Salvatore Stolfo
Columbia University in the City of New York
H-index: 103
North America-United States
Top articles of Salvatore Stolfo
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Systems, methods, and media for defending computing systems from attack | 2024/2/1 | ||
Inhibiting memory disclosure attacks using destructive code reads | 2023/12/12 | ||
Some Initial Thoughts about Quantum Malware | Salvatore J Stolfo | 2023 | |
Methods, systems and media for evaluating layered computer security products | 2020/3/17 | ||
Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case | Complexity | Germán G Creamer Salvatore J Stolfo Mateo Creamer Shlomo Hershkop Ryan Rowe | 2022/2/21 |
Method and apparatus for securing embedded device firmware | 2022/6/14 | ||
Research Article Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case | Germán G Creamer Salvatore J Stolfo Mateo Creamer Shlomo Hershkop Ryan Rowe | 2022 | |
Methods, systems, and media for injecting code into embedded devices | 2022/3/29 | ||
Method and Apparatus for Evaluating Phishing Sites to Determine Their Level of Danger and Profile Phisher Behavior | 2022/3/3 | ||
Methods, systems, and media for testing insider threat detection systems | 2022/9/8 | ||
Methods, media, and systems for detecting anomalous program executions | 2022/2/24 | ||
Document behavior analytics—abnormal document flows to identify suspicious exfiltration utility patent | 2021/1/12 | ||
Methods, systems, and media for inhibiting attacks on embedded devices | 2021/1/5 | ||
Methods, media, and systems for detecting an anomalous sequence of function calls | 2021/8/31 | ||
Systems and methods for protection from phishing attacks | 2021/2/18 | ||
Methods, media, and systems for detecting attack on a digital processing device | 2021/1/26 | ||
Generating highly realistic decoy email and documents | 2020/3/12 | ||
Detecting network anomalies by probabilistic modeling of argument strings with markov chains | 2020/10/27 | ||
Host-based deception security technology | 2020/6/16 | ||
Systems and methods for content extraction from a mark-up language text accessible at an internet domain | 2020/5/12 |