Systems, methods, and media for detecting network anomalies using a trained probabilistic model Y Song, AD Keromytis, SJ Stolfo US Patent 8,844,033, 2014 | 393 | 2014 |
On the infeasibility of modeling polymorphic shellcode Y Song, ME Locasto, A Stavrou, AD Keromytis, SJ Stolfo Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 205 | 2007 |
Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic Y Song, AD Keromytis, S Stolfo | 158 | 2009 |
Spectral clustering and embedding with hidden markov models T Jebara, Y Song, K Thadani Machine Learning: ECML 2007: 18th European Conference on Machine Learning …, 2007 | 100 | 2007 |
System level user behavior biometrics using feature extraction and modeling Y Song, SJ Stolfo US Patent 9,275,345, 2016 | 61 | 2016 |
System level user behavior biometrics using Fisher features and Gaussian mixture models Y Song, MB Salem, S Hershkop, SJ Stolfo 2013 IEEE Security and Privacy Workshops, 52-59, 2013 | 58 | 2013 |
Brave new world: Pervasive insecurity of embedded network devices A Cui, Y Song, PV Prabhu, SJ Stolfo Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 45 | 2009 |
Active authentication using file system decoys and user behavior modeling: results of a large scale study J Voris, Y Song, MB Salem, S Hershkop, S Stolfo Computers & Security 87, 101412, 2019 | 25 | 2019 |
Markov models for network-behavior modeling and anonymization Y Song, S Stolfo, T Jebara | 9 | 2011 |
Behavior-based network traffic synthesis Y Song, SJ Stolfo, T Jebara 2011 IEEE International Conference on Technologies for Homeland Security …, 2011 | 8 | 2011 |
On the infeasibility of Modeling Polymorphic shellcode for Signature Detection Y Song, ME Locasto, A Stavrou, AD Keromytis, S Stolfo | 8 | 2007 |
You are what you use: An initial study of authenticating mobile users via application usage J Voris, Y Song, M Ben Salem, S Stolfo Proceedings of the 8th EAI International Conference on Mobile Computing …, 2016 | 7 | 2016 |
Smashing the stack with hydra: The many heads of advanced polymorphic shellcode P Prabhu, Y Song, S Stolfo | 7 | 2009 |
Smashing the Stack with Hydra P Prabhu, Y Song, S Stolfo Downloaded on Sep 5, 1-22, 2013 | 6 | 2013 |
Systems, methods, and media for detecting network anomalies Y Song, AD Keromytis, SJ Stolfo US Patent App. 14/476,142, 2014 | 4 | 2014 |
Detecting network anomalies by probabilistic modeling of argument strings with markov chains Y Song, AD Keromytis, SJ Stolfo US Patent 9,253,201, 2016 | 3 | 2016 |
A behavior-based approach towards statistics-preserving network trace anonymization Y Song Columbia University, 2012 | 2 | 2012 |
Density estimation under independent similarly distributed sampling assumptions T Jebara, Y Song, K Thadani Advances in Neural Information Processing Systems 20, 2007 | 2 | 2007 |
Independent similarly distributed assumptions for semiparametric density estimation T Jebara, Y Song, J Thadani Department of Computer Science, Columbia University, New York, NY 10027, 0 | 1 | |
Detecting network anomalies by probabilistic modeling of argument strings with markov chains Y Song, AD Keromytis, SJ Stolfo US Patent 10,819,726, 2020 | | 2020 |