Prati
Malek Ben Salem
Malek Ben Salem
Potvrđena adresa e-pošte na accenture.com
Naslov
Citirano
Citirano
Godina
Cloud computing
B Hayes
Communications of the ACM 51 (7), 9-11, 2008
20152008
A survey of insider attack detection research
MB Salem, S Hershkop, SJ Stolfo
Insider Attack and Cyber Security: Beyond the Hacker, 69-90, 2008
4682008
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,009,829, 2015
4422015
Fog computing: Mitigating insider data theft attacks in the cloud
SJ Stolfo, MB Salem, AD Keromytis
2012 IEEE symposium on security and privacy workshops, 125-128, 2012
3642012
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
SJ Stolfo, MB Salem, S Hershkop
US Patent 8,769,684, 2014
3412014
Modeling user search behavior for masquerade detection
MB Salem, SJ Stolfo
International workshop on recent advances in intrusion detection, 181-200, 2011
2082011
Designing host and network sensors to mitigate the insider threat
B Bowen, MB Salem, S Hershkop, A Keromytis, S Stolfo
IEEE security & privacy 7 (6), 22-29, 2009
1172009
Decoy document deployment for effective masquerade attack detection
M Ben Salem, SJ Stolfo
International Conference on Detection of Intrusions and Malware, and …, 2011
972011
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
952010
Method and system for resource management based on adaptive risk-based access controls
MB Salem, R Bhatti, J Solderitsch
US Patent App. 13/774,356, 2013
652013
Telemetry analysis system for physical process anomaly detection
A Hassanzadeh, S Mulchandani, MB Salem, CA Chen
US Patent 10,148,686, 2018
622018
System level user behavior biometrics using Fisher features and Gaussian mixture models
Y Song, MB Salem, S Hershkop, SJ Stolfo
2013 IEEE Security and Privacy Workshops, 52-59, 2013
562013
Masquerade attack detection using a search-behavior modeling approach
MB Salem, SJ Stolfo
Columbia University, Computer Science Department, Technical Report CUCS-027-09, 2009
542009
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
MB Salem, SJ Stolfo
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1 (1), 3-13, 2010
482010
The insider attack problem nature and scope
SM Bellovin
Insider Attack and Cyber Security: Beyond the Hacker, 1-4, 2008
432008
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,501,639, 2016
332016
Orchestration of software-defined security services
S Luo, MB Salem
2016 IEEE international conference on communications workshops (ICC), 436-441, 2016
332016
Monitoring technologies for mitigating insider threats
BM Bowen, MB Salem, AD Keromytis, SJ Stolfo
Insider Threats in Cyber Security, 197-217, 2010
272010
Sensors for a resource
MB Salem, R Bhatti, J Solderitsch
US Patent 9,954,865, 2018
252018
Active authentication using file system decoys and user behavior modeling: results of a large scale study
J Voris, Y Song, MB Salem, S Hershkop, S Stolfo
Computers & Security 87, 101412, 2019
232019
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20