Shlomo Hershkop

Orcid: 0000-0003-2311-5268

According to our database1, Shlomo Hershkop authored at least 21 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case.
Complex., 2022

2020
DeepMatch: practical deep packet inspection in the data plane using network processors.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Comput. Secur., 2019

2013
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

2009
Designing Host and Network Sensors to Mitigate the Insider Threat.
IEEE Secur. Priv., 2009

Baiting Inside Attackers Using Decoy Documents.
Proceedings of the Security and Privacy in Communication Networks, 2009

2008
A Survey of Insider Attack Detection Research.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

2007
Segmentation and Automated Social Hierarchy Detection through Email Network Analysis.
Proceedings of the Advances in Web Mining and Web Usage Analysis, 2007

2006
Behavior-based modeling and its application to Email analysis.
ACM Trans. Internet Techn., 2006

A temporal based forensic analysis of electronic communication.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

2005
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection.
J. Comput. Secur., 2005

Combining email models for false positive reduction.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

Anomaly Detection in Computer Security and an Application to File System Accesses.
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005

Email mining toolkit supporting law enforcement forensic analyses.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

2004
Identifying spam without peeking at the contents.
ACM Crossroads, 2004

Email archive analysis through graphical visualization.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

2003
A Behavior-Based Approach to Securing Email Systems.
Proceedings of the Computer Network Security, 2003

Behavior Profiling of Email.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

EMT/MET: Systems for Modeling and Detecting Errant Email.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

MET: an experimental system for Malicious Email Tracking.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002


  Loading...