 588 | 2000 |
Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party SJ Stolfo, Y Yemini, LP Shaykin US Patent 7,069,249, 2006 | 571 | 2006 |
Learning patterns from unix process execution traces for intrusion detection W Lee, SJ Stolfo, PK Chan AAAI workshop on AI approaches to fraud detection and risk management, 50-56, 1997 | 528 | 1997 |
JAM: Java Agents for Meta-Learning over Distributed Databases. SJ Stolfo, AL Prodromidis, S Tselepis, W Lee, DW Fan, PK Chan KDD 97, 74-81, 1997 | 498 | 1997 |
Method and apparatus for imaging, image processing and data compression SJ Stolfo US Patent 5,748,780, 1998 | 491 | 1998 |
Anagram: A content anomaly detector resistant to mimicry attack K Wang, JJ Parekh, SJ Stolfo International workshop on recent advances in intrusion detection, 226-248, 2006 | 486 | 2006 |