Author of the publication

A Behavior-Based Approach to Securing Email Systems.

, , , , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 57-81. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A temporal based forensic analysis of electronic communication., , and . DG.O, volume 151 of ACM International Conference Proceeding Series, page 23-24. Digital Government Research Center, (2006)Designing Host and Network Sensors to Mitigate the Insider Threat., , , , and . IEEE Secur. Priv., 7 (6): 22-29 (2009)Segmentation and Automated Social Hierarchy Detection through Email Network Analysis., , , and . WebKDD/SNA-KDD, volume 5439 of Lecture Notes in Computer Science, page 40-58. Springer, (2007)A comparative evaluation of two algorithms for Windows Registry Anomaly Detection., , , , , , and . J. Comput. Secur., 13 (4): 659-693 (2005)Email archive analysis through graphical visualization., , and . VizSEC, page 128-132. ACM, (2004)Combining email models for false positive reduction., and . KDD, page 98-107. ACM, (2005)Anomaly Detection in Computer Security and an Application to File System Accesses., , , , and . ISMIS, volume 3488 of Lecture Notes in Computer Science, page 14-28. Springer, (2005)Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case., , , , and . Complex., (2022)Active authentication using file system decoys and user behavior modeling: results of a large scale study., , , , and . Comput. Secur., (2019)A Survey of Insider Attack Detection Research., , and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)