2019 - ACM Fellow For contributions to machine-learning-based cybersecurity and parallel hardware for database inference systems
2018 - IEEE Fellow For contributions to machine learning-based computer security
Salvatore J. Stolfo mainly investigates Intrusion detection system, Data mining, Computer security, Anomaly detection and Artificial intelligence. His biological study spans a wide range of topics, including Set, Real-time computing, System call and Network packet. His work in the fields of Anomaly-based intrusion detection system and Association rule learning overlaps with other areas such as Merge and Transitive closure.
His study in the field of Information security is also linked to topics like Decoy. Salvatore J. Stolfo combines subjects such as Window, Data security, Host and Data set with his study of Anomaly detection. The Artificial intelligence study combines topics in areas such as Machine learning, Computer graphics and Pattern recognition.
His primary areas of study are Computer security, Data mining, Intrusion detection system, Artificial intelligence and Anomaly detection. His work in the fields of Computer security, such as Network packet, overlaps with other areas such as Decoy. The various areas that Salvatore J. Stolfo examines in his Data mining study include Process, Set and Audit.
His Intrusion detection system research includes elements of Exploit, Real-time computing and Host. His Artificial intelligence study combines topics in areas such as Machine learning and Pattern recognition. His Unsupervised learning and Semi-supervised learning investigations are all subjects of Machine learning research.
His primary areas of study are Computer security, Data mining, Insider threat, Software and Decoy. The Authentication, Data theft and Identity theft research Salvatore J. Stolfo does as part of his general Computer security study is frequently linked to other disciplines of science, such as Energy management, therefore creating a link between diverse domains of science. His primary area of study in Data mining is in the field of Anomaly detection.
His Insider threat research integrates issues from Intrusion detection system, Encryption and Host. His Intrusion detection system study combines topics from a wide range of disciplines, such as Real-time computing, Generator, Data format and Data processing. Salvatore J. Stolfo has researched Pattern recognition in several fields, including Feature and Artificial intelligence.
His main research concerns Computer security, Malware, Data mining, Exploit and Anomaly detection. The study incorporates disciplines such as Cloud computing, Cloud computing security and Human–computer interaction in addition to Computer security. Salvatore J. Stolfo combines subjects such as Signature and Computer hardware with his study of Malware.
He performs multidisciplinary studies into Data mining and Gaussian process in his work. His work deals with themes such as Set and Feature vector, which intersect with Anomaly detection. In general Artificial intelligence, his work in Feature is often linked to Geometric framework linking many areas of study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Data mining approaches for intrusion detection
Wenke Lee;Salvatore J. Stolfo.
usenix security symposium (1998)
A data mining framework for building intrusion detection models
Wenke Lee;S.J. Stolfo;K.W. Mok.
ieee symposium on security and privacy (1999)
A Geometric Framework for Unsupervised Anomaly Detection
Eleazar Eskin;Andrew Arnold;Michael J. Prerau;Leonid Portnoy.
Applications of Data Mining in Computer Security (2002)
Data mining methods for detection of new malicious executables
M.G. Schultz;E. Eskin;F. Zadok;S.J. Stolfo.
ieee symposium on security and privacy (2001)
The merge/purge problem for large databases
Mauricio A. Hernández;Salvatore J. Stolfo.
international conference on management of data (1995)
Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem
Mauricio A. Hernández;Salvatore J. Stolfo.
Data Mining and Knowledge Discovery (1998)
Distributed data mining in credit card fraud detection
P.K. Chan;W. Fan;A.L. Prodromidis;S.J. Stolfo.
IEEE Intelligent Systems & Their Applications (1999)
Anomalous payload-based network intrusion detection
Ke Wang;Salvatore J. Stolfo.
Lecture Notes in Computer Science (2004)
A framework for constructing features and models for intrusion detection systems
Wenke Lee;Salvatore J. Stolfo.
ACM Transactions on Information and System Security (2000)
AdaCost: Misclassification Cost-Sensitive Boosting
Wei Fan;Salvatore J. Stolfo;Junxin Zhang;Philip K. Chan.
international conference on machine learning (1999)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Georgia Institute of Technology
Georgia Institute of Technology
Virginia Tech
Florida Institute of Technology
Tencent (China)
University of California, Los Angeles
D. E. Shaw Research
Columbia University
KTH Royal Institute of Technology
University of Illinois at Chicago
Center for Information Technology
Tufts University
University of Cagliari
University of Sydney
King Abdullah University of Science and Technology
University of Cambridge
Sangamo BioSciences (United States)
Victor Chang Cardiac Research Institute
Texas A&M University
ETH Zurich
Stanford University
CSIRO Marine and Atmospheric Research
Goddard Space Flight Center
Universidade de São Paulo
Imperial College London
Swinburne University of Technology