Malek Ben Salem
Malek Ben Salem
Verified email at accenture.com
Title
Cited by
Cited by
Year
A survey of insider attack detection research
MB Salem, S Hershkop, SJ Stolfo
Insider Attack and Cyber Security, 69-90, 2008
3892008
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,009,829, 2015
3192015
Fog computing: Mitigating insider data theft attacks in the cloud
SJ Stolfo, MB Salem, AD Keromytis
2012 IEEE symposium on security and privacy workshops, 125-128, 2012
3072012
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
SJ Stolfo, MB Salem, S Hershkop
US Patent 8,769,684, 2014
2092014
Modeling user search behavior for masquerade detection
MB Salem, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 181-200, 2011
1842011
Designing host and network sensors to mitigate the insider threat
B Bowen, MB Salem, S Hershkop, A Keromytis, S Stolfo
IEEE security & privacy 7 (6), 22-29, 2009
1022009
Decoy document deployment for effective masquerade attack detection
MB Salem, SJ Stolfo
International Conference on Detection of Intrusions and Malware, and†…, 2011
712011
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
682010
Method and system for resource management based on adaptive risk-based access controls
MB Salem, R Bhatti, J Solderitsch
US Patent App. 13/774,356, 2013
572013
System level user behavior biometrics using Fisher features and Gaussian mixture models
Y Song, MB Salem, S Hershkop, SJ Stolfo
2013 IEEE Security and Privacy Workshops, 52-59, 2013
472013
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
MB Salem, SJ Stolfo
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1 (1), 3-13, 2010
472010
Masquerade attack detection using a search-behavior modeling approach
MB Salem, SJ Stolfo
Columbia University, Computer Science Department, Technical Report CUCS-027-09, 2009
422009
The insider attack problem nature and scope
SM Bellovin
Insider Attack and Cyber Security, 1-4, 2008
282008
Combining a baiting and a user search profiling techniques for masquerade detection
M Ben Salem, S Stolfo
252011
Monitoring technologies for mitigating insider threats
BM Bowen, MB Salem, AD Keromytis, SJ Stolfo
Insider Threats in Cyber Security, 197-217, 2010
232010
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,501,639, 2016
172016
Orchestration of software-defined security services
S Luo, MB Salem
2016 IEEE International Conference on Communications Workshops (ICC), 436-441, 2016
172016
Big data analytics in cybersecurity
O Savas, J Deng
CRC Press, 2017
152017
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
SJ Stolfo, MB Salem, S Hershkop
US Patent 9,311,476, 2016
152016
Survey on fog computing mitigating data theft attacks in cloud
VG Mandlekar, V Mahale, SS Sancheti, MS Rais
Int. J. Innov. Res. Comput. Sci. Technol 2 (6), 13-16, 2014
132014
The system can't perform the operation now. Try again later.
Articles 1–20